scholarly journals Binless normalization of Hi-C data provides significant interaction and difference detection independently of resolution

2017 ◽  
Author(s):  
Yannick G. Spill ◽  
David Castillo ◽  
Marc A. Marti-Renom

Abstract3C-like experiments, such as 4C or Hi-C, have been fundamental in understanding genome organization. Thanks to these technologies, it is now known, for example, that Topologically Associating Domains (TADs) and chromatin loops are implicated in the dynamic interplay of gene activation and repression, and their disruption can have dramatic effects on embryonic development. To make their detection easier, scientists have endeavored into deeper sequencing to mechanically increase the chances to detect weaker signals such as chromatin loops. Part of this mindset can be attributed to the limitations of existing software: the analysis of Hi-C experiments is both statistically and computationally demanding. Here, we devise a new way to represent Hi-C data, which leads to a more detailed classification of paired-end reads and, ultimately, to a new normalization and interaction detection method. Unlike any other, Binless is resolution-agnostic, and adapts to the quality and quantity of available data. We demonstrate its capacities to call interactions and differences and make the software freely available.

Cancers ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 2823
Author(s):  
Claudio Luparello

The exposure of cancer cells to cadmium and its compounds is often associated with the development of more malignant phenotypes, thereby contributing to the acceleration of tumor progression. It is known that cadmium is a transcriptional regulator that induces molecular reprogramming, and therefore the study of differentially expressed genes has enabled the identification and classification of molecular signatures inherent in human neoplastic cells upon cadmium exposure as useful biomarkers that are potentially transferable to clinical research. This review recapitulates selected studies that report the detection of cadmium-associated signatures in breast, gastric, colon, liver, lung, and nasopharyngeal tumor cell models, as specifically demonstrated by individual gene or whole genome expression profiling. Where available, the molecular, biochemical, and/or physiological aspects associated with the targeted gene activation or silencing in the discussed cell models are also outlined.


2014 ◽  
Vol 933 ◽  
pp. 82-85
Author(s):  
Shi Feng Wang ◽  
Yi Xiang Yue ◽  
Jin Fang

In this paper, the actual operation of the superconducting motor and electrical parameters, a detailed analysis of the advantages and disadvantages of the existing quench detection method. After that I proposed an innovative detection method - voltage phase difference detection. On this basis, the design phase detection method based on the voltage difference quench detection and protection systems, based on stand-alone test and NI development platform test results, we verify its feasibility of the voltage phase difference detection method, and great superiority.


2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
George Iakovakis ◽  
Constantinos-Giovanni Xarhoulacos ◽  
Konstantinos Giovas ◽  
Dimitris Gritzalis

The COVID-19 outbreak has forced businesses to shift to an unprecedented “work from home” company environment. While this provides advantages for employees and businesses, it also leads to a multitude of shortcomings, most prevalent of which is the emergence of additional security risks. Previous to the outbreak, company computer networks were mainly confined within its facilities. The pandemic has now caused this network to “spread thin,” as the majority of employees work remotely. This has opened up a variety of new vulnerabilities, as workers’ cyber protection is not the same at home as it is in office. Although the effects of the virus are now subsiding, working remotely has embedded itself as the new normal. Thus, it is imperative for company management to take the necessary steps to ensure business continuity and be prepared to deal with an increased number of cyber threats. In our research, we provide a detailed classification for a group of tools which will facilitate risk mitigation and prevention. We also provide a selection of automated tools such as vulnerability scanners, monitoring and logging tools, and antivirus software. We outline each tool using tables, to show useful information such as advantages, disadvantages, scalability, cost, and other characteristics. Additionally, we implement decision trees for each category of tools, in an attempt to assist in navigating the large amount of information presented in this paper. Our objective is to provide a multifaceted taxonomy and analysis of mitigation tools, which will support companies in their endeavor to protect their computer networks. Our contribution can also help companies to have some type of cyber threat intelligence so as to put themselves one step ahead of cyber criminals.


