ANALYSIS OF A CIRCULAR CODE MODEL

Size: px
Start display at page:

Download "ANALYSIS OF A CIRCULAR CODE MODEL"

Transcription

1 ANALYSIS OF A CIRCULAR CODE MODEL Jérôme Lacan and Chrstan J. Mchel * Laboratore d Informatque de Franche-Comté UNIVERSITE DE FRANCHE-COMTE IUT de Belfort-Montbélard 4 Place Tharradn - BP Montbélard Cedex, France Tel.: () Emal: jerome.lacan@pu-pm.unv-fcomte.fr * Equpe de Bologe Théorque UNIVERSITE LOUIS PASTEUR STRASBOURG Pôle API Boulevard Sébasten Brant 674 ILLKIRCH - STRASBOURG, FRANCE Tel.: () Emal: mchel@dpt-nfo.u-strasbg.fr * Correspondng author - -

2 ABSTRACT A crcular code has been dentfed n the proten (codng) genes of both eukaryotes and prokaryotes by usng a statstcal method called Trnucleotde Frequency method (TF method) [Arquès & Mchel, (996) J. Theor. Bol. 8, 45-58]. Recently, a probablstc model based on the nucleotde frequences wth a hypothess of absence of correlaton between successve bases on a DNA strand, has been proposed by Koch & Lehmann [(997) J. Theor. Bol. 89, 7-74] for constructng some partcular crcular codes. Ther nterestng method whch we call here Nucleotde Frequency method (NF method), reveals several lmts for constructng the crcular code observed wth proten genes. - -

3 INTRODUCTION Ths secton s dvded nto parts. The frst part summarzes the results of the crcular code ( X ) dentfed n the proten genes of both eukaryotes and prokaryotes. The second part recalls the probablstc model of Koch & Lehmann (997) based on the Nucleotde Frequency method (NF method).. The crcular code X The concept of code "wthout commas" ntroduced by Crck et al. (957) for the proten (codng) genes, s a code readable n only one out of three frames. Such a theoretcal code wthout commas, called crcular code n theory of codes (e.g. Béal, 99; Berstel & Perrn, 985), s a partcular set X of trnucleotdes so that a concatenaton (a seres) of trnucleotdes of X, leads to sequences whch cannot be decomposed n another frame wth a concatenaton of trnucleotdes of X. For example, suppose that X s the followng set of trnucleotdes: X={AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG, GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC}. Some trnucleotdes of X are randomly concatenated, for example as follows: CAG,GCC,TTC,AAT,ACC,ACC,CAG,GAA,GAG,GTA,ATT,ACC,AAT,GTA,AAC,TAC,TTC,ACC,ATC The commas between the trnucleotdes show the frame of constructon (readng frame n bology). Suppose now that the commas are lost leadng to the sequence: CAGGCCTTCAATACCACCCAGGAAGAGGTAATTACCAATGTAAACTACTTCACCATC The problem s to retreve the orgnal frame of constructon. There are obvous possbltes: C,AGG,CCT,TCA,ATA,CCA,CCC,AGG,AAG,AGG,TAA,TTA,CCA,ATG,TAA,ACT,ACT,TCA,CCA,TC CA,GGC,CTT,CAA,TAC,CAC,CCA,GGA,AGA,GGT,AAT,TAC,CAA,TGT,AAA,CTA,CTT,CAC,CAT,C CAG,GCC,TTC,AAT,ACC,ACC,CAG,GAA,GAG,GTA,ATT,ACC,AAT,GTA,AAC,TAC,TTC,ACC,ATC If the set X of trnucleotdes s a crcular code, then there s an unque soluton: CAG,GCC,TTC,AAT,ACC,ACC,CAG,GAA,GAG,GTA,ATT,ACC,AAT,GTA,AAC,TAC,TTC,ACC,ATC Ths unque soluton s obtaned by choosng a wndow (suffcently large) n any poston n the sequence and then, to verfy the belongng of the trnucleotdes of the wndow to X: CAGGCCTTCAATACCACCCAGGAAG AGG,TAATTACCAATGTAAACTACTTCACCATC CAGGCCTTCAATACCACCCAGGAAG A,GGT,AAT,TAC,CAA,TGTAAACTACTTCACCATC CAGGCCTTCAATACCACCCAGGAAG AG,GTA,ATT,ACC,AAT,GTA,AAC,TAC,TTC,ACC,ATC, The frst decomposton proposed s rejected mmedately as the frst trnucleotdes AGG n the wndow does not belong to X. The second decomposton proposed s rejected wth a wndow of nucleotdes. Indeed, the frst nucleotde A n the wndow may belong to several trnucleotdes of X, e.g. GTA. The trnucleotdes GGT, AAT and TAC followng A belong to X. The next trnucleotde CAA does not belong to X as the th nucleotde A (from the begnnng of the wndow) dffers from the unque possblty G of CAG belongng to X. The thrd decomposton s the orgnal one as all the trnucleotdes n the wndow belong to X. The orgnal decomposton of the sequence s automatcally deduced. Such a code was proposed by Crck et al. (957) n order to explan how the readng of a seres of nucleotdes n the proten genes could code for the amno acds consttutng the protens. The problems stressed were: why are there more trnucleotdes than amno acds and how to choose the readng frame? Crck et al. (957) have then proposed that only among 64 trnucleotdes code for the amno acds. - -

4 However, the determnaton of a set of trnucleotdes formng a crcular code X depends on a great number of constrants: () A trnucleotde wth dentcal nucleotdes (AAA, CCC, GGG or TTT) must be excluded from such a code. Indeed, the concatenaton of AAA wth tself does not allow to retreve the readng (orgnal) frame as there are possble decompostons:...aaa,aaa,aaa,...,...a,aaa,aaa,aa... and...aa,aaa,aaa,a... () Two trnucleotdes related to crcular permutaton, e.g. ATC and TCA, must be excluded from such a code. Indeed, the concatenaton of ATC wth tself does not allow the retreval of the readng (orgnal) frame as there are possble decompostons: ATC,ATC,ATC, and A,TCA,TCA,TC Therefore, by excludng AAA, CCC, GGG and TTT and by gatherng the 6 remanng trnucleotdes n classes of trnucleotdes so that, n each class, the trnucleotdes are deduced from each other by crcular permutatons, e.g. ATC, TCA and CAT, a crcular code has only one trnucleotde per class and therefore contans at most trnucleotdes (maxmal crcular code). Ths trnucleotde number s dentcal to the amno acd number leadng to a crcular code assgnng one trnucleotde per amno acd. No set of trnucleotdes leadng to a crcular code has been found at ths tme. Furthermore, the dscoveres that the trnucleotde TTT, an "excluded" trnucleotde n the concept of crcular code, codes for phenylalanne (Nrenberg & Matthae, 96) and that the proten genes are placed n the readng frame wth a partcular trnucleotde, namely the start trnucleotde ATG, have led to gve up the concept of crcular code on the alphabet {A,C,G,T}. For several bologcal reasons, n partcular the nteracton between mrna and trna, the concept of crcular code s resumed later on the alphabet {R,Y} (R=purne=A or G, Y=pyrmdne=C or T) wth trnucleotde models for the prmtve proten genes: RRY (Crck et al., 976) and RNY (N=R or Y) (Egen & Schuster, 978). Unexpectedly, a maxmal crcular code has recently been dentfed n the proten genes of both eukaryotes and prokaryotes on the alphabet {A,C,G,T} (Arquès & Mchel, 996). Ths crcular code has been obtaned by methods: () by computng the occurrence frequences of the 64 trnucleotdes AAA,...,TTT n the frames of proten genes and then, by assgnng each trnucleotde to the frame assocated wth ts hghest frequency (Arquès & Mchel, 996). Ths Trnucleotde Frequency method s called TF method. () by computng the 88 ( 64 ) autocorrelaton functons analysng the probablty that a trnucleotde n any frame occurs any bases N after a trnucleotde n a gven frame of proten genes and then, by classfyng these autocorrelaton functons accordng to ther modulo perodcty for deducng a frame for each trnucleotde (Arquès & Mchel, 997a). The maxmal crcular code dentfed s the set X = {AAC,AAT,ACC,ATC,ATT,CAG,CTC,CTG,GAA,GAC, GAG,GAT,GCC,GGC,GGT,GTA,GTC,GTT,TAC,TTC} of trnucleotdes n frame of proten genes (readng frame). Furthermore, the sets X of trnucleotdes dentfed n the frames and respectvely (frames and beng the frame shfted by and nucleotdes respectvely n the 5'-' drecton) by these methods, are also maxmal crcular codes (Table a). These crcular codes have several mportant propertes: () crcularty: X generates X by one crcular permutaton by another crcular permutaton ( and crcular permutatons of each trnucleotde of X lead to the trnucleotdes of X respectvely) (Table b)

