01842nam 2200589 450 99646649320331620220820140005.03-540-36991-010.1007/BFb0065476(CKB)1000000000438179(SSID)ssj0000326801(PQKBManifestationID)12069602(PQKBTitleCode)TC0000326801(PQKBWorkID)10296853(PQKB)11324315(DE-He213)978-3-540-36991-2(MiAaPQ)EBC5594722(Au-PeEL)EBL5594722(OCoLC)1076260480(MiAaPQ)EBC6819124(Au-PeEL)EBL6819124(OCoLC)793078444(PPN)155165321(EXLCZ)99100000000043817920220820d1977 uy 0engurnn|008mamaatxtccrSpectral decompositions on banach spaces /by I. Erdelyi, R. Lange1st ed. 1977.Berlin ;Heidelberg ;New York :Springer,[1977]©19771 online resource (X, 122 p.) Lecture notes in mathematics ;623Bibliographic Level Mode of Issuance: Monograph3-540-08525-4 Invariant subspaces -- The general spectral decomposition -- Asymptotic spectral decompositions -- Decomposable operators.Lecture notes in mathematics (Springer-Verlag) ;623.Banach spacesBanach spaces.515.732Erdelyi Ivan1926-41535Lange R.MiAaPQMiAaPQMiAaPQBOOK996466493203316Spectral decompositions on Banach spaces262842UNISA04686oam 2200433 450 991013680400332120230621141041.09782889197798 (ebook)(CKB)3710000000631097(oapen)https://directory.doabooks.org/handle/20.500.12854/45330(EXLCZ)99371000000063109720191103c2016uuuu uu |engurmn|---annantxtrdacontentcrdamediacrrdacarrierDNA replication origins in microbial genomes[electronic resource] /edited by Feng GaoFrontiers Media SA2016France :Frontiers Media SA,20161 online resource (115 pages) illustrations, chartsFrontiers Research TopicsIncludes bibliographical references.DNA replication, a central event for cell proliferation, is the basis of biological inheritance. Complete and accurate DNA replication is integral to the maintenance of the genetic integrity of organisms. In all three domains of life, DNA replication begins at replication origins. In bacteria, replication typically initiates from a single replication origin (oriC), which contains several DnaA boxes and the AT-rich DNA unwinding element (DUE). In eukaryotic genomes, replication initiates from significantly more replication origins, activated simultaneously at a specific time. For eukaryotic organisms, replication origins are best characterized in the unicellular eukaryote budding yeast Saccharomyces cerevisiae and the fission yeast Schizosaccharomyces pombe. The budding yeast origins contain an essential sequence element called the ARS (autonomously replicating sequence), while the fission yeast origins consist of AT-rich sequences. Within the archaeal domain, the multiple replication origins have been identified by a predict-and-verify approach in the hyperthermophilic archaeon Sulfolobus. The basic structure of replication origins is conserved among archaea, typically including an AT-rich unwinding region flanked by several short repetitive DNA sequences, known as origin recognition boxes (ORBs). It appears that archaea have a simplified version of the eukaryotic replication apparatus, which has led to considerable interest in the archaeal machinery as a model of that in eukaryotes. The research on replication origins is important not only in providing insights into the structure and function of the replication origins but also in understanding the regulatory mechanisms of the initiation step in DNA replication. Therefore, intensive studies have been carried out in the last two decades. The pioneer work to identify bacterial oriCs in silico is the GC-skew analysis. Later, a method of cumulative GC skew without sliding windows was proposed to give better resolution. Meanwhile, an oligomer-skew method was also proposed to predict oriC regions in bacterial genomes. As a unique representation of a DNA sequence, the Z-curve method has been proved to be an accurate and effective approach to predict bacterial and archaeal replication origins. Budding yeast origins have been predicted by Oriscan using similarity to the characterized ones, while the fission yeast origins have been identified initially from AT content calculation. In comparison with the in silico analysis, the experimental methods are time-consuming and labor-intensive, but convincing and reliable. To identify microbial replication origins in vivo or in vitro, a number of experimental methods have been used including construction of replicative oriC plasmids, microarray-based or high-throughput sequencing-based marker frequency analysis, two-dimensional gel electrophoresis analysis and replication initiation point mapping (RIP mapping). The recent genome-wide approaches to identify and characterize replication origin locations have boosted the number of mapped yeast replication origins. In addition, the availability of increasing complete microbial genomes and emerging approaches has created challenges and opportunities