• Title/Summary/Keyword: Time-variant

Search Result 437, Processing Time 0.038 seconds

Effect of Next-Generation Exome Sequencing Depth for Discovery of Diagnostic Variants

  • Kim, Kyung;Seong, Moon-Woo;Chung, Won-Hyong;Park, Sung Sup;Leem, Sangseob;Park, Won;Kim, Jihyun;Lee, KiYoung;Park, Rae Woong;Kim, Namshin
    • Genomics & Informatics
    • /
    • v.13 no.2
    • /
    • pp.31-39
    • /
    • 2015
  • Sequencing depth, which is directly related to the cost and time required for the generation, processing, and maintenance of next-generation sequencing data, is an important factor in the practical utilization of such data in clinical fields. Unfortunately, identifying an exome sequencing depth adequate for clinical use is a challenge that has not been addressed extensively. Here, we investigate the effect of exome sequencing depth on the discovery of sequence variants for clinical use. Toward this, we sequenced ten germ-line blood samples from breast cancer patients on the Illumina platform GAII(x) at a high depth of ${\sim}200{\times}$. We observed that most function-related diverse variants in the human exonic regions could be detected at a sequencing depth of $120{\times}$. Furthermore, investigation using a diagnostic gene set showed that the number of clinical variants identified using exome sequencing reached a plateau at an average sequencing depth of about $120{\times}$. Moreover, the phenomena were consistent across the breast cancer samples.

Shprintzen-Goldberg syndrome with a novel missense mutation of SKI in a 6-month-old boy

  • Jeon, Min Jin;Park, Seul Gi;Kim, Man Jin;Lim, Byung Chan;Kim, Ki Joong;Chae, Jong Hee;Kim, Soo Yeon
    • Journal of Genetic Medicine
    • /
    • v.17 no.1
    • /
    • pp.43-46
    • /
    • 2020
  • The Shprintzen-Goldberg syndrome (SGS) is an extremely rare genetic disorder caused by heterozygous variant in SKI. SGS is characterized by neurodevelopmental impairment with skeletal anomaly. Recognition of SGS is sometimes quite challenging in practice because it has diverse clinical features involving skeletal, neurological, and cardiovascular system. Here we report a case of a 6-month-old boy who initially presented with developmental delay and marfanoid facial features including prominent forehead, hypertelorism, high arched palate and retrognathia. He showed motor developmental delay since birth and could not control his head at the time of first evaluation. His height was above 2 standard deviation score. Arachnodactyly, hypermobility of joints, skin laxity, and pectus excavatum were also noted. Sequencing for FBN1 was negative, however, a novel missense variant, c.350G>A in SKI was identified by sequential whole exome sequencing. To our knowledge, this is the first case with SGS with phenotypic features of SGS overlapping with those of the Marfan syndrome, diagnosed by next generation sequencing in Korea.

On-demand Allocation of Multiple Mutual-compensating Resources in Wireless Downlinks: a Multi-server Case

  • Han, Han;Xu, Yuhua;Huang, Qinfei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.921-940
    • /
    • 2015
  • In this paper, we investigate the multi-resource allocation problem, a unique feature of which is that the multiple resources can compensate each other while achieving the desired system performance. In particular, power and time allocations are jointly optimized with the target of energy efficiency under the resource-limited constraints. Different from previous studies on the power-time tradeoff, we consider a multi-server case where the concurrent serving users are quantitatively restricted. Therefore user selection is investigated accompanying the resource allocation, making the power-time tradeoff occur not only between the users in the same server but also in different servers. The complex multivariate optimization problem can be modeled as a variant of 2-Dimension Bin Packing Problem (V2D-BPP), which is a joint non-linear and integer programming problem. Though we use state decomposition model to transform it into a convex optimization problem, the variables are still coupled. Therefore, we propose an Iterative Dual Optimization (IDO) algorithm to obtain its optimal solution. Simulations show that the joint multi-resource allocation algorithm outperforms two existing non-joint algorithms from the perspective of energy efficiency.

Time-Varying Parameter Estimation of Passive Telemetry RF Sensor System Using RLS Algorithm (RLS 알고리즘을 이용한 원격 RF 센서 시스템의 시변 파라메타 추정)

  • Kim, Kyung-Yup;Yu, Dong-Gook;Lee, Joon-Tark
    • Proceedings of the KIEE Conference
    • /
    • 2007.04c
    • /
    • pp.29-33
    • /
    • 2007
  • In this paper, time-varying parameter of passive telemetry RF sensor system is estimated using RLS(Rescursive $\leq$* Square) algorithm. In order to overcome the problems such as power limits and complication that general RF sensor system including IC chip has, the principle of inductive coupling is applied to model sensor system The model parameter is rearranged for applying RLS algorithm based on mathematical model to the derived model using inductive coupling principle. Time variant parameter of rearranged model is estimated using forgetting factor, and in case measured data is contaminated by noise and modelling error, the performance of RLS algorithm characterized by the convergence of squared error sum is verified by simulation.