5 () complementarty: X s self-complementary ( trnucleotdes of X are complementary to the other trnucleotdes of X ) and, X are complementary to each other (the trnucleotdes of X are complementary to the trnucleotdes of X ) (Table c). Note that ths property s also verfed wth = { } and, T = X { CCC} and T X { GGG} T X AAA,TTT = (Table c). () rarty: the occurrence probablty of X s equal to 6-8. As there are classes of trnucleotdes (see above), the number of potental crcular codes s = The computed number of complementary crcular codes wth shfted crcular codes (called C codes), such as X, s 6. Therefore, ts probablty s 6/ =6-8. (v) flexblty: - the lengths of the mnmal wndows to retreve automatcally the frames, and wth the crcular codes X, X respectvely, are all equal to nucleotdes and represent the largest wndow length among the 6 C codes. - the frequency of msplaced trnucleotdes n the shfted frames s equal to 4.6%. If the trnucleotdes of X are randomly concatenated, for example as follows: GAA,GAG,GTA,GTA,ACC,AAT,GTA,CTC,TAC,TTC,ACC,ATC then, the trnucleotdes n frame : G,AAG,AGG,TAG,TAA,CCA,ATG,TAC,TCT,ACT,TCA,CCA,TC and the trnucleotdes n frame : GA,AGA,GGT,AGT,AAC,CAA,TGT,ACT,CTA,CTT,CAC,CAT,C manly belong to X respectvely. A few trnucleotdes are msplaced n the shfted frames. Wth ths example, n frame, 9 trnucleotdes belong to X, trnucleotde (TAC) to X and trnucleotde (TAA) to X. In frame, 8 trnucleotdes belong to X, trnucleotdes (GGT, AAC) to X and trnucleotde (ACT) to X. By computng exactly, the average frequences of msplaced trnucleotdes n frame are.9 % for X and.7 % for X. In frame, the average frequences of msplaced trnucleotdes are.9 % for X and.7 % for X. The complementarty property explans on the one hand that the frequency equalty of X n frames and and on the other hand, the frequency equalty of X n frame n frame. The sum of percentages of msplaced trnucleotdes n frame ( X ) s equal to the sum of percentages of msplaced trnucleotdes n frame ( X ) and s equal to 4.6 %. Ths value s close to the hghest frequency (7.9 %) of msplaced trnucleotdes among the 6 C codes. - the 4 types of nucleotdes occur n the trnucleotde stes wth the crcular codes X, X (Table a). (v) evolutonary: an evolutonary analytcal model at parameters (p,q,t) based on an ndependent mxng of the trnucleotdes of X wth equprobablty (/) followed by t 4 substtutons per trnucleotde accordng to the proportons p., q. and r=-p-q.8 n the trnucleotde stes respectvely, retreves the frequences of X, X observed n the frames of proten genes. The proof that X, X are crcular codes, the detaled explanaton of the propertes (-v) and the dfferent bologcal consequences, n partcular on the -letter genetc alphabets, the genetc code and the amno acd frequences n protens, are gven n Arquès & Mchel (996, 997a). The property (v) s - 5 -

6 descrbed n Arquès et al. (998, 999). Note: a non-complementary crcular code has recently been dentfed n the mtochondral proten genes (Arquès & Mchel, 997b).. The Nucleotde Frequency method (NF method) Koch & Lehmann (997, p. 7) have recently suggested that the self-complementary crcular code X obseved n proten genes could be explaned by a method for generatng crcular codes from nucleotde frequences. Ths method called here Nucleotde Frequency method (NF method), s brefly recalled by keepng the same notatons. Let p( θ) be the occurrence probablty of a gven base { } θ A,C,G,T at poston { },, n a trnucleotde (trplet) observed n a DNA strand read n frame. By supposng that there s no correlaton between successve bases on a DNA strand, the probablty of fndng the trplet αβγ n the frame s gven by the probabltes product p( α)p( β)p( γ) (ndependent probabltes). The belongng of the trplet αβγ to a preferental set Y of trplets n frame s then equvalent to the followng probablty nequaltes p( α)p()p() β γ > p()p( γ α)p() β () and p( α)p()p() β γ > p()p()p( β γ α) () Smlar probablty nequaltes mply that the trplet βγα (resp. γαβ ) belongs to the preferental set Y (resp. Y ) of trplets n frame (resp. ). Koch & Lehmann (997, p. 7) prove that a preferental set generated from any set of probabltes p( θ) wth ths method, s a crcular code. Koch & Lehmann (997, p. 7) also show that, f the probabltes p( θ) verfy the relaton p( θ ) = p(c( θ)) and p() θ = p(c()) θ () where C( θ) denote the complementary base of θ, then the crcular code Y s necessarly selfcomplementary and the permutated crcular codes Y and Y are complementary (called Arquès & Mchel, 996). C codes n The Table n Koch & Lehmann (997) gves the nucleotde observed frequences p( θ) of a base θ { A,C,G,T } at poston { },, of the readng frame for the prokaryotes. These data have been obtaned from the 44th release of the prokaryotc EMBL database. Ths Table s recalled n ths paper wth the Table a. These probabltes wth the NF method lead to a new crcular code Y ={AAT, AAC, ATT, ATC, ACT, CAC, CTT, CTC, GAA, GAT, GAC, GAG, GTA, GTT, GTC, GTG, GCA, GCT, GCC, GCG}. Ths code Y contans trnucleotdes of the code X (Table a)

7 METHOD AND RESULTS. The Nucleotde Frequency method (NF method) cannot generate the crcular code X.. The NF method does not generate an unque self-complementary crcular code from the observed probabltes The approach of Koch & Lehmann (997) tres to lnk the self-complementary code X and the NF method. However, the code Y obtaned by the NF method from the observed probabltes p( θ) of a base θ { A,C,G,T } at poston { },, of the readng frame for the prokaryotes s not self-complementary as, for example, ACT Y but C(ACT) = AGT Y. So, ths secton s devoted to obtan a self-complementary crcular code wth the NF method from probabltes closed to the observed ones. If the probabltes p( θ) verfy the relaton (), then the crcular code computed by the NF method s a self-complementary code. However, the relaton () whch contans 6 probablty equaltes, cannot be easly used wth observed probabltes. Koch & Lehmann (997, p. 7) have mentoned that the probabltes p( θ) n Table a do not precsely verfy the relaton () and then, no self-complementary crcular code has been proposed. Furthermore, the NF method generates several self-complementary crcular codes f the probabltes of Table a are slghtly modfed for verfyng the relaton (). Three examples of such self-complementary crcular codes are presented n Table b. The frst crcular code s obtaned wth observed frequences from the frst and second columns of Table a: p (A) = p (T) =.76, p(c) = p(g) =.4, p(g) = p(c) =.54, p (T) = p (A) =.66, = = p (A) p (T).85 and = = ( ) p(c) p(g).85. The second crcular code s obtaned wth observed frequences from the second and thrd columns of Table a: p (A) = p (T) =.68, p(c) = p(g) =.4, p(g) = p(c) =.68, p (T) = p (A) =., p (A) p (T).85 and = = ( ) = = p(c) p(g).85. The thrd crcular code s obtaned wth average frequences from Table a: ( ) p (C) = p (G) = (.4 +.4) =., ( ) p (T) = p (A) = (.66 +.) =.94, = = ( + ) = p (C) = p (G) = (.8 +.7) =.. p (A) = p (T) = =.7, p (G) = p (C) = =., p (A) p (T) and In summary, the NF method s not well adapted to reveal an unque self-complementary crcular code. Furthermore, we shall prove n the next secton that the NF method cannot generate the self-complementary crcular code X whch has been dentfed n the proten genes of both eukaryotes and prokaryotes (Arquès & Mchel, 996)