for identification of their replication origins in silico, as well as in vivo and in vitro.orisomeReplication OriginCell-cycleArchaeaorigin recognition complex (ORC)BacteriaDNA ReplicationReplication regulationyeastRegulatory proteinsFeng Gaoauth1366795UkMaJRU9910136804003321DNA replication origins in microbial genomes3389349UNINA05175nam 22006135 450 991025424460332120200629225653.03-319-31515-310.1007/978-3-319-31515-7(CKB)3710000000649223(EBL)4509028(SSID)ssj0001665852(PQKBManifestationID)16454474(PQKBTitleCode)TC0001665852(PQKBWorkID)14999850(PQKB)11616485(DE-He213)978-3-319-31515-7(MiAaPQ)EBC4509028(PPN)193444771(EXLCZ)99371000000064922320160418d2016 u| 0engur|n|---|||||txtccrHiding Data - Selected Topics Rudolf Ahlswede’s Lectures on Information Theory 3 /by Rudolf Ahlswede ; edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe, Ulrich Tamm1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (367 p.)Foundations in Signal Processing, Communications and Networking,1863-8538 ;12Description based upon print version of record.3-319-31513-7 Includes bibliographical references at the end of each chapters and index.Chapter I A Short Course on Cryptography -- Chapter II Authentication and Secret-Key Cryptology -- Chapter III The Mathematical Background of the Advanced Encryption Standard -- Chapter IV Elliptic Curve Cryptosystems -- Chapter V Founding Cryptography on Oblivious Transfer -- Supplement.Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede’s lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rüdiger Reischuk contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.Foundations in Signal Processing, Communications and Networking,1863-8538 ;12Information theoryInformation and Communication, Circuitshttps://scigraph.springernature.com/ontologies/product-market-codes/M13038Information theory.Information and Communication, Circuits.001.539Ahlswede Rudolfauthttp://id.loc.gov/vocabulary/relators/aut313411Ahlswede Alexanderedthttp://id.loc.gov/vocabulary/relators/edtAlthöfer Ingoedthttp://id.loc.gov/vocabulary/relators/edtDeppe Christianedthttp://id.loc.gov/vocabulary/relators/edtTamm Ulrichedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910254244603321Hiding Data - Selected Topics2497674UNINA03406nam 2200649z- 450 991055736790332120220111(CKB)5400000000042212(oapen)https://directory.doabooks.org/handle/20.500.12854/76293(oapen)doab76293(EXLCZ)99540000000004221220202201d2021 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierCircuits and Systems Advances in Near Threshold ComputingBasel, SwitzerlandMDPI - Multidisciplinary Digital Publishing Institute20211 online resource (120 p.)3-0365-0720-5 3-0365-0721-3 Modern society is witnessing a sea change in ubiquitous computing, in which people have embraced computing systems as an indispensable part of day-to-day existence. Computation, storage, and communication abilities of smartphones, for example, have undergone monumental changes over the past decade. However, global emphasis on creating and sustaining green environments is leading to a rapid and ongoing proliferation of edge computing systems and applications. As a broad spectrum of healthcare, home, and transport applications shift to the edge of the network, near-threshold computing (NTC) is emerging as one of the promising low-power computing platforms. An NTC device sets its supply voltage close to its threshold voltage, dramatically reducing the energy consumption. Despite showing substantial promise in terms of energy efficiency, NTC is yet to see widescale commercial adoption. This is because circuits and systems operating with NTC suffer from several problems, including increased sensitivity to process variation, reliability problems, performance degradation, and security vulnerabilities, to name a few. To realize its potential, we need designs, techniques, and solutions to overcome these challenges associated with NTC circuits and systems. The readers of this book will be able to familiarize themselves with recent advances in electronics systems, focusing on near-threshold computing.Technology: general issuesbicsscacceleratorsAIcross-layer optimizationdeep neural network (DNN)edge devicesembedded systemenergy efficiencyfunctional unitgait analysislow-powerlow-voltage memory and clocking circuitsmachine learningminimum-energy designmultiply and accumulate (MAC)Near-Threshold Computingnear-threshold computing (NTC)neural networksNTCNTVperformance optimizationpower managementpower-performancereliabilityresilient adaptive computingtensor processing unit (TPU)timing errorTechnology: general issuesRoy Sanghamitraedt1289229Roy SanghamitraothBOOK9910557367903321Circuits and Systems Advances in Near Threshold Computing3021115UNINA