Optimal computer memory allocation for the Poisson flows

2008 ◽  
Vol 69 (9) ◽  
pp. 1510-1516 ◽  
Author(s):  
V. V. Mazalov ◽  
M. Tamaki ◽  
S. V. Vinnichenko
2018 ◽  
Author(s):  
Nicola Asuni ◽  
Steven Wilder

AbstractHuman genetic variants are usually represented by four values with variable length: chromosome, position, reference and alternate alleles. There is no guarantee that these components are represented in a consistent way across different data sources, and processing variant-based data can be inefficient because four different comparison operations are needed for each variant, three of which are string comparisons. Existing variant identifiers do not typically represent every possible variant we may be interested in, nor they are directly reversible. Similarly, genomic regions are typically represented inconsistently by three or four values. Working with strings, in contrast to numbers, poses extra challenges on computer memory allocation and data-representation. To overcome these limitations, a novel reversible numerical encoding schema for human genetic variants (VariantKey) and genomics regions (RegionKey), is presented here alongside a multi-language open-source software implementation (https://github.com/Genomicsplc/variantkey). VariantKey and RegionKey represents variants and regions as single 64 bit numeric entities, while preserving the ability to be searched and sorted by chromosome and position. The individual components of short variants can be directly read back from the VariantKey, while long variants are supported with a fast lookup table.


2018 ◽  
Author(s):  
Mark Y. Fang ◽  
Sebastian Markmiller ◽  
William E. Dowdle ◽  
Anthony Q. Vu ◽  
Paul J. Bushway ◽  
...  

ABSTRACTHuman genetic variants are usually represented by four values with variable length: chromosome, position, reference and alternate alleles. Thereis no guarantee that these components are represented in a consistent way across different data sources, and processing variant-based data can be inefficient because four different comparison operations are needed for each variant, three of which are string comparisons. Working with strings, in contrast to numbers, poses extra challenges on computer memory allocation and data-representation. Existing variant identifiers do not typicallyrepresent every possible variant we may be interested in, nor they are directly reversible. To overcome these limitations, VariantKey, a novel reversible numerical encoding schema for human genetic variants, is presented here alongside a multi-language open-source software implementation (http://github.com/genomicspls/variantkey). VariantKey represents variants as single 64 bit numeric entities, while preserving the ability to be searched and sorted by chromosome and position. The individual components of short variants can be directly read back from the VariantKey, while long variants are supported with a fast lookup table.Highlights~100 compounds identified by high-content screen inhibit SGs in HEK293, NPCs and iPS-MNs.ALS-associated RBPs are recruited to SGs in an RNA-dependent mannerMolecules with planar moieties prevent recruitment of ALS-associated RBPs to SGsCompounds inhibit TDP-43 accumulation in SGs and in TARDBP mutant iPS-MNs.


1985 ◽  
Vol 12 (1) ◽  
pp. 107-115 ◽  
Author(s):  
Reuven R. Levary ◽  
William D. Edwards

Author(s):  
Richard Mcintosh ◽  
David Mastronarde ◽  
Kent McDonald ◽  
Rubai Ding

Microtubules (MTs) are cytoplasmic polymers whose dynamics have an influence on cell shape and motility. MTs influence cell behavior both through their growth and disassembly and through the binding of enzymes to their surfaces. In either case, the positions of the MTs change over time as cells grow and develop. We are working on methods to determine where MTs are at different times during either the cell cycle or a morphogenetic event, using thin and thick sections for electron microscopy and computer graphics to model MT distributions.One approach is to track MTs through serial thin sections cut transverse to the MT axis. This work uses a video camera to digitize electron micrographs of cross sections through a MT system and create image files in computer memory. These are aligned and corrected for relative distortions by using the positions of 8 - 10 MTs on adjacent sections to define a general linear transformation that will align and warp adjacent images to an optimum fit. Two hundred MT images are then used to calculate an “average MT”, and this is cross-correlated with each micrograph in the serial set to locate points likely to correspond to MT centers. This set of points is refined through a discriminate analysis that explores each cross correlogram in the neighborhood of every point with a high correlation score.


Author(s):  
Joseph F. Boudreau ◽  
Eric S. Swanson

While there is no such thing as a “typical” C++ class, several common syntactical constructs lend themselves to extremely widespread use and must be mastered by C++ programmers. To motivate the discussion of software design at the level of the C++ class, examples from computer science and optics are introduced. Important syntactical elements such as constructors, destructors, copy constructors, assignment operators, cast operators, and const qualifiers, together with function overloading, operator overloading, and dynamic memory allocation are discussed. These concepts, illustrated with examples from physics, are presented and explained. Further examples from optical and quantum mechanical problems are left to the exercises. This chapter and its exercises gives the reader sufficient information to begin developing his or her own classes and to experiment with class design through trial and error.


1992 ◽  
Vol 2 (1) ◽  
pp. 3-26 ◽  
Author(s):  
Mark Lehner

From 1979 to 1983 the American Research Center in Egypt carried out an architectural, archaeological and geo-archaeological study of the Giza Sphinx. Photogrammetry and conventional surveying techniques were used to prepare detailed plans and front and side elevations of the monument. These have made it possible to construct a computer model of the current condition of the Sphinx, and its hypothesized condition in ancient times, both as originally carved in the 4th Dynasty, and as remodelled and renovated during the 18th Dynasty. Careful analysis of surviving detached fragments of the Sphinx allowed details of beard and uraeus to be included in the reconstruction. This process of creating a computer model of the Sphinx is akin to sculpting the statue again in computer memory.


Sign in / Sign up

Export Citation Format

Share Document