8 .. Proof that the NF method cannot generate the crcular code X Ths secton presents a mathematcal proof that the NF method cannot generate the crcular code X. The dea of ths proof s the followng one. We take the hypothess that a crcular code X contanng the trplets αβγ, δδβ and γαδ where αβγδ,,, { A,C,G,T } s generated by the NF method from the occurrence probabltes p( θ) of a base { } θ A,C,G,T at the poston { },,. Then, ths hypothess s refuted by consderng several probablty nequaltes assocated wth the trplets consdered. As the crcular code X contans such trplets (ATC, GGT, CAG), then X cannot be generated by the NF method. The exstence of probabltes p( θ) generatng X by the NF method s takng as hypothess. Accordng to the nequalty () of the NF method, the trplet αβγ belongng to X leads to the followng probablty nequalty p( α)p()p() β γ > p()p( γ α)p() β (4) Accordng to the nequalty () of the NF method, the trplet δδβ belongng to X leads to the followng probablty nequalty p()p()p() δ δ β > p()p()p() δ β δ (5) Clearly, p( δ ) > otherwse the nequalty (5) cannot be verfed. Therefore, by smplfyng (5) p ( δ)p ( β ) > p ( β)p ( δ) (6) Accordng to the nequalty () of the NF method, the trplet γαδ belongng to X leads to the followng probablty nequalty Clearly, p() δ > p()p( γ α)p() δ > p( α)p()p() δ γ (7) otherwse the nequalty (7) cannot be verfed. By rewrtng (4) as follows p( α)p()p() β γ > p()p( γ α)p() δ p()p() β δ (8) By usng (7) wth the second member of (8), we obtan p ( α)p ( β)p ( γ ) > p ( α)p ( δ)p ( γ ) p ( β) p ( δ) (9) As p( α ) > and p() γ >, the nequalty (9) can be smplfed as follows p() β > p() δ p()p() β δ.e. p ( β)p ( δ ) > p ( δ)p ( β) () The nequalty () s n contradcton wth the nequalty (6). Therefore, the hypothess of exstence of probabltes p( θ) generatng X s refuted. Ths proof can be appled to the crcular code X contanng the trplets ATC, GGT and CAG whch follow the pattern αβγ, δδβ and γαδ. Therefore, the crcular code X cannot be generated by the NF method

9 .. Development of two algorthms n complement of the proof The prevous secton () has proved that the self-complementary crcular code X cannot be generated by the NF method. Ths secton conssts n determnng all the self-complementary crcular codes whch can be generated by ths NF method. The frst algorthm A developed allows the determnaton of a set S of self-complementary crcular codes Y based on the NF method. The NF method mples the followng property wth each code Y of S Y. The sets of words obtaned by crcular permutatons of a code Y, are complementary crcular codes (Koch & Lehmann, 997, p. 7). Such codes Y are called C codes (Arquès & Mchel, 996). The prncple of the algorthm A conssts n varyng the probabltes p( θ) of the 4 bases at the postons n the range [,] accordng to the relaton (). For each probablty varaton step, the algorthm A computes a C code by usng the NF method and testes whether ths C code has been prevously generated. Indeed, several sets of probabltes p( θ) can lead to the same C codes. By varyng the probabltes p( θ) wth steps becomng smaller and smaller, the number of C codes Y n constant and equal to 88. These 88 codes Y are lsted n Table. S Y remans The algorthm A generates 88 C codes Y. However, the flower automaton method dentfes 6 codes (Arquès & Mchel, 996). In order to explan the 6-88=8 remanng C C codes, we extend the proof () based on the pattern P ={ αβγ, δδβ, γαδ } to ts crcular permuted patterns P ={ βγα, δβδ, αδγ } and P ={ γαβ, βδδ, δγα }. Any crcular code contanng the pattern P cannot be generated by the NF method (proof ()). Smlarly, the proof () also shows that any crcular code contanng a crcular permuted pattern P or P, cannot be generated by the NF method. The algorthm A developed determnes the codes among the 6 ones whch contans at least one of the prevous patterns. There are exactly 8 such C codes. Therefore, the algorthm A confrms the number 88 of C codes Y determned by the algorthm A whatever the probablty varaton step used. C In summary, the number of C codes whch can be generated by the Nucleotde Frequency method s exactly 88. It s mportant to stress that the 8 other C codes cannot be generated from any sets of probabltes, even probabltes whch do not verfy the relaton (), as the proof () does not make any hypothess on the probabltes

10 . Remarks on the hypothess of no correlaton between successve bases used n the Nucleotde Frequency method (NF method) The hypothess of no correlaton between successve bases has been justfed by the entropy approach (Koch & Lehmann, 997, p. 7). We brefly recall the elementary prncples of the entropy... Method Let X be a dscrete random varable takng the value a { } ( ) = ( = ) A,C,G,T wth the probablty Pa PrX a. The entropy H(X) of the dscrete random varable X can be defned, n a smple approach, by the measure of the average nformaton quantty assocated wth ths varable X,.e. = 4 = H(X) P(a )log P(a ) The entropy H(X) defned for the words of length (nucleotdes) s extended for words w = a...a n, n {,...,4 }, of a gven length n as follows where P(w ) s the occurrence probablty of the word 4 = n H P(w )log P(w ) n = w. Note H = H(X). As the proten genes are read n the readng frame, the entropy extended to the entropy n H, { } w = a...a n the frame f, as follows n,f H n defned for the words of length n s f,,, computed from the occurrence probabltes P(w) f of the word Notes: () For the word where + f 4 = n H P (w )log P (w ) n,f f f = w of length (n=), there s the obvous relaton P(w) = p (w) () f f+ p (w ) s the probablty of a base at the poston + { } (f ),, n the NF method. () H, can be consdered as a classcal entropy H(Y) for the dscrete random varable Y takng the 64 values n {AAA,...,TTT} n readng frame. When the probabltes follow a random dscrete unform law,.e. all the probabltes are equal, then 4 the maxma of the entropy functons H n and H n,f are reached and are equal to n n n = = n log 4 log 4 n 4 bts (Cover & Thomas, 99). Classcally, an entropy functon s expressed n bts per nucleotde wth a maxmal value equal to correspondng to an unform random dstrbuton (Loewenstern & Yanlos,999). Then, the ntroduced functons are normalsed as follows: - -

11 n H = H n () n,f n H = H n () n,f The two statstcal methods presented n Secton, the Trnucleotde Frequency (TF) method (Arquès & Mchel, 996) and the Nucleotde Frequency (NF) method (Koch & Lehmann, 997), allow to construct crcular codes from data observed n the codng genes. The crcular codes constructed by both methods, are sets of trnucleotdes n frame. The constructon of these dfferent codes are based on the occurrence probabltes of the trplets n frame. The TF method drectly uses these probabltes. In contrast, the NF method assumes the ndependence between successve bases for usng the occurrence probabltes of the bases at the dfferent postons n a trnucleotde (trplet) observed n frame. The computaton of the entropes assocated wth the models of probabltes wll measure the real nfluence of the hypothess of non-correlaton between successve bases. The NF method s based on the occurrence probablty poston { } p( θ) of a gven base θ { A,C,G,T } at,, n a trnucleotde (trplet) observed n frame. By assumng the non-correlaton between successve bases, the occurrence probablty P( αβγ) of the trnucleotde αβγ n frame, s then deduced by the product of ndvdual probabltes whch s equal by usng the relaton () to Then, the entropy P( αβγ ) = P( α)p( β)p( γ ) = p( α)p ( β)p ( γ) H NF assocated to these probabltes s ( ) H = p ( α)p ( β)p ( γ)log p ( α)p ( β)p ( γ) NF αβγ,, {A,C,G,T} By assumng the non-correlaton between successve bases and by usng the relaton (), basc results lead to the entropy H NF equal to (Cover & Thomas, 99) ( ) H = p ( α)p ( β)p ( γ)log p ( α)p ( β)p ( γ) NF αβγ,, {A,C,G,T} = p( θ)logp( θ) = θ {A,C,G,T} 4 = P(w f j)logp(w f j) f= j= = H,f f= The TF method s based on the observed occurrence probabltes of the trnucleotdes n the frame. Therefore, ts entropy s equal to HTF H = P ( αβγ)log P ( αβγ ) = H TF, αβγ,, {A,C,G,T} In order to express the entropes H, accordng to () and () H NF and H TF n bts per nucleotde, the functons are normalzed H = H - -

