Institutes
Refine
Year of publication
Document Type
- Doctoral Thesis (91)
- Article (56)
- Bachelor Thesis (17)
- Book (13)
- Master's Thesis (10)
- Conference Proceeding (4)
- Contribution to a Periodical (4)
- Habilitation (2)
- Preprint (2)
- Diploma Thesis (1)
Has Fulltext
- yes (200)
Is part of the Bibliography
- no (200) (remove)
Keywords
- Machine Learning (5)
- NLP (4)
- ALICE (3)
- Annotation (3)
- Text2Scene (3)
- TextAnnotator (3)
- Virtual Reality (3)
- mathematics education (3)
- Artificial intelligence (2)
- Blockchain (2)
- CBM experiment (2)
- Cellular Automaton (2)
- Computer Vision (2)
- Experimental nuclear physics (2)
- Experimental particle physics (2)
- FPGA (2)
- Machine learning (2)
- MathCityMap (2)
- Natural Language Processing (2)
- Positive polynomials (2)
- Simulation (2)
- Sums of arithmetic-geometric exponentials (2)
- Tracking (2)
- algorithms (2)
- 11N45 (1)
- 14N10 (secondary) (1)
- 2-SAT (1)
- 30F30 (1)
- 32G15 (primary) (1)
- AI Safety (1)
- ALICE experiment (1)
- Ageing (1)
- Agent (1)
- Akademische Zertifikate (1)
- Algebraic Hodge polynomial (1)
- Algebraic number theory (1)
- Anabelian Geometry (1)
- Anemia management (1)
- Approximation Algorithms (1)
- Arithmetic-geometric exponentials (1)
- Augmented reality (1)
- Autonomous Driving (1)
- Autophagy (1)
- Autorensystem (1)
- BIOfid (1)
- Bayesian Persuasion (1)
- Bayesian Statistics (1)
- Belief Propagation (1)
- Bert (1)
- Bifurcation Theory (1)
- Big Data (1)
- Big Data Benchmarks (1)
- Biodiversity (1)
- Bioinformatik (1)
- Biological sciences (1)
- Blood loss calculator (1)
- Blood loss formula (1)
- Blood management (1)
- Boundary elements (1)
- Brownian motion (1)
- C++ (1)
- CBM (1)
- COGNIMUSE (1)
- COVID-19 pandemic (1)
- Calderón operator (1)
- Capital gains taxes (1)
- Changes in labor markets (1)
- Classification (1)
- Cognitive Maps (1)
- Cognitive Spatial Distortions (1)
- Convexity (1)
- Convolution quadrature (1)
- Curvature measure (1)
- Cycle class (1)
- DDC (1)
- DNN Robustness (1)
- Data Acquisition (1)
- Datenanalyse (1)
- Deep Learning (1)
- Delegated Search (1)
- Demuškin groups (1)
- Dewey Decimal Classification (1)
- Diagnostic markers (1)
- Diagramme und Mathematiklernen (1)
- Digitale Pathologie (1)
- Distributional super-solution (1)
- Docker (1)
- Dual cone (1)
- Educational texttechnology (1)
- Event Buffering (1)
- Exponential sums (1)
- External-memory graph algorithms (1)
- Failure Erasure Code (1)
- Finance (1)
- Finite elements (1)
- Finitely many measurements (1)
- Fractional Laplacian (1)
- Functional magnetic resonance imaging (1)
- Future of work (1)
- GABAergic (1)
- GPGPU (1)
- GPU (1)
- Gale-dual pairs (1)
- Gaussian Processes (1)
- Gesten beim Mathematiklernen (1)
- Gesten-Lautsprache-Relationen (1)
- Google Bert (1)
- Graph Neural Networks (1)
- Graph generation (1)
- Graphentheorie (1)
- Ground Texture (1)
- HLT (1)
- HPC (1)
- Hadron-hadron interactions (1)
- Hardy’s inequality (1)
- Heavy Ion experiments (1)
- Hidden Markov Model (1)
- High energy physics (1)
- High-Level-Trigger (1)
- Higher education (1)
- Historical Document Analysis (1)
- Hodge conjecture (1)
- Hopf boundary lemma (1)
- Human factors (1)
- Human-enhancing technologies (1)
- I/O efficiency (1)
- Immunology (1)
- Individual differences (1)
- Information Retrieval (1)
- Intelligence augmentation (1)
- Inter-annotator agreement (1)
- Inverse Problem (1)
- IsoSpace (1)
- Kalman Filter (1)
- Kapitalertragsteuern (1)
- K–12 (1)
- LDPC Codes (1)
- Lattice path matroids (1)
- Leapfrog (1)
- Learning analytics (1)
- Limit mixed Hodge structures (1)
- Linear regression analysis (1)
- Linpack (1)
- Lipschitz–Killing measures (1)
- Localization (1)
- Loewner order (1)
- Log convex sets (1)
- Lyapunov exponents (1)
- Many-core computer architectures (1)
- Mathematical biosciences (1)
- Mathematik (1)
- Mathematikdidaktik (1)
- Mathtrails (1)
- Mc Kean martingale (1)
- MediaEval 2016 (1)
- Mobile (1)
- Mobile Learning (1)
- Moduli space of semi-stable sheaves (1)
- Mollifier decorrelation (1)
- Mollifier multiscale reconstruction and decomposition (1)
- Monocular Scene Flow (1)
- Monotonicity (1)
- Multiparametric MRI (1)
- Multiplicative convexity (1)
- Named entity recognition (1)
- Networking (1)
- Neural Networks (1)
- Neural networks (1)
- Neuronales Netz (1)
- Neuroscience (1)
- Nodal curves (1)
- Non-Fungible-Token (1)
- Non-negativity certificate (1)
- Nonlinear Schrödinger equation (1)
- Nonlocal Neumann conditions (1)
- Nonlocal normal derivative (1)
- Nonlocal operators (1)
- Online Algorithms (1)
- OpenStreetMap (1)
