In recent years R has become de facto statistical programming language of choice for statisticians and it is also arguably the most widely used generic environment for analysis of high-throughput genomic data. In this...
详细信息
In recent years R has become de facto statistical programming language of choice for statisticians and it is also arguably the most widely used generic environment for analysis of high-throughput genomic data. In this chapter we discuss some approaches to improve performance of R when working with large SNP datasets. less
Natural selection has molded the evolution of species across all taxa. Much more recently, on an evolutionary scale, human-oriented selection started to play an important role in shaping organisms, markedly so after t...
详细信息
Natural selection has molded the evolution of species across all taxa. Much more recently, on an evolutionary scale, human-oriented selection started to play an important role in shaping organisms, markedly so after the domestication of animals and plants. These selection processes have left traceable marks in the genome. Following from the recent advances in molecular genetics technologies, a number of methods have been developed to detect such signals, termed genomic signatures of selection. In this chapter we discuss a straightforward protocol based on the FST statistic to identify genomic regions that exhibit high variation in allelic frequency between groups, which is a characteristic of genomic regions that have gone through differential selection. How to define the borders of these regions and further explore its genetic content is then discussed. less
Plants accumulate an overwhelming variety of secondary metabolites that play important roles in defense and interaction of the plant with its environment. To investigate the dynamics of plant secondary metabolism, lar...
详细信息
Plants accumulate an overwhelming variety of secondary metabolites that play important roles in defense and interaction of the plant with its environment. To investigate the dynamics of plant secondary metabolism, large-scale untargeted metabolite profiling (metabolomics) is mandatory. Here, we describe a detailed protocol for untargeted metabolite profiling in which methanol extracts of jasmonate-treated plant tissues are analyzed by reversed-phase liquid chromatography coupled to negative-ion electrospray ionization Fourier transform ion cyclotron resonance mass spectrometry (MS). By means of dedicated integration and alignment software, the relative abundance of thousands of mass peaks, corresponding to hundreds of compounds, is calculated, and mass peaks of which the area is significantly changed by jasmonate treatment are identified. Subsequently, the metabolites corresponding to the significantly changed peaks are tentatively annotated using the accurate mass prediction of the Fourier transform-MS and the generated MS/MS data. Via this method, compounds of medium polarity, such as glucosinolates, alkaloids, phenylpropanoids, flavonoids, polyamines, and saponins, can be analyzed. less
Since years, multiple researches studied component-based software development. Nevertheless, most component-based software systems do not use components at implementation stage. We believe that one of the main causes ...
详细信息
Since years, multiple researches studied component-based software development. Nevertheless, most component-based software systems do not use components at implementation stage. We believe that one of the main causes is a lack of support for component-oriented programming (COP). Indeed, most of the proposed component models such as Unified Modeling language (UML), Corba Component Model (CCM), Enterprise Java Beans (EJB) are only available at design time. The fact that implementation relies on object-oriented languages which prevent developers from fully switching to COP. In this paper, we identify five important requirements (decoupling, adaptability, unplanned connections, encapsulation and uniformity) for COP based on an analysis of the state of the art and the limitations of existing work. We propose an extended version of the SCL component language that fulfills these requirements. A prototype of SCL and a concrete experiment validate this proposal. (C) 2011 Elsevier Ltd. All rights reserved.
Confusion between ICT and computer science has lead to an underestimation of the latter in the schools' curricula. Students are involved to use computers rather than to create and produce. Many efforts are done to...
详细信息
ISBN:
(纸本)9781467316781;9781467316798
Confusion between ICT and computer science has lead to an underestimation of the latter in the schools' curricula. Students are involved to use computers rather than to create and produce. Many efforts are done toward inserting computer science in the schools' curricula;However, Computer science should be treated at an equal level with other sciences. The concepts are not more complex than other sciences. Psychologists and pedagogists prove that students are able to learn different concepts according to their intellectual age when these concepts are brought to them with an appropriate methodology.
This paper presents the design of a load management device for the load management of a distribution network in presence of Electric Vehicles (EV). With a projected EV penetration of up to 50% by 2050, the life expect...