12 NF H = H TF NF H = H Remark: Wth gene populatons contanng several mllons of nucleotdes (e.g. Arquès & Mchel, 996; Koch & Lehmann, 997), the computed probabltes are stable (law of large numbers). Therefore, the values obtaned here from such probabltes lead to a precse approxmaton of the entropy functons. TF.. Results The values of these entropes n the prokaryotc proten genes are presented n the Table 4. The values of H (resp. H ) are assocated wth the nucleotdes (resp. the trnucleotdes) wthout consderng the exstence of the readng frame n the prokaryotc proten genes. As expected, these values are closed to representng the random stuaton. The value H (.984 bt per nucleotde) s slghtly less than the value of H (.998 bt per nucleotde), showng that the basc element of nformaton n the proten genes, s the trnucleotde and not the nucleotde. The value of H TF (.98 bt per nucleotde) assocated wth the TF method, s sgnfcantly lower than the value of H NF (.965 bt per nucleotde) assocated wth the NF method. The H TF value can be compared wth the classcal estmate of entropy of codng genes whch s about.9 (Loewenstern & Yanlos,999). Ths value of.9 can be mproved by consderng partcular sequences or by usng specfc algorthms as shown n Table 4 of Loewenstern & Yanlos (999) for a non-redundant collecton of 49 human genes. The mprovement of the estmate of the entropy s not the am of ths paper. But, the fact that the value of H TF corresponds to the classcal estmate, mples that the probablty model used n the TF method can be consdered as a correct representaton of the structure of the codng genes. In contrast, the value of H NF dffers sgnfcantly from the classcal estmate. The hypothess of ndependence between successve bases has then a strong effect on the values of the entropes. Therefore, the probablty model used n the NF method does not reveal nether the nternal structure of the codng genes nor the occurrence probabltes of the trplets n frame. DISCUSSION Koch & Lehmann (997) have proposed a probablstc model for constructng the crcular code observed n the proten genes. Ther method (called here Nucleotde Frequency (NF) method) s based on the nucleotde frequences wth a hypothess of absence of correlaton between successve bases on a DNA strand for deducng a crcular code from the product of the occurrence probabltes of nucleotdes n the postons of trnucleotde read n frame. It allows a smple constructon of some partcular crcular codes but reveals several lmts for constructng the crcular code assocated wth proten genes: () Several self-complementary crcular codes, but not an unque one, are generated by the NF method from the observed probabltes (Secton..). () The self-complementary crcular code X observed n the n the proten genes of both eukaryotes and prokaryotes cannot be generated by the NF method (Secton..). - -

13 () 88 among 6 self-complementary crcular codes can be generated by the NF method (Secton..). They are lsted n Table. (v) The hypothess used n the NF method of no correlaton between successve bases n the proten genes, s not verfed (Secton..). Indeed, ths hypothess has been justfed by computng the entropy wth occurrence probabltes of words of length to 6 (Koch & Lehmann, 997). However, any probablty model can produced a value of entropy. The choce of the functon for revealng the genetc nformaton n the sense of the nformaton theory defned by Shannon (949), s very mportant as the value of the entropy strongly vares among the functons used. Several examples of dfferent functons estmatng the value of the entropy are presented n Chatzdmtrou-Dresmamm et al (996), Lo et al (996), Loewenstern & Yanlos (999), etc. In order to evaluate the hypothess of non-correlaton between successve bases, estmates of the entropy are computed here. The frst estmate assocated wth the TF method, s based on the 64 occurrence probabltes of trplets n frame. The entropy value H TF assocated wth these probabltes, s equal to.98 bt per nucleotde and s smlar to the classcal estmate (.9) of the entropy of codng genes (Loewenstern & Yanlos,999). The second estmate assocated wth the NF method, s based on the occurrence probabltes of nucleotdes n the trplet stes. These nucleotde probabltes wth the hypothess of non-correlaton between successve bases, allow to deduce the occurrence probabltes of trplets n frame more smply (wth values compared to 64 ones, but wth a probablty hypothess). However, ts entropy value H NF s equal to.965 bt per nucleotde and sgnfcantly dffers from H TF. Therefore, the hypothess of non-correlaton between successve bases s not verfed. 4 CONCLUSION The method ntroduced by Koch & Lehmann (997) s a new approach for constructng crcular codes. Ths NF method constructs n a smple way a sub-set of crcular codes whch s ncluded n the set of crcular codes generated by the flower automaton method. The NF method has an obvous nterest n the feld of the theory of codes. In ths paper, some new results are presented n ths respect, n partcular the number of codes generated by ths NF method and some patterns of code words excluded by the NF method. However, the man purpose of the NF method was to explan the crcular code X dentfed n the proten genes of both eukaryotes and prokaryotes (Arquès & Mchel, 996). Several results were presented here concernng the relatons between the NF method and the code X. The NF method does not generate a unque self-complementary crcular code. Futhermore, t cannot generate the code X. Fnally, the hypothess of non-correlaton between successve bases at the bass of the NF method, s rejected as the dfferent computatons of the entropy clearly show that the probabltes used by the NF method does not respect the nternal structure of the codng genes. In concluson, the NF method s not an approprate model for explanng the crcular code X. - -

14 REFERENCES Arquès, D.G., Fallot, J.-P., Marsan, L. & Mchel, C.J. (999). An evolutonary analytcal model of a complementary crcular code. J. Bosystems 49, 8-. Arquès, D.G., Fallot, J.-P. & Mchel, C.J. (998). An evolutonary analytcal model of a complementary crcular code smulatng the proten codng genes, the 5' and ' regons. Bull. Math. Bol. 6, Arquès, D.G. & Mchel, C.J. (996). A complementary crcular code n the proten codng genes. J. Theor. Bol. 8, Arquès, D.G. & Mchel, C.J. (997a). A code n the proten codng genes. J. Bosystems 44, 7-4. Arquès, D.G. & Mchel, C.J. (997b). A crcular code n the proten codng genes of mtochondra. J. Theor. Bol. 89, 7-9. Béal, M.-P. (99). Codage symbolque. Masson. Berstel, J. & Perrn, D. (985). Theory of codes. Academc Press. Chatzdmtrou-Dresmamm, C.A., Sterffer R.M.F. & Larhammar, D. (996). Lack of bologcal sgnfcance n the lngustc features of non-codng DNA. A quanttatve analyss. Nucl. Acds Res. 4, Cover, T.M. & Thomas, J.A. (99). Elements of Informaton Theory. Wley. Crck, F.H.C., Brenner, S., Klug, A. & Peczenk, G. (976). A speculaton on the orgn of proten synthess. Orgns of Lfe 7, Crck, F.H.C., Grffth, J.S. & Orgel, L.E. (957). Codes wthout commas. Proc. Natl. Acad. Sc. 4, Egen, M. & Schuster, P. (978). The hypercycle. A prncple of natural self-organzaton. Part C: The realstc hypercycle. Naturwssenschaften 65, Koch, A.J. & Lehmann, J. (997). About a symmetry of the genetc code. J. Theor. Bol. 89, Lo, P., Polt A., Buatt, M. & Ruffo, S. (996). Hgh statstcs block entropy measures of DNA sequences. J. Theor. Bol. 8, 5-6. Loewenstern D. & Yanlos P.N. (999). Sgnfcantly lower entropy estmates for natural DNA sequences. J. Comp. Bol. 6, 5-4. Nrenberg, M.W. & Matthae, J.H. (96). The dependance of cell-free proten synthess n E. Col upon naturally occurrng or synthetc polyrbonucleotdes. Proc. Natl. Acad. Sc. 47, Shannon, C.E. (949). The mathematcal theory of communcaton. Unversty of Illnos Press

