![]() Mahmoudi, Amir Houshang ![]() ![]() ![]() in Journal of Analytical and Applied Pyrolysis (2014), 106 Detailed reference viewed: 434 (26 UL)![]() Mainassara Chekaraou, Abdoul Wahid ![]() ![]() ![]() Scientific Conference (2020, April 27) Detailed reference viewed: 120 (20 UL)![]() ; ; et al in Proceedings of the National Academy of Sciences of the United States of America (2012), 109(7), 2678-2683 Photosynthesis has recently gained considerable attention for its potential role in the development of renewable energy sources. Optimizing photosynthetic organisms for biomass or biofuel production will ... [more ▼] Photosynthesis has recently gained considerable attention for its potential role in the development of renewable energy sources. Optimizing photosynthetic organisms for biomass or biofuel production will therefore require a systems understanding of photosynthetic processes. We reconstructed a high-quality genome-scale metabolic network for Synechocystis sp. PCC6803 that describes key photosynthetic processes in mechanistic detail. We performed an exhaustive in silico analysis of the reconstructed photosynthetic process under different light and inorganic carbon (Ci) conditions as well as under genetic perturbations. Our key results include the following. (i) We identified two main states of the photosynthetic apparatus: a Ci-limited state and a light-limited state. (ii) We discovered nine alternative electron flow pathways that assist the photosynthetic linear electron flow in optimizing the photosynthesis performance. (iii) A high degree of cooperativity between alternative pathways was found to be critical for optimal autotrophic metabolism. Although pathways with high photosynthetic yield exist for optimizing growth under suboptimal light conditions, pathways with low photosynthetic yield guarantee optimal growth under excessive light or Ci limitation. (iv) Photorespiration was found to be essential for the optimal photosynthetic process, clarifying its role in high-light acclimation. Finally, (v) an extremely high photosynthetic robustness drives the optimal autotrophic metabolism at the expense of metabolic versatility and robustness. The results and modeling approach presented here may promote a better understanding of the photosynthetic process. They can also guide bioengineering projects toward optimal biofuel production in photosynthetic organisms. [less ▲] Detailed reference viewed: 146 (5 UL)![]() Wolf, Arnaud ![]() Doctoral thesis (2021) Detailed reference viewed: 96 (6 UL)![]() Rohles, Björn ![]() Article for general public (2017) Web designers are used to look at the "big things" in design: grids, responsive layouts, typographic systems… However, looking at small details that enhance the user experience is also worthwhile, like ... [more ▼] Web designers are used to look at the "big things" in design: grids, responsive layouts, typographic systems… However, looking at small details that enhance the user experience is also worthwhile, like micro interactions, micro copy, typographic details. [less ▲] Detailed reference viewed: 211 (2 UL)![]() ; ; Toro Pozo, Jorge Luis ![]() in Computación y Sistemas (2014), 18(1), 153-167 Methods for noise cleaning have great significance in classification tasks and in situations when it is necessary to carry out a semi-supervised learning due to importance of having well-labeled samples ... [more ▼] Methods for noise cleaning have great significance in classification tasks and in situations when it is necessary to carry out a semi-supervised learning due to importance of having well-labeled samples (prototypes) for classification of the new patterns. In this work, we present a new algorithm for detecting noise in data streams that takes into account changes in concepts over time (concept drift). The algorithm is based on the neighborhood criteria and its application uses the construction of a training set. In our experiments we used both synthetic and real databases, the latter were taken from UCI repository. The results support our proposal of noise detection in data streams and classification processes. [less ▲] Detailed reference viewed: 51 (2 UL)![]() ; ; Schmidt, Thomas ![]() in Physica B. Condensed Matter (2014), 441 We investigate an ensemble of excitons in a coupled quantum well excited via an applied laser field. Using an effective disordered quantum Ising model, we perform a numerical simulation of the ... [more ▼] We investigate an ensemble of excitons in a coupled quantum well excited via an applied laser field. Using an effective disordered quantum Ising model, we perform a numerical simulation of the experimental procedure and calculate the probability distribution function P(M) to create M excitons as well as their correlation function. It shows clear evidence of the existence of two phases corresponding to a liquid and a crystal phase. We demonstrate that not only the correlation function but also the distribution P(M) is very well suited to monitor this