Author(s):  
I.O. Mikulionok

The basic data on the volume of production of pneumatic tires in the world and in Ukraine are presented. The need to improve the ways of handling pneumatic tires that have lost their con-sumer properties (worn out tires as a result of their intended use and tires rejected as a result of passing quality control during their manufacture) is shown as one of the most dangerous for the environment and promising in terms of using their properties. A detailed classification of methods for handling worn out and defective tires is proposed and a critical analysis of each of them is given. Particular attention is paid to the methods of utilization of tires, in particular, recycling, which makes it possible to efficiently use the secondary raw materials obtained from tires directly for their intended purpose. The features of physical, physicochemical and chemical processing methods, in particular combustion, gasification, pyrolysis of tires and their frag-ments, as well as the prospects for their decomposition under the influence of environmental factors, in particular microorganisms, are also considered. The main ways of solving the prob-lem of tires that have lost their consumer properties in Ukraine are proposed. Bibl. 88, Fig. 2.


2003 ◽  
Vol 15 (3) ◽  
pp. 278-285
Author(s):  
Daigo Misaki ◽  
◽  
Shigeru Aomura ◽  
Noriyuki Aoyama

We discuss effective pattern recognition for contour images by hierarchical feature extraction. When pattern recognition is done for an unlimited object, it is effective to see the object in a perspective manner at the beginning and next to see in detail. General features are used for rough classification and local features are used for a more detailed classification. D-P matching is applied for classification of a typical contour image of individual class, which contains selected points called ""landmark""s, and rough classification is done. Features between these landmarks are analyzed and used as input data of neural networks for more detailed classification. We apply this to an illustrated referenced book of insects in which much information is classified hierarchically to verify the proposed method. By introducing landmarks, a neural network can be used effectively for pattern recognition of contour images.


PEDIATRICS ◽  
1971 ◽  
Vol 47 (6) ◽  
pp. 1103-1104
Author(s):  
David S. Walton

The authors begin their presentation–in this, the first textbook I know of devoted entirely to pediatric glaucomas–with a detailed classification of glaucomas in childhood. This is followed by a discussion of diagnostic techniques and the important clinical signs encountered in the pediatric glaucomas. A description of the conditions assoiated with childhood glaucomas follows, including a concise review of their distinguishing ocular features, with additional comments on treatment. The final section deals with methods of treatment; appropriate emphasis is given to the operative techniques used in performing a goniotomy.


1981 ◽  
Vol 33 (5) ◽  
pp. 1097-1110 ◽  
Author(s):  
A. T. Huckleberry ◽  
E. L. Livorni

Throughout this paper a surface is a 2-dimensional (not necessarily compact) complex manifold. A surface X is homogeneous if a complex Lie group G of holomorphic transformations acts holomorphically and transitively on it. Concisely, X is homogeneous if it can be identified with the left coset space G/H, where if is a closed complex Lie subgroup of G. We emphasize that the assumption that G is a complex Lie group is an essential part of the definition. For example, the 2-dimensional ball B2 is certainly “homogeneous” in the sense that its automorphism group acts transitively. But it is impossible to realize B2 as a homogeneous space in the above sense. The purpose of this paper is to give a detailed classification of the homogeneous surfaces. We give explicit descriptions of all possibilities.


Author(s):  
Nils Braakmann ◽  
Joachim Wagner

SummaryWe use unique rich data for German manufacturing enterprises to investigate the product diversification - firm performance relationship.We find that an increase in the degree of product diversification has a negative impact on profitability when observed and unobserved firm characteristics are controlled for. The effects are statistically significant and large from an economic point of view. This helps to understand the fact that nearly 40 percent of all enterprises with at least 20 employees are single-product firms according to a detailed classification of products, and that multi-product enterprises with a large number of goods are a rare species.


Sign in / Sign up

Export Citation Format

Share Document