scholarly journals Devil in the details: Mechanistic variations impact information transfer across models of transcriptional cascades

PLoS ONE ◽  
2021 ◽  
Vol 16 (1) ◽  
pp. e0245094
Author(s):  
Michael A. Rowland ◽  
Kevin R. Pilkiewicz ◽  
Michael L. Mayo

The transcriptional network determines a cell’s internal state by regulating protein expression in response to changes in the local environment. Due to the interconnected nature of this network, information encoded in the abundance of various proteins will often propagate across chains of noisy intermediate signaling events. The data-processing inequality (DPI) leads us to expect that this intracellular game of “telephone” should degrade this type of signal, with longer chains losing successively more information to noise. However, a previous modeling effort predicted that because the steps of these signaling cascades do not truly represent independent stages of data processing, the limits of the DPI could seemingly be surpassed, and the amount of transmitted information could actually increase with chain length. What that work did not examine was whether this regime of growing information transmission was attainable by a signaling system constrained by the mechanistic details of more complex protein-binding kinetics. Here we address this knowledge gap through the lens of information theory by examining a model that explicitly accounts for the binding of each transcription factor to DNA. We analyze this model by comparing stochastic simulations of the fully nonlinear kinetics to simulations constrained by the linear response approximations that displayed a regime of growing information. Our simulations show that even when molecular binding is considered, there remains a regime wherein the transmitted information can grow with cascade length, but ends after a critical number of links determined by the kinetic parameter values. This inflection point marks where correlations decay in response to an oversaturation of binding sites, screening informative transcription factor fluctuations from further propagation down the chain where they eventually become indistinguishable from the surrounding levels of noise.

2008 ◽  
Vol 5 (suppl_1) ◽  
Author(s):  
Didier Gonze ◽  
Michel Jacquet ◽  
Albert Goldbeter

Stress induces oscillatory nucleocytoplasmic shuttling of the transcription factor Msn2 in yeast. The subcellular localization of Msn2 is controlled by the cAMP-dependent protein kinase, PKA. Recent experimental observations corroborated by a deterministic computational model for the cAMP–PKA pathway in yeast suggest that the oscillatory dynamics of Msn2 results from the periodic activation of PKA associated with stress-induced oscillations in the level of cAMP. The model accounts for the occurrence of oscillations of Msn2 in a window bounded by two critical values of the stress intensity. In contrast to the rather irregular oscillatory behaviour observed within single yeast cells by means of fluorescence measurements, the deterministic model can only produce a regular pattern of oscillations. To investigate whether the experimentally observed variability could be explained by molecular noise due to the small number of molecules involved in the oscillatory mechanism, we examine a stochastic version of the model for periodic nucleocytoplasmic shuttling of Msn2 coupled to oscillations in the cAMP–PKA pathway. The results of stochastic simulations compare well to the irregular oscillations observed experimentally in the nucleocytoplasmic shuttling of Msn2 in individual yeast cells. The stochastic model retains the property of oscillations within a range bounded by two critical values of stress intensity. We determine the dynamic behaviour as a function of this control parameter and show that the effect of noise markedly depends on the distance from the bifurcation points in the domain of oscillatory behaviour. Finally, we assess the role played by thresholds due to zero-order ultrasensitivity in phosphorylation–dephosphorylation cycles, both in the cAMP–PKA pathway and in the reactions controlling nucleocytoplasmic shuttling of Msn2. In regard to these thresholds, stochastic simulations show that large-amplitude variations of Msn2 associated with large-amplitude oscillations in cAMP can occur outside the domain of sustained oscillations predicted by the deterministic approach.


2013 ◽  
Vol 756-759 ◽  
pp. 791-795
Author(s):  
Ling Jia

The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.


2020 ◽  
Vol 32 (6) ◽  
pp. 111-126
Author(s):  
Pavel Vladimirovich Zakalkin ◽  
Sergei Aleksandrovich Ivanov ◽  
Elena Valer’evna Vershennik ◽  
Aleksandr Vladimirovich Kir’yanov

The processes of globalization, the emergence and active development of cyberspace have led to the need to protect information transmitted in the framework of information exchange. Existing approaches to information protection, in particular its encryption, steganography, etc. from the point of view of information exchange have a number of unmasking features that, despite the undoubted reliability of these approaches, significantly reduce the secrecy of information transmission. The proposed article considers an approach that allows for the hidden transmission of protected information over open communication channels, by masking the transmitted information. The development of the proposed approach was carried out in stages. at the first stage, a method for masking the transmitted information was developed and patented. At the next stage, on the basis of the developed method, a functional model of client and server applications of the hidden information transmission complex is created. The transfer of masked information is proposed to be carried out using the developed protocol of hidden information transfer. The block diagram of the package of the proposed Protocol for transmitting hidden information, the implementation and use of the Protocol at the application level are presented in this paper. At the final stage, a software implementation of the proposed approach was developed and modeling of information exchange at different offset Windows was performed. the paper presents a functional model of the developed complex, a scheme of interaction of functional modules, and a block diagram of the proposed approach to masking the transmitted information. Increasing the secrecy of information transmission is provided by the procedure for converting a carrier message into a marker message by forming an offset window, as well as using an array of digital records to select the carrier message. The proposed approach allows you to use a smaller carrier message when increasing the window size and using a sliding window depending on the size of the information message, you can choose the optimal size of the carrier message and the offset window.