15 T : AAA AAC AAT ACC ATC ATT CAG CTC CTG GAA GAC GAG GAT GCCGGC GGT GTA GTC GTT TAC TTC TTT T : AAG ACA ACG ACT AGC AGG ATA ATG CCA CCC CCGGCGGTG TAG TCA TCC TCG TCT TGC TTA TTG T : AGA AGT CAA CAC CAT CCT CGA CGC CGG CGT CTA CTT GCA GCT GGAGGG TAA TAT TGA TGG TGT Table a Lst per frame and n lexcographcal order of the trnucleotdes of the complementary crcular code dentfed n proten codng genes of eukaryotes and prokaryotes (Arquès & Mchel, 996). Three subsets of T X AAA,TTT T = X CCC n frame and trnucleotdes can be dentfed: = { } n frame, { } T X { GGG} = n frame. The sets X, X of trnucleotdes are maxmal crcular codes. X : AAC AAT ACC ATC ATT CAG CTC CTG GAA GAC GAG GAT GCC GGC GGT GTA GTC GTT TAC TTC X : ACA ATA CCA TCA TTA AGC TCC TGC AAG ACG AGG ATG CCG GCG GTG TAG TCG TTG ACT TCT X : CAA TAA CAC CAT TAT GCA CCT GCT AGA CGA GGA TGA CGC CGG TGG AGT CGT TGT CTA CTT Table b Crcularty property wth the crcular codes X, X of trnucleotdes dentfed n proten codng genes of eukaryotes and prokaryotes (Table a). T : AAA AAC AAT ACC ATC CAG CTC GAA GAC GCC GTA T : TTT GTT ATT GGT GAT CTG GAG TTC GTC GGC TAC T : AAG ACA ACG ACT AGC AGG ATA ATG CCA CCC CCG GCG GTG TAG TCA TCC TCG TCT TGC TTA TTG T : CTT TGT CGT AGT GCT CCT TAT CAT TGG GGG CGG CGC CAC CTA TGA GGA CGA AGA GCA TAA CAA Table c Complementarty property wth the crcular codes X, X of trnucleotdes dentfed n proten codng genes of eukaryotes and prokaryotes (Table a). Ths property s also verfed wth T (AAA and TTT) and, T and T (CCC and GGG)

16 Base θ p( θ) p() θ p() θ A T C G Table a Nucleotde frequences p( θ) at poston {,, } of the readng frame for the prokaryotes (Koch & Lehmann, 997, Table ). Crcular codes p (A) p (C) p (G) p (T) p (A) p (C) AAC AAT ACC AGC ATC ATT CTC GAA GAC GAG GAT GCC GCTGGCGGTGTAGTCGTTTACTTC AAC AAG AAT ATC ATT CAC CAG CTC CTG CTT GAC GAG GATGCCGGCGTAGTCGTGGTTTAC AAC AAG AAT AGC ATC ATT CAC CTC CTT GAC GAG GAT GCCGCTGGCGTAGTCGTGGTTTAC Table b Three self-complementary crcular codes generated by the Nucleotde Frequency method (NF method) wth the frequences of Table a modfed accordng to the relaton (): p(a) = p(t), p(c) = p(g), p(g) = p(c), p(t) p(a), p(a) = p(t) and p(c) = p(g). = - 6 -

17 Crcular codes p (A) p (C) p (G) p (T) p (A) p (C) ACA AGA CCA CGA GCA GCC GGA GGC GTA TAA TAC TCA TCC TCG TCT TGA TGC TGG TGT TTA ACA CCA CGA GAA GCA GCC GGA GGC GTA TAA TAC TCA TCC TCG TGA TGC TGG TGT TTA TTC CAA CCA CGA GAA GCA GCC GGA GGC GTA TAA TAC TCA TCC TCG TGA TGC TGG TTA TTC TTG CAA CCA GAA GAC GCA GCC GGA GGC GTA GTC TAA TAC TCA TCC TGA TGC TGG TTA TTC TTG CAA CAC CTC GAA GAC GAG GCA GCC GGC GTA GTC GTG TAA TAC TCA TGA TGC TTA TTC TTG CAA CAC GAA GAC GCA GCC GGA GGC GTA GTC GTG TAA TAC TCA TCC TGA TGC TTA TTC TTG ACA CCA GAA GAC GCA GCC GGA GGC GTA GTC TAA TAC TCA TCC TGA TGC TGG TGT TTA TTC ATC CAA CAC CTC GAA GAC GAG GAT GCA GCC GGC GTA GTC GTG TAA TAC TGC TTA TTC TTG ACA ACC GAA GAC GCA GCC GGA GGC GGT GTA GTC TAA TAC TCA TCC TGA TGC TGT TTA TTC AAC ACC GAA GAC GCA GCC GGA GGC GGT GTA GTC GTT TAA TAC TCA TCC TGA TGC TTA TTC AAC CAC GAA GAC GCA GCC GGA GGC GTA GTC GTG GTT TAA TAC TCA TCC TGA TGC TTA TTC AAC ATC CAC CTC GAA GAC GAG GAT GCA GCC GGC GTA GTC GTG GTT TAA TAC TGC TTA TTC AAC ATC CAC GAA GAC GAT GCA GCC GGA GGC GTA GTC GTG GTT TAA TAC TCC TGC TTA TTC AAC ACC ATC GAA GAC GAT GCA GCC GGA GGC GGT GTA GTC GTT TAA TAC TCC TGC TTA TTC AAC ATC CAC CAG CTC CTG GAA GAC GAG GAT GCC GGC GTA GTC GTG GTT TAA TAC TTA TTC AAC AAT ACC AGC ATC ATT GAA GAC GAT GCC GCT GGA GGC GGT GTA GTC GTT TAC TCC TTC AAC AAT ACC AGC ATC ATT CTC GAA GAC GAG GAT GCC GCT GGC GGT GTA GTC GTT TAC TTC AAC AAT AGC ATC ATT CAC CTC GAA GAC GAG GAT GCC GCT GGC GTA GTC GTG GTT TAC TTC AAC AAT ATC ATT CAC CAG CTC CTG GAA GAC GAG GAT GCC GGC GTA GTC GTG GTT TAC TTC ACA AGA CCA CCG CGA CGG CTA GCA GGA TAA TAG TCA TCC TCG TCT TGA TGC TGG TGT TTA AGA CAA CCA CCG CGA CGG CTA GCA GGA TAA TAG TCA TCC TCG TCT TGA TGC TGG TTA TTG CAA CCA CCG CGA CGG CTA GAA GCA GGA TAA TAG TCA TCC TCG TGA TGC TGG TTA TTC TTG CAA CAG CCA CCG CGA CGG CTA CTG GAA GGA TAA TAG TCA TCC TCG TGA TGG TTA TTC TTG CAA CAC CAG CCG CGA CGG CTA CTC CTG GAA GAG GTG TAA TAG TCA TCG TGA TTA TTC TTG CAA CAC CAG CTC CTG GAA GAC GAG GCC GGC GTA GTC GTG TAA TAC TCA TGA TTA TTC TTG ATC CAA CAC CAG CTC CTG GAA GAC GAG GAT GCC GGC GTA GTC GTG TAA TAC TTA TTC TTG CAA CAG CCA CCG CGA CGG CTA CTC CTG GAA GAG TAA TAG TCA TCG TGA TGG TTA TTC TTG CAA CAC CAG CCG CGG CTA CTC CTG GAA GAC GAG GTC GTG TAA TAG TCA TGA TTA TTC TTG AGA CAA CAG CCA CCG CGA CGG CTA CTG GGA TAA TAG TCA TCC TCG TCT TGA TGG TTA TTG ATG CAA CAC CAG CAT CCG CGG CTA CTC CTG GAA GAC GAG GTC GTG TAA TAG TTA TTC TTG AAC AAT ACC ACT AGC AGT ATC ATT GAA GAC GAT GCC GCT GGA GGC GGT GTC GTT TCC TTC ATG CAA CAC CAG CAT CCG CGA CGG CTA CTC CTG GAA GAG GTG TAA TAG TCG TTA TTC TTG AAC AAT ACC ACT AGC AGT ATC ATT CTC GAA GAC GAG GAT GCC GCT GGC GGT GTC GTT TTC AAC AAG AAT ACC ACT AGC AGT ATC ATT CTC CTT GAC GAG GAT GCC GCT GGC GGT GTC GTT AAC AAG AAT ATC ATT CAC CAG CTC CTG CTT GAC GAG GAT GCC GGC GTA GTC GTG GTT TAC AGA AGG CAA CAG CCA CCG CCT CGA CGG CTA CTG TAA TAG TCA TCG TCT TGA TGG TTA TTG AAG AGG CAA CAG CCA CCG CCT CGA CGG CTA CTG CTT TAA TAG TCA TCG TGA TGG TTA TTG AAG CAA CAG CCA CCG CGA CGG CTA CTC CTG CTT GAG TAA TAG TCA TCG TGA TGG TTA TTG AAG ATG CAA CAC CAG CAT CCG CGA CGG CTA CTC CTG CTT GAG GTG TAA TAG TCG TTA TTG AAC AAG AAT ACG ACT AGG AGT ATG ATT CAC CAG CAT CCG CCT CGG CGT CTG CTT GTG GTT AAC AAG AAT ATG ATT CAC CAG CAT CCG CGG CTA CTC CTG CTT GAC GAG GTC GTG GTT TAG AAG ATG CAA CAG CAT CCA CCG CGA CGG CTA CTC CTG CTT GAG TAA TAG TCG TGG TTA TTG AAG ATG CAA CAC CAG CAT CCG CGG CTA CTC CTG CTT GAC GAG GTC GTG TAA TAG TTA TTG AAG AAT ACG ACT AGG AGT ATG ATT CAA CAC CAG CAT CCG CCT CGG CGT CTG CTT GTG TTG AAG AAT ACG ATG ATT CAA CAC CAG CAT CCG CGG CGT CTA CTC CTG CTT GAG GTG TAG TTG AAG AAT ATG ATT CAA CAC CAG CAT CCG CGG CTA CTC CTG CTT GAC GAG GTC GTG TAG TTG AAG AGG ATG CAA CAG CAT CCA CCG CCT CGA CGG CTA CTG CTT TAA TAG TCG TGG TTA TTG AAG AAT ACG ACT AGG AGT ATG ATT CAA CAG CAT CCA CCG CCT CGG CGT CTG CTT TGG TTG AAG AAT ACG AGG ATG ATT CAA CAG CAT CCA CCG CCT CGG CGT CTA CTG CTT TAG TGG TTG AAG AAT ACG AGG ATG ATT CAA CAC CAG CAT CCG CCT CGG CGT CTA CTG CTT GTG TAG TTG ACA ACT AGA AGT CCA CGA GCA GCC GGA GGC TAA TCA TCC TCG TCT TGA TGC TGG TGT TTA ACA ACC AGA CGA GCA GCC GGA GGC GGT GTA TAA TAC TCA TCC TCG TCT TGA TGC TGT TTA ACA ACC AGA GAC GCA GCC GGA GGC GGT GTA GTC TAA TAC TCA TCC TCT TGA TGC TGT TTA ACA ACC ACT AGA AGT GAC GCA GCC GGA GGC GGT GTC TAA TCA TCC TCT TGA TGC TGT TTA AAT ACA ACC ACT AGA AGC AGT ATC ATT GAC GAT GCC GCT GGA GGC GGT GTC TCC TCT TGT AAC AAT ACC ACT AGA AGC AGT ATC ATT GAC GAT GCC GCT GGA GGC GGT GTC GTT TCC TCT ACA ACT AGA AGT CCA CCG CGA CGG GCA GGA TAA TCA TCC TCG TCT TGA TGC TGG TGT TTA ACA ACC ACT AGA AGT CGA GCA GCC GGA GGC GGT TAA TCA TCC TCG TCT TGA TGC TGT TTA AAT ACA ACC ACT AGA AGC AGT ATT GAC GCC GCT GGA GGC GGT GTC TCA TCC TCT TGA TGT AAC AAT ACC ACT AGA AGC AGG AGT ATC ATT CCT GAC GAT GCC GCT GGC GGT GTC GTT TCT AAC AAG AAT ACT AGC AGT ATC ATT CAC CTC CTT GAC GAG GAT GCC GCT GGC GTC GTG GTT AAC AAG AAT AGC ATC ATT CAC CTC CTT GAC GAG GAT GCC GCT GGC GTA GTC GTG GTT TAC ACA AGA AGG CCA CCG CCT CGA CGG CTA GCA TAA TAG TCA TCG TCT TGA TGC TGG TGT TTA AAT ACA ACC ACG ACT AGA AGC AGT ATT CGT GCC GCT GGA GGC GGT TCA TCC TCT TGA TGT AAC AAG AAT ACC ACT AGC AGG AGT ATC ATT CCT CTT GAC GAT GCC GCT GGC GGT GTC GTT ACA AGA AGG CAG CCA CCG CCT CGA CGG CTA CTG TAA TAG TCA TCG TCT TGA TGG TGT TTA AAT ACA ACC ACG ACT AGA AGC AGG AGT ATT CCT CGT GCC GCT GGC GGT TCA TCT TGA TGT AAC AAG AAT ACC ACG ACT AGC AGG AGT ATC ATT CCT CGT CTT GAT GCC GCT GGC GGT GTT AAC AAG AAT ACT AGT ATC ATT CAC CAG CTC CTG CTT GAC GAG GAT GCC GGC GTC GTG GTT ACA ACT AGA AGG AGT CCA CCG CCT CGA CGG GCA TAA TCA TCG TCT TGA TGC TGG TGT TTA AAT ACA ACC ACG ACT AGA AGC AGG AGT ATT CCG CCT CGG CGT GCT GGT TCA TCT TGA TGT AAT ACA ACG ACT AGA AGC AGG AGT ATT CCA CCG CCT CGG CGT GCT TCA TCT TGA TGG TGT AAC AAG AAT ACC ACG ACT AGC AGG AGT ATG ATT CAT CCG CCT CGG CGT CTT GCT GGT GTT