transition. [less ▲] Detailed reference viewed: 153 (2 UL)![]() Schmidt, Thomas ![]() Presentation (2016, January) Detailed reference viewed: 69 (1 UL)![]() Schmidt, Thomas ![]() Presentation (2015, June) Detailed reference viewed: 51 (0 UL)![]() Schmidt, Thomas ![]() Scientific Conference (2016) Detailed reference viewed: 48 (0 UL)![]() ; ; et al in IEEE International Conference on Communications, ICC 2017 (2017, May) Modern cellular networks are complex systems offering a wide range of services and present challenges in detecting anomalous events when they do occur. The networks are engineered for high reliability and ... [more ▼] Modern cellular networks are complex systems offering a wide range of services and present challenges in detecting anomalous events when they do occur. The networks are engineered for high reliability and, hence, the data from these networks is predominantly normal with a small proportion being anomalous. From an operations perspective, it is important to detect these anomalies in a timely manner, to correct vulnerabilities in the network and preclude the occurrence of major failure events. The objective of our work is anomaly detection in cellular networks in near real-time to improve network performance and reliability. We use performance data from a 4G LTE network to develop a methodology for anomaly detection in such networks. Two rigorous prediction models are proposed: a non-parametric approach (Chi-Square test), and a parametric one (Gaussian Mixture Models). These models are trained to detect differences between distributions to classify a target distribution as belonging to a normal period or abnormal period with high accuracy. We discuss the merits between the approaches and show that both provide a more nuanced view of the network than simple thresh- olds of success/failure used by operators in production networks today. [less ▲] Detailed reference viewed: 146 (6 UL)![]() del Sol Mesa, Antonio ![]() in BMC Systems Biology (2013) Detailed reference viewed: 203 (12 UL)![]() ; Ceunen, Erik ![]() in Journal of Clinical Psychology (2011), 67(9), 850-855 Undergraduate students were administered the Test of Memory Malingering (TOMM) and the Structured Inventory of the Malingered Symptomatology (SIMS) and asked to respond honestly, or instructed to feign ... [more ▼] Undergraduate students were administered the Test of Memory Malingering (TOMM) and the Structured Inventory of the Malingered Symptomatology (SIMS) and asked to respond honestly, or instructed to feign cognitive dysfunction due to head injury. Before both instruments were administered, symptom-coached feigners were provided with some information about brain injury, while feigners who received a mix of symptom-coaching and test-coaching were given the same information plus advice on how to defeat symptom validity tests. Results show that, although the accuracy of both instruments appears to be somewhat reduced by a mix of symptom coaching and test coaching, the TOMM and SIMS are relatively resistant to different kinds of coaching. [less ▲] Detailed reference viewed: 304 (1 UL)![]() ; Aouada, Djamila ![]() in IEEE International Conference on Machine Learning and Applications (2015, December) Detailed reference viewed: 282 (6 UL)![]() ![]() Nguyen, Thanh-Phuong ![]() in Proceedings of IEEE International Conference on Bioscience, Biochemistry and Bioinformatics (2011) Detailed reference viewed: 61 (1 UL)![]() Colombo Tosatto, Silvano ![]() ![]() in Cariani, Fabrizio; Grossi, Davide; Meheus, Joke (Eds.) et al Deontic Logic and Normative Systems 12th International Conference, DEON 2014, Ghent, Belgium, July 12-15, 2014. Proceedings (2014) Regulations, through the use of obligations and permissions, are widely used in modern society to define acceptable behaviours. Thus it is indeed important that these regulations do not conflict with each ... [more ▼] Regulations, through the use of obligations and permissions, are widely used in modern society to define acceptable behaviours. Thus it is indeed important that these regulations do not conflict with each other and contain contradicting obligations. In the present paper we focus on identifying conflicts between obligations in dynamic settings. We first show the need of an alternative semantics rather than the more classic modelled by standard deontic logic. Second we introduce a new semantics for the obligations capable of representing and reasoning about them in these dynamic settings, and lastly we use it to identify the necessary and sufficient conditions to identify conflicting obligations. [less ▲] Detailed reference viewed: 153 (2 UL)![]() ![]() Nguyen, Thanh-Phuong ![]() in Artificial Intelligence in Medicine (2012), 54(1), 63--71 Objective Predicting or prioritizing the human genes that cause disease, or “disease genes”, is one of the emerging tasks in biomedicine informatics. Research on network-based approach to this problem is ... [more ▼] Objective Predicting or prioritizing the human genes