详细信息
ISBN:
(纸本)9781467320801;9781467320818
This paper presents the design of a load management device for the load management of a distribution network in presence of Electric Vehicles (EV). With a projected EV penetration of up to 50% by 2050, the life expectancy of already overloaded utility transformers and other network assets needs to be investigated to accommodate large penetration of EV loads. This research work has been done in collaboration with the local utility London Hydro, to create a device that is capable of handling heavy residential loads, and providing network control of loads, such as, EVs to increase better network asset management. Two Atmel microcontroller based hardware boards are used. One hardware board is used to get load information from the utility transformer whereas the other is used to control the EV loads and household appliances. Based on the load information from the transformer, one microcontroller sends control signal to the other controller running on customer premises to switch ON/OFF the EV load or any other appliances thus controlling the load on the network. The main purpose of this device is to automatically reallocate loads in an attempt to prevent damage to overhead residential transformers due to overloading and also offers the capability of reducing consumer energy use. This device when installed in a utility network will reduce cost to the home owner, and will increase network sustainability.
This article looks at the development of the C language from its inception to the present day. The salient features of the language, which are of importance both historically as well as from the point of view of the i...
详细信息
This article looks at the development of the C language from its inception to the present day. The salient features of the language, which are of importance both historically as well as from the point of view of the industry, are brought out. Also, the impact of C as a cross-platform developmental language is highlighted.
This article introduces AUX (AUditory syntaX), a scripting syntax specifically designed to describe auditory signals and processing, to the members of the behavioral research community. The syntax is based on descript...
详细信息
This article introduces AUX (AUditory syntaX), a scripting syntax specifically designed to describe auditory signals and processing, to the members of the behavioral research community. The syntax is based on descriptive function names and intuitive operators suitable for researchers and students without substantial training in programming, who wish to generate and examine sound signals using a written script. In this article, the essence of AUX is discussed and practical examples of AUX scripts specifying various signals are illustrated. Additionally, two accompanying Windows-based programs and development libraries are described. AUX Viewer is a program that generates, visualizes, and plays sounds specified in AUX. AUX Viewer can also be used for class demonstrations or presentations. Another program, Psycon, allows a wide range of sound signals to be used as stimuli in common psychophysical testing paradigms, such as the adaptive procedure, the method of constant stimuli, and the method of adjustment. AUX Library is also provided, so that researchers can develop their own programs utilizing AUX. The philosophical basis of AUX is to separate signal generation from the user interface needed for experiments. AUX scripts are portable and reusable;they can be shared by other researchers, regardless of differences in actual AUX-based programs, and reused for future experiments. In short, the use of AUX can be potentially beneficial to all members of the research community-both those with programming backgrounds and those without.
Teaching cryptography usually requires students to have a comprehensive understanding of algebra, number theory as well as good knowledge in basic computer science. Particularly public-key cryptography is often a chal...
详细信息
ISBN:
(纸本)9781467324274
Teaching cryptography usually requires students to have a comprehensive understanding of algebra, number theory as well as good knowledge in basic computer science. Particularly public-key cryptography is often a challenge to teach and understand without detailed examples and the possibility to implement an algorithm to really see how it works. However, most of the arithmetic appearing in cryptography is not directly supported by the common programming languages, and usually buried within complicated libraries. Software tools that natively support cryptographic operations are rare and most teaching in this area must be done with general purpose software like computer algebra systems. In this work, we report on a newly developed software system called SUNSET, which provides a programming language that natively supports operations within finite fields, rings and modulo groups. It has been explicitly designed for usage within classrooms and for rapid prototyping of cryptographic protocols. Contrary to many computer algebra systems and conventional programming languages, it does not require reference to external libraries or add-on packages, and lets a student implement a cryptographic algorithm in a way almost as it is printed in the papers.
The purpose of this thesis is to propose the plagiarism detection approach aiming at C++ programs for student's assignments. The proposed approach combines three detection methods including structural analysis, va...
详细信息
ISBN:
(纸本)9780769547633;9781467321389
The purpose of this thesis is to propose the plagiarism detection approach aiming at C++ programs for student's assignments. The proposed approach combines three detection methods including structural analysis, variable analysis, and text analysis to construct a CPD (C++ Plagiarism Detection) system. For proving the effectiveness of the proposed approach, the CPD system was compared with other existing systems including one proprietary software and some academic researches. The experimental result showed the CPD system can detect more kinds of plagiarism patterns than other existing systems. Moreover, the combining approach was also compared with every single method. Also, the result proved the proposed approach was strongly avoiding many weaknesses which are inherently possessed in every single method. Finally, object-oriented analysis is presented by a case study.
暂无评论