18 AAC AAG AAT ACT AGT ATG ATT CAC CAG CAT CCG CGG CTC CTG CTT GAC GAG GTC GTG GTT ACA ACT AGA AGG AGT CAG CCA CCG CCT CGA CGG CTG TAA TCA TCG TCT TGA TGG TGT TTA AAT ACA ACG ACT AGA AGG AGT ATT CAG CCA CCG CCT CGG CGT CTG TCA TCT TGA TGG TGT AAC AAG AAT ACC ACG ACT AGG AGT ATG ATT CAG CAT CCG CCT CGG CGT CTG CTT GGT GTT AAC AAG AAT ACG ACT AGT ATG ATT CAC CAG CAT CCG CGG CGT CTC CTG CTT GAG GTG GTT AAG AAT ACA ACC ACG ACT AGG AGT ATG ATT CAG CAT CCG CCT CGG CGT CTG CTT GGT TGT AAC AAG AAT ACG ATG ATT CAC CAG CAT CCG CGG CGT CTA CTC CTG CTT GAG GTG GTT TAG AAT ACA ACG ACT AGA AGG AGT ATG ATT CAG CAT CCA CCG CCT CGG CGT CTG TCT TGG TGT AAG AAT ACA ACG ACT AGG AGT ATG ATT CAG CAT CCA CCG CCT CGG CGT CTG CTT TGG TGT AAT ACA ACC ACG ACT AGA AGC AGT ATC ATT CGT GAT GCC GCT GGA GGC GGT TCC TCT TGT AAC AAT ACC ACG ACT AGA AGC AGG AGT ATC ATT CCT CGT GAT GCC GCT GGC GGT GTT TCT AAT ACA ACC ACG ACT AGA AGC AGG AGT ATC ATT CCT CGT GAT GCC GCT GGC GGT TCT TGT AAT ACA ACC ACG ACT AGA AGC AGG AGT ATG ATT CAT CCG CCT CGG CGT GCT GGT TCT TGT AAT ACA ACG ACT AGA AGC AGG AGT ATG ATT CAT CCA CCG CCT CGG CGT GCT TCT TGG TGT AAG AAT ACA ACC ACG ACT AGC AGG AGT ATG ATT CAT CCG CCT CGG CGT CTT GCT GGT TGT Table Lst of the 88 self-complementary crcular codes generated by the Nucleotde Frequency method (NF method) accordng to the 6 probabltes p(a) = p(t), p(c) = p(g), p(g) = p(c), p(t) = p(a), p(a) = p(t) and p(c) = p(g). Nucleotde (n=) Entropy n the frame modulo Classcal entropy H n H NF =.965 H =.998 Trnucleotde (n=) H TF =.98 H =.984 Table 4 Computaton of dfferent types of entropes (bt per nucleotde) from the occurrence frequences of the 64 trnucleotdes n the frame modulo and n the frames (average frame) of prokaryotc proten codng genes (686 sequences, trnucleotdes; data from Arquès & Mchel, 996, p. 49)

(http://genomes.urv.es/caical) TUTORIAL. (July 2006)

(http://genomes.urv.es/caical) TUTORIAL. (July 2006) (http://genomes.urv.es/caical) TUTORIAL (July 2006) CAIcal manual 2 Table of contents Introduction... 3 Required inputs... 5 SECTION A Calculation of parameters... 8 SECTION B CAI calculation for FASTA

More information

GENEWIZ, Inc. DNA Sequencing Service Details for USC Norris Comprehensive Cancer Center DNA Core

GENEWIZ, Inc. DNA Sequencing Service Details for USC Norris Comprehensive Cancer Center DNA Core DNA Sequencing Services Pre-Mixed o Provide template and primer, mixed into the same tube* Pre-Defined o Provide template and primer in separate tubes* Custom o Full-service for samples with unknown concentration

More information

(A) Microarray analysis was performed on ATM and MDM isolated from 4 obese donors.