that cause disease, or “disease genes”, is one of the emerging tasks in biomedicine informatics. Research on network-based approach to this problem is carried out upon the key assumption of “the network-neighbour of a disease gene is likely to cause the same or a similar disease”, and mostly employs data regarding well-known disease genes, using supervised learning methods. This work aims to find an effective method to exploit the disease gene neighbourhood and the integration of several useful omics data sources, which potentially enhance disease gene predictions. Methods We have presented a novel method to effectively predict disease genes by exploiting, in the semi-supervised learning (SSL) scheme, data regarding both disease genes and disease gene neighbours via protein–protein interaction network. Multiple proteomic and genomic data were integrated from six biological databases, including Universal Protein Resource, Interologous Interaction Database, Reactome, Gene Ontology, Pfam, and InterDom, and a gene expression dataset. Results By employing a 10 times stratified 10-fold cross validation, the SSL method performs better than the k-nearest neighbour method and the support vector machines method in terms of sensitivity of 85%, specificity of 79%, precision of 81%, accuracy of 82%, and a balanced F-function of 83%. The other comparative experimental evaluations demonstrate advantages of the proposed method given a small amount of labeled data with accuracy of 78%. We have applied the proposed method to detect 572 putative disease genes, which are biologically validated by some indirect ways. Conclusion Semi-supervised learning improved ability to study disease genes, especially a specific disease when the known disease genes (as labeled data) are very often limited. In addition to the computational improvement, the analysis of predicted disease proteins indicates that the findings are beneficial in deciphering the pathogenic mechanisms. [less ▲] Detailed reference viewed: 111 (3 UL)![]() Sommarribas, Adolfo ![]() Report (2018) The high numbers and mixed flows of migrants entering the EU during the migration crisis in recent years has meant that the effective identification of third-country nationals has become a concern of ... [more ▼] The high numbers and mixed flows of migrants entering the EU during the migration crisis in recent years has meant that the effective identification of third-country nationals has become a concern of increasing importance. One of the main issues around the use of documents to establish identity has been the risk of document fraud. This includes the production and use by third-country nationals of false documents, as well as the use of fraudulently obtained genuine documents (‘FOG’s) in procedures relating to entry and stay in Member States. The examination of documents such as passports and other travel documents are only part of identification procedures; however, given that they may contain biometric information such as facial image and iris data, the role they play in identification is significant. Where third-country nationals are unable to fulfil the criteria for legal entry using legitimate documents and channels, or seek to disguise or assume a different identity, document fraud can open alternative channels to entering Member States. In terms of understanding the scale of and trends in document fraud, according to Frontex’s Risk Analysis Report 2018, Member States reported some 6 700 third-country nationals presenting false documents at the EU / Schengen borders in 2017, and identified this as the lowest number of detections since 2013.1 The decreasing trend at the border, however, contrasts with an increase of 9% in detections within the EU/Schengen area, the second highest number of detections since 2013.2 This Inform aims to establish the current state of play in detecting document fraud perpetrated by third-country nationals intending to enter and stay in the EU Member States and Norway, including in the context of asylum procedures. [less ▲] Detailed reference viewed: 131 (12 UL)![]() ; Schmidt, Thomas ![]() in Physical Review. B (2011), 84 We propose a nanomechanical detection scheme for Majorana bound states, which have been predicted to exist at the edges of a one-dimensional topological superconductor, implemented, for instance, using a ... [more ▼] We propose a nanomechanical detection scheme for Majorana bound states, which have been predicted to exist at the edges of a one-dimensional topological superconductor, implemented, for instance, using a semiconducting wire placed on top of an s-wave superconductor. The detector makes use of an oscillating electrode, which can be realized using a doubly clamped metallic beam, tunnel coupled to one edge of the topological superconductor. We find that a measurement of the nonlinear differential conductance provides the necessary information to uniquely identify Majorana bound states. [less ▲] Detailed reference viewed: 104 (1 UL) |
||