  • PDF

Scenario based optimization of a container vessel with respect to its projected operating conditions

  • Wagner, Jonas;Binkowski, Eva;Bronsart, Robert
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.6 no.2
    • /
    • pp.496-506
    • /
    • 2014
  • In this paper the scenario based optimization of the bulbous bow of the KRISO Container Ship (KCS) is presented. The optimization of the parametrically modeled vessel is based on a statistically developed operational profile generated from noon-to-noon reports of a comparable 3600 TEU container vessel and specific development functions representing the growth of global economy during the vessels service time. In order to consider uncertainties, statistical fluctuations are added. An analysis of these data lead to a number of most probable upcoming operating conditions (OC) the vessel will stay in the future. According to their respective likeliness an objective function for the evaluation of the optimal design variant of the vessel is derived and implemented within the parametrical optimization workbench FRIENDSHIP Framework. In the following this evaluation is done with respect to vessel's calculated effective power based on the usage of potential flow code. The evaluation shows, that the usage of scenarios within the optimization process has a strong influence on the hull form.

Design and Implementation of a Network-Adaptive Mechanism for HTTP Video Streaming

  • Kim, Yo-Han;Shin, Jitae;Park, Jiho
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.27-34
    • /
    • 2013
  • This paper proposes a network-adaptive mechanism for HTTP-based video streaming over wireless/mobile networks. To provide adaptive video streaming over wireless/mobile networks, the proposed mechanism consists of a throughput estimation scheme in the time-variant wireless network environment and a video rate selection algorithm used to increase the streaming quality. The adaptive video streaming system with proposed modules is implemented using an open source multimedia framework and is validated over emulated wireless/mobile networks. The emulator helps to model and emulate network conditions based on data collected from actual experiments. The experiment results show that the proposed mechanism provides higher video quality than the existing system provides and a rate of video streaming almost void of freezing.

AUTHENTICATION PROTOCOL: METHODS REVIEW

  • Cahyo Crysdian;Abdullah, Abdul-Hanan
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.242-245
    • /
    • 2002
  • Authentication protocol as a part of security system has been growth rapidly since it was known that sending clear text password in the network is unsecured. Many protocols could be noted proposed to strengthen the authentication process. In 1985 an attempt to safeguard network services within Athena project resulting on the born of Kerberos 〔1〕〔8〕, one of the protocol that has a lot of attention from the research community. Several years later researchers were discovered some weaknesses carried by this protocol 〔2〕〔21〕. In 1992. EKE was introduced by Bellovin and Merrit. Since that time, many protocols introduced could be considered as its variant 〔5〕〔9〕〔13〕〔14〕. Some other protocols such as OKE〔5〕 and SRP〔18〕 although claimed different from EKE, they have the same basic mechanism in holding authentication process. Here, we explain the mechanism of those protocols, their strength and their weaknesses and shortcomings. Due to the limitations of the number of paper pages, only two types of authentication protocol can be explained here i.e EKE and SRP.

  • PDF

RLSE Based Batteryless Telemetry Capacitive Sensor System

  • Lee, Joon-Tark;Kim, Kyung-Yup
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.318-321
    • /
    • 2003
  • In case, sensor system performs where it is difficult to access physically and it is in the poor environment, it is limited to communicate by using wire and installing power module in sensor system. In this paper, it suggests how information is obtained from telemetry sensor by means of inductive coupling without battery. Comparing with the telemetry sensor system of inductive coupling by the power supply, this system estimates the capacitance of sensor with high precision in using RLSE, not the process of modulation and demodulation. In order to activate this system, inductive model is used and in case of time variant parameter, telemetry sensor system which has got high rate in accuracy is implemented by using the forgetting factor.

  • PDF

Time Variant Event Ontology for Temporal People Information

  • Han, Yong-Jin;Park, Se-Young;Park, Seong-Bae;Lee, Young-Hwa;Kim, Kweon-Yang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.4
    • /
    • pp.301-306
    • /
    • 2007
  • The people information is distributed in various forms such as database, web page, text, and so on, where the world wide web is one of the main sources of publicly-available people information. It has a characteristic that the information on people is intrinsically temporal. Therefore, the reconstruction of the information is needed for an individual or a company to use it efficiently. In order to maintain or manage the temporal people information, it must distinguish the variable information from invariable information of people. In this paper, we propose a method that constructs an ontology based on events to manage the variable people information efficiently. In addition, we present a system which reconstructs people information that satisfies the users' demand with the ontology.

New Analysis on the Generalization of SC Systems for the Reception of M-ary Signals over Nakagami Fading Channels

  • Kim Hong-Chul;Kim Chang-Hwan
    • Journal of electromagnetic engineering and science
    • /
    • v.4 no.4
    • /
    • pp.190-196
    • /
    • 2004
  • An alternative solution to the problem of obtaining acceptable performances on a fading channel is the diversity technique, which is widely used to combat the fading effects of time-variant channels. The symbol error probability of M-ary DPSK(MDPSK), PSK(MPSK) and QAM(MQAM) systems using 2 branches from the branch with the largest signal-to-noise ratio(SNR) at the output of L-branch selection combining(SC), i.e., SC2 in frequency- nonselective slow Nakagami fading channels with an additive white Gaussian noise(AWGN) is derived theoretically. These performance evaluations allow designers to determine M-ary modulation methods for Nakagami fading channels.