(A) Microarray analysis was performed on ATM and MDM isolated from 4 obese donors. Legends of supplemental figures and tables Figure 1: Overview of study design and results. (A) Microarray analysis was performed on ATM and MDM isolated from 4 obese donors. After raw data gene expression

More information

10 µg lyophilized plasmid DNA (store lyophilized plasmid at 20 C)

10 µg lyophilized plasmid DNA (store lyophilized plasmid at 20 C) TECHNICAL DATA SHEET BIOLUMINESCENCE RESONANCE ENERGY TRANSFER RENILLA LUCIFERASE FUSION PROTEIN EXPRESSION VECTOR Product: prluc-c Vectors Catalog number: Description: Amount: The prluc-c vectors contain

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Introduction to Perl Programming Input/Output, Regular Expressions, String Manipulation. Beginning Perl, Chap 4 6. Example 1

Introduction to Perl Programming Input/Output, Regular Expressions, String Manipulation. Beginning Perl, Chap 4 6. Example 1 Introduction to Perl Programming Input/Output, Regular Expressions, String Manipulation Beginning Perl, Chap 4 6 Example 1 #!/usr/bin/perl -w use strict; # version 1: my @nt = ('A', 'C', 'G', 'T'); for

More information

Table S1. Related to Figure 4

Table S1. Related to Figure 4 Table S1. Related to Figure 4 Final Diagnosis Age PMD Control Control 61 15 Control 67 6 Control 68 10 Control 49 15 AR-PD PD 62 15 PD 65 4 PD 52 18 PD 68 10 AR-PD cingulate cortex used for immunoblot

More information

UNIVERSITETET I OSLO Det matematisk-naturvitenskapelige fakultet

UNIVERSITETET I OSLO Det matematisk-naturvitenskapelige fakultet 1 UNIVERSITETET I OSLO Det matematisk-naturvitenskapelige fakultet Exam in: MBV4010 Arbeidsmetoder i molekylærbiologi og biokjemi I MBV4010 Methods in molecular biology and biochemistry I Day of exam:.

More information

Mutations and Genetic Variability. 1. What is occurring in the diagram below?

Mutations and Genetic Variability. 1. What is occurring in the diagram below? Mutations and Genetic Variability 1. What is occurring in the diagram below? A. Sister chromatids are separating. B. Alleles are independently assorting. C. Genes are replicating. D. Segments of DNA are

More information

DNA Sample preparation and Submission Guidelines

DNA Sample preparation and Submission Guidelines DNA Sample preparation and Submission Guidelines Requirements: Please submit samples in 1.5ml microcentrifuge tubes. Fill all the required information in the Eurofins DNA sequencing order form and send

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Supplementary Online Material for Morris et al. sirna-induced transcriptional gene

Supplementary Online Material for Morris et al. sirna-induced transcriptional gene Supplementary Online Material for Morris et al. sirna-induced transcriptional gene silencing in human cells. Materials and Methods Lentiviral vector and sirnas. FIV vector pve-gfpwp was prepared as described

More information

The p53 MUTATION HANDBOOK

The p53 MUTATION HANDBOOK The p MUTATION HANDBOOK Version 1. /7 Thierry Soussi Christophe Béroud, Dalil Hamroun Jean Michel Rubio Nevado http://p/free.fr The p Mutation HandBook By T Soussi, J.M. Rubio-Nevado, D. Hamroun and C.

More information

Inverse PCR & Cycle Sequencing of P Element Insertions for STS Generation

Inverse PCR & Cycle Sequencing of P Element Insertions for STS Generation BDGP Resources Inverse PCR & Cycle Sequencing of P Element Insertions for STS Generation For recovery of sequences flanking PZ, PlacW and PEP elements E. Jay Rehm Berkeley Drosophila Genome Project I.

More information

Hands on Simulation of Mutation

Hands on Simulation of Mutation Hands on Simulation of Mutation Charlotte K. Omoto P.O. Box 644236 Washington State University Pullman, WA 99164-4236 omoto@wsu.edu ABSTRACT This exercise is a hands-on simulation of mutations and their

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Gene Synthesis 191. Mutagenesis 194. Gene Cloning 196. AccuGeneBlock Service 198. Gene Synthesis FAQs 201. User Protocol 204

Gene Synthesis 191. Mutagenesis 194. Gene Cloning 196. AccuGeneBlock Service 198. Gene Synthesis FAQs 201. User Protocol 204 Gene Synthesis 191 Mutagenesis 194 Gene Cloning 196 AccuGeneBlock Service 198 Gene Synthesis FAQs 201 User Protocol 204 Gene Synthesis Overview Gene synthesis is the most cost-effective way to enhance

More information

Next Generation Sequencing

Next Generation Sequencing Next Generation Sequencing 38. Informationsgespräch der Blutspendezentralefür Wien, Niederösterreich und Burgenland Österreichisches Rotes Kreuz 22. November 2014, Parkhotel Schönbrunn Die Zukunft hat

More information

Gene Finding CMSC 423

Gene Finding CMSC 423 Gene Finding CMSC 423 Finding Signals in DNA We just have a long string of A, C, G, Ts. How can we find the signals encoded in it? Suppose you encountered a language you didn t know. How would you decipher

More information

Supplementary Information. Binding region and interaction properties of sulfoquinovosylacylglycerol (SQAG) with human

Supplementary Information. Binding region and interaction properties of sulfoquinovosylacylglycerol (SQAG) with human Supplementary Information Binding region and interaction properties of sulfoquinovosylacylglycerol (SQAG) with human vascular endothelial growth factor 165 revealed by biosensor based assays Yoichi Takakusagi

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Molecular analyses of EGFR: mutation and amplification detection

Molecular analyses of EGFR: mutation and amplification detection Molecular analyses of EGFR: mutation and amplification detection Petra Nederlof, Moleculaire Pathologie NKI Amsterdam Henrique Ruijter, Ivon Tielen, Lucie Boerrigter, Aafke Ariaens Outline presentation

More information

Inverse PCR and Sequencing of P-element, piggybac and Minos Insertion Sites in the Drosophila Gene Disruption Project

Inverse PCR and Sequencing of P-element, piggybac and Minos Insertion Sites in the Drosophila Gene Disruption Project Inverse PCR and Sequencing of P-element, piggybac and Minos Insertion Sites in the Drosophila Gene Disruption Project Protocol for recovery of sequences flanking insertions in the Drosophila Gene Disruption

More information

SERVICES CATALOGUE WITH SUBMISSION GUIDELINES

SERVICES CATALOGUE WITH SUBMISSION GUIDELINES SERVICES CATALOGUE WITH SUBMISSION GUIDELINES 3921 Montgomery Road Cincinnati, Ohio 45212 513-841-2428 www.agctsequencing.com CONTENTS Welcome Dye Terminator Sequencing DNA Sequencing Services - Full Service

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

pcas-guide System Validation in Genome Editing

pcas-guide System Validation in Genome Editing pcas-guide System Validation in Genome Editing Tagging HSP60 with HA tag genome editing The latest tool in genome editing CRISPR/Cas9 allows for specific genome disruption and replacement in a flexible

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Supplemental Data. Short Article. PPARγ Activation Primes Human Monocytes. into Alternative M2 Macrophages. with Anti-inflammatory Properties

Supplemental Data. Short Article. PPARγ Activation Primes Human Monocytes. into Alternative M2 Macrophages. with Anti-inflammatory Properties Cell Metabolism, Volume 6 Supplemental Data Short Article PPARγ Activation Primes Human Monocytes into Alternative M2 Macrophages with Anti-inflammatory Properties M. Amine Bouhlel, Bruno Derudas, Elena

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

STATISTICAL DATA ANALYSIS IN EXCEL

STATISTICAL DATA ANALYSIS IN EXCEL Mcroarray Center STATISTICAL DATA ANALYSIS IN EXCEL Lecture 6 Some Advanced Topcs Dr. Petr Nazarov 14-01-013 petr.nazarov@crp-sante.lu Statstcal data analyss n Ecel. 6. Some advanced topcs Correcton for

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Chapter 9. Applications of probability. 9.1 The genetic code