2020 ◽  
Vol 30 (2) ◽  
pp. 32-41
Author(s):  
D. A. Palguev ◽  
A. N. Shentyabin

The use of network structures in information systems allows for single-level tertiary processing of radar information. This feature makes it possible to significantly reduce the time of delivery of information from sources to consumers, as well as rigorously determine mathematically the probability of combining information during tertiary processing in network structures. The article contains mathematical expressions for assessing the probability of combining information during tertiary processing from incoherent spatially separated sources. Determining the size of the strobe for accurate selection by the given probability of combining information using the tertiary network processing algorithm allows reducing the number of calculations in the subsequent pairwise comparison of messages due to the reduction of the size of the strobe. Such an approach creates the conditions for building a cognitive model of radar data processing in modern information systems. The reduction of data processing intervals in an information system increases the accuracy and reliability of information transmitted to consumers. The resulting mathematical expressions can be used to assess the reliability of the information in mathematical models of network information systems.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Jing Chang ◽  
Jian Huang ◽  
Ying Hu

In the context of the popularization and diversified application of information technology in higher education, efficient information dissemination has a significant impact on the learning effect of the learning community. Improving the efficiency of information dissemination and driving the force of learning to enhance the learning effect are the hot issues in the field of higher education data analysis. This paper proposes a new method of feature fusion using information entropy and ReliefF algorithm, applies the improved PageRank algorithm and K-means algorithm to optimize the information transfer mode, and finally develops a new and efficient network information model. The comparative test results show that the new model can complete the dissemination of the same amount of information with a smaller delivery ratio. The research results can play an advantageous role in information interaction feedback, curriculum quality analysis, and teaching information transmission.


2019 ◽  
Vol 62 (11) ◽  
pp. 1695-1705
Author(s):  
R Vijayarajan ◽  
P Gnanasivam ◽  
R Avudaiammal

Abstract In the era of multimedia technologies and rapidly growing multimedia contents, secured information transfer needs to be ensured through robust cryptography techniques. This paper presents a bio-key-generation scheme in the local environment to transfer multimedia content over vulnerable networks. To encrypt the images, one user has to ensure his/her authentication and further needs to provide a secret key for bio-key generation. Secret key aids to fetch biometric features for key formation and key expansion. Thus, the user receives an expanded key from the template database to perform encryption of a plain image. Once the cipher image is delivered to the network, the user has to repeat the same steps for decryption. This paper experiments the proposed bio-key-generation scheme with advanced encryption standard algorithm. This encryption strategy can also be used to encrypt confidential or personal images in various digital systems such as mobile phones, personal digital gadgets and so on. Various analyses ensure the robustness and the performance of the bio-key-based AES encryption scheme. Entropy, correlation coefficient, number of pixel change rate and unified average changing intensity are evaluated to ensure the effectiveness of the proposed method over other key-based encryption techniques.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
B. Moura ◽  
J. Menezes

AbstractThe spatial segregation of species is fundamental to ecosystem formation and stability. Behavioural strategies may determine where species are located and how their interactions change the local environment arrangement. In response to stimuli in the environment, individuals may move in a specific direction instead of walking randomly. This behaviour can be innate or learned from experience, and allow the individuals to conquer or the maintain territory, foraging or taking refuge. We study a generalisation of the spatial rock-paper-scissors model where individuals of one out of the species may perform directional movement tactics. Running a series of stochastic simulations, we investigate the effects of the behavioural tactics on the spatial pattern formation and the maintenance of the species diversity. We also explore a more realistic scenario, where not all individuals are conditioned to perform the behavioural strategy or have different levels of neighbourhood perception. Our outcomes show that self-preservation behaviour is more profitable in terms of territorial dominance, with the best result being achieved when all individuals are conditioned and have a long-range vicinity perception. On the other hand, invading is more advantageous if part of individuals is conditioned and if they have short-range neighbourhood perception. Finally, our findings reveal that the self-defence strategy is the least jeopardising to biodiversity which can help biologists to understand population dynamics in a setting where individuals may move strategically.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Mingxi Cheng ◽  
Chenzhong Yin ◽  
Shahin Nazarian ◽  
Paul Bogdan

AbstractThe global rise of COVID-19 health risk has triggered the related misinformation infodemic. We present the first analysis of COVID-19 misinformation networks and determine few of its implications. Firstly, we analyze the spread trends of COVID-19 misinformation and discover that the COVID-19 misinformation statistics are well fitted by a log-normal distribution. Secondly, we form misinformation networks by taking individual misinformation as a node and similarity between misinformation nodes as links, and we decipher the laws of COVID-19 misinformation network evolution: (1) We discover that misinformation evolves to optimize the network information transfer over time with the sacrifice of robustness. (2) We demonstrate the co-existence of fit get richer and rich get richer phenomena in misinformation networks. (3) We show that a misinformation network evolution with node deletion mechanism captures well the public attention shift on social media. Lastly, we present a network science inspired deep learning framework to accurately predict which Twitter posts are likely to become central nodes (i.e., high centrality) in a misinformation network from only one sentence without the need to know the whole network topology. With the network analysis and the central node prediction, we propose that if we correctly suppress certain central nodes in the misinformation network, the information transfer of network would be severely impacted.


2020 ◽  
pp. 335-346
Author(s):  
Vyacheslav Efimov ◽  
Igor Kotenko ◽  
Igor Saenko

A technique of network packet classification on the application layer is proposed. It is based on fuzzy data processing and artificial neural networks to define the network packet belongingness to one of the known network protocols. In the suggested technique, two main data processing stages are distinguished. At the first stage data is preprocessed by fuzzy logic methods. At the second stage the packets are classified by means of an artificial neural network. An artificial neural network having the proposed architecture allows one to determine the following aspects: the type of secure network protocol, the internal state of the network protocol based on the application of logical decision rules, and the type of network application using the identified protocol. The architecture of the bench environment for field tests is considered. During the experiments, the traffic of real network applications that are used around the world was used. Experimental assessment of the offered technique showed rather high quality and work speed of the developed classifier.


Sign in / Sign up

Export Citation Format

Share Document