Chapter 9. Applications of probability. 9.1 The genetic code Chapter 9 Applications of probability In this chapter we use the tools of elementary probability to investigate problems of several kinds. First, we study the language of life by focusing on the universal

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Y-chromosome haplotype distribution in Han Chinese populations and modern human origin in East Asians

Y-chromosome haplotype distribution in Han Chinese populations and modern human origin in East Asians Vol. 44 No. 3 SCIENCE IN CHINA (Series C) June 2001 Y-chromosome haplotype distribution in Han Chinese populations and modern human origin in East Asians KE Yuehai ( `º) 1, SU Bing (3 Á) 1 3, XIAO Junhua

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks Bulletn of Mathematcal Bology (21 DOI 1.17/s11538-1-9517-4 ORIGINAL ARTICLE Product-Form Statonary Dstrbutons for Defcency Zero Chemcal Reacton Networks Davd F. Anderson, Gheorghe Cracun, Thomas G. Kurtz

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

Cloning, sequencing, and expression of H.a. YNRI and H.a. YNII, encoding nitrate and nitrite reductases in the yeast Hansenula anomala

Cloning, sequencing, and expression of H.a. YNRI and H.a. YNII, encoding nitrate and nitrite reductases in the yeast Hansenula anomala Cloning, sequencing, and expression of H.a. YNRI and H.a. YNII, encoding nitrate and nitrite reductases in the yeast Hansenula anomala -'Pablo García-Lugo 1t, Celedonio González l, Germán Perdomo l, Nélida

More information

Marine Biology DEC 2004; 146(1) : 53-64 http://dx.doi.org/10.1007/s00227-004-1423-6 Copyright 2004 Springer

Marine Biology DEC 2004; 146(1) : 53-64 http://dx.doi.org/10.1007/s00227-004-1423-6 Copyright 2004 Springer Marine Biology DEC 2004; 146(1) : 53-64 http://dx.doi.org/10.1007/s00227-004-1423-6 Copyright 2004 Springer Archimer http://www.ifremer.fr/docelec/ Archive Institutionnelle de l Ifremer The original publication

More information

Part ONE. a. Assuming each of the four bases occurs with equal probability, how many bits of information does a nucleotide contain?

Part ONE. a. Assuming each of the four bases occurs with equal probability, how many bits of information does a nucleotide contain? Networked Systems, COMPGZ01, 2012 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice question answer sheet.

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

The making of The Genoma Music

The making of The Genoma Music 242 Summary Key words Resumen Palabras clave The making of The Genoma Music Aurora Sánchez Sousa 1, Fernando Baquero 1 and Cesar Nombela 2 1 Department of Microbiology, Ramón y Cajal Hospital, and 2 Department

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM BARRIOT Jean-Perre, SARRAILH Mchel BGI/CNES 18.av.E.Beln 31401 TOULOUSE Cedex 4 (France) Emal: jean-perre.barrot@cnes.fr 1/Introducton The

More information

Title : Parallel DNA Synthesis : Two PCR product from one DNA template

Title : Parallel DNA Synthesis : Two PCR product from one DNA template Title : Parallel DNA Synthesis : Two PCR product from one DNA template Bhardwaj Vikash 1 and Sharma Kulbhushan 2 1 Email: vikashbhardwaj@ gmail.com 1 Current address: Government College Sector 14 Gurgaon,

More information

Module 6: Digital DNA

Module 6: Digital DNA Module 6: Digital DNA Representation and processing of digital information in the form of DNA is essential to life in all organisms, no matter how large or tiny. Computing tools and computational thinking

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Implied (risk neutral) probabilities, betting odds and prediction markets

Implied (risk neutral) probabilities, betting odds and prediction markets Impled (rsk neutral) probabltes, bettng odds and predcton markets Fabrzo Caccafesta (Unversty of Rome "Tor Vergata") ABSTRACT - We show that the well known euvalence between the "fundamental theorem of

More information

Loop Parallelization

Loop Parallelization - - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

ANALYSIS OF GROWTH HORMONE IN TENCH (TINCA TINCA) ANALÝZA RŮSTOVÉHO HORMONU LÍNA OBECNÉHO (TINCA TINCA)

ANALYSIS OF GROWTH HORMONE IN TENCH (TINCA TINCA) ANALÝZA RŮSTOVÉHO HORMONU LÍNA OBECNÉHO (TINCA TINCA) ANALYSIS OF GROWTH HORMONE IN TENCH (TINCA TINCA) ANALÝZA RŮSTOVÉHO HORMONU LÍNA OBECNÉHO (TINCA TINCA) Zrůstová J., Bílek K., Baránek V., Knoll A. Ústav morfologie, fyziologie a genetiky zvířat, Agronomická

More information

pcmv6-neo Vector Application Guide Contents

pcmv6-neo Vector Application Guide Contents pcmv6-neo Vector Application Guide Contents Package Contents and Storage Conditions... 2 Product Description... 2 Introduction... 2 Production and Quality Assurance... 2 Methods... 3 Other required reagents...

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Section 2 Introduction to Statistical Mechanics

Section 2 Introduction to Statistical Mechanics Secton 2 Introducton to Statstcal Mechancs 2.1 Introducng entropy 2.1.1 Boltzmann s formula A very mportant thermodynamc concept s that of entropy S. Entropy s a functon of state, lke the nternal energy.

More information

We are now ready to answer the question: What are the possible cardinalities for finite fields?

We are now ready to answer the question: What are the possible cardinalities for finite fields? Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Fixed income risk attribution

Fixed income risk attribution 5 Fxed ncome rsk attrbuton Chthra Krshnamurth RskMetrcs Group chthra.krshnamurth@rskmetrcs.com We compare the rsk of the actve portfolo wth that of the benchmark and segment the dfference between the two

More information

Sketching Sampled Data Streams

Sketching Sampled Data Streams Sketchng Sampled Data Streams Florn Rusu, Aln Dobra CISE Department Unversty of Florda Ganesvlle, FL, USA frusu@cse.ufl.edu adobra@cse.ufl.edu Abstract Samplng s used as a unversal method to reduce the

More information

Social Nfluence and Its Models

Social Nfluence and Its Models Influence and Correlaton n Socal Networks Ars Anagnostopoulos Rav Kumar Mohammad Mahdan Yahoo! Research 701 Frst Ave. Sunnyvale, CA 94089. {ars,ravkumar,mahdan}@yahoo-nc.com ABSTRACT In many onlne socal

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Generalizing the degree sequence problem

Generalizing the degree sequence problem Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

Molecular chaperones involved in preprotein. targeting to plant organelles

Molecular chaperones involved in preprotein. targeting to plant organelles Molecular chaperones involved in preprotein targeting to plant organelles Dissertation der Fakultät für Biologie der Ludwig-Maximilians-Universität München vorgelegt von Christine Fellerer München 29.

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA*

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* Luísa Farnha** 1. INTRODUCTION The rapd growth n Portuguese households ndebtedness n the past few years ncreased the concerns that debt

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

REGULAR MULTILINEAR OPERATORS ON C(K) SPACES

REGULAR MULTILINEAR OPERATORS ON C(K) SPACES REGULAR MULTILINEAR OPERATORS ON C(K) SPACES FERNANDO BOMBAL AND IGNACIO VILLANUEVA Abstract. The purpose of ths paper s to characterze the class of regular contnuous multlnear operators on a product of

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

CHAPTER 14 MORE ABOUT REGRESSION

CHAPTER 14 MORE ABOUT REGRESSION CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation Exhaustve Regresson An Exploraton of Regresson-Based Data Mnng Technques Usng Super Computaton Antony Daves, Ph.D. Assocate Professor of Economcs Duquesne Unversty Pttsburgh, PA 58 Research Fellow The

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

7 ANALYSIS OF VARIANCE (ANOVA)

7 ANALYSIS OF VARIANCE (ANOVA) 7 ANALYSIS OF VARIANCE (ANOVA) Chapter 7 Analyss of Varance (Anova) Objectves After studyng ths chapter you should apprecate the need for analysng data from more than two samples; understand the underlyng

More information

On Lockett pairs and Lockett conjecture for π-soluble Fitting classes

On Lockett pairs and Lockett conjecture for π-soluble Fitting classes On Lockett pars and Lockett conjecture for π-soluble Fttng classes Lujn Zhu Department of Mathematcs, Yangzhou Unversty, Yangzhou 225002, P.R. Chna E-mal: ljzhu@yzu.edu.cn Nanyng Yang School of Mathematcs

More information