- OpenStreetMap quality evaluation (1)
- Optimal stopping problem (1)
- Optimales Stoppproblem (1)
- Orbital stability (1)
- Parallel Computing (1)
- Parallel and SIMD calculations (1)
- Partial Differential Equations (1)
- Pedestrian Detection (1)
- Perfect graphs (1)
- Permutation (1)
- Podospora anserina (1)
- Pointwise super-solution (1)
- Polyhedron (1)
- Positive function (1)
- Positive signomials (1)
- Potential methods in exploration (1)
- Preclinical research (1)
- Predictive markers (1)
- Processor (1)
- Prognostic markers (1)
- Prostate cancer (1)
- Protein-protein interaction (1)
- Pseudo-Riemannian manifolds (1)
- Public Administration (1)
- Public Transport (1)
- RADIUS Protocol (1)
- Radiomics (1)
- Random CSP (1)
- Random Graphs (1)
- Random Matrices (1)
- Random graphs (1)
- Reflexive polytopes (1)
- Regional Laplacian (1)
- Regional fractional Laplacian (1)
- Reinforcement Learning (1)
- Relativistic heavy-ion collisions (1)
- Robotics (1)
- SIMD (1)
- SLAM (1)
- STAR (1)
- STAR experiment (1)
- STEM education (1)
- Script Compression (1)
- Second-order cone (1)
- Semantic portal (1)
- Semantics (1)
- Semiotik nach C. S. Peirce (1)
- Sensory perception (1)
- Sign-changing solutions (1)
- Signed Birkhoff polytopes (1)
- Simplicial complexes (1)
- Smartphone (1)
- Specialized information service (1)
- Spectral Theory (1)
- Standard monomials (1)
- Standing waves (1)
- Strange particles (1)
- Student expectations (1)
- Sublinear circuit (1)
- Sums of non-negative circuit polynomials (1)
- Sums of nonnegative circuit polynomials (SONC) (1)
- Surgical blood loss (1)
- Symmetries (1)
- Symmetry Breaking (1)
- TRD (1)
- TTLab (1)
- Taxon (1)
- Text Annotation (1)
- TextImager (1)
- Themenklassifikation (1)
- Thermoelastic wave equation (1)
- Tobler's First Law (1)
- Tokenisierung (1)
- Toxicity (1)
- Traffic Scenes (1)
- Transcriptome analysis (1)
- Translational research (1)
- Transparent boundary conditions (1)
- UIMA (1)
- Unconditional polytopes (1)
- Unimodular triangulations (1)
- Unity (1)
- UrQMD (1)
- Valuation (1)
- Vannotator (1)
- Variational Methods (1)
- Verkehr (1)
- Virtual reality (1)
- Virtuelle Realität (1)
- Vision (1)
- Visual cortex (1)
- Volunteered Geographic Information (1)
- Wavelet decomposition (1)
- Weak super-solution (1)
- Web (1)
- Web Based Training (1)
- Weyl principle (1)
- affective computing (1)
- algebraic thinking (1)
- algorithm engineering (1)
- anabelian geometry (1)
- approximation algorithms (1)
- arithmetic geometry (1)
- autoregressive GANs (1)
- average-case complexity (1)
- barrel cortex (1)
- bioinformatics (1)
- bistable perception (1)
- catastrophic forgetting (1)
- central limit theorem (1)
- changepoint (1)
- chatbots (1)
- cluster computing (1)
- co-located collaboration analytics (1)
- coding theory (1)
- collaboration (1)
- collaboration analytics (1)
- computational thinking (1)
- computer vision (1)
- continual deep learning (1)
- convergence (1)
- cover times (1)
- data parallel (1)
- data structures (1)
- debugging (1)
- deep generative models (1)
- deformable model (1)
- density maps (1)
- density visualization (1)
- digital distractions (1)
- digital learning (1)
- digitization (1)
- disaster risk management (1)
- discrepancy principle (1)
- distance learning (1)
- domains (1)
- dynamic algorithms (1)
- education (1)
- educational technology (1)
- emotion generation (1)
- emotion prediction (1)
- epilepsy, epileptogenesis, model, neuro-immune, neuroinflammation, blood brain barrier, seizure (1)
- equity and access to technology (1)
- erasure codes (1)
- error correction codes (1)
- event reconstruction (1)
- external memory (1)
- extreme value theory (1)
- field mapping (1)
- field papers (1)
- flood risk perception (1)
- flooding (1)
- fringe tree (1)
- fundamental theorem of asset pricing (1)
- generic tasks (1)
- graph theory (1)
- group speech analytics (1)
- hierarchical fields (1)
- high performance computing (1)
- independence number (1)
- information processing (1)
- information transfer (1)
- inquiry-based education (1)
- interactive data analysis (1)
- k-shortest path (1)
- literature review (1)
- machine learning (1)
- math trails (1)
- mathematics (1)
- media multitasking (1)
- mikroskopisch (1)
- multimodal (1)
- multimodal fusion (1)
- multimodal learning analytics (1)
- neural network decoder (1)
- neural networks (1)
- neural ordinary differential equation (1)
- neuronal morphology (1)
- neuroscience (1)
- no unbounded profit with bounded risk (1)
- octonions (1)
- online bayesian change point detection (1)
- open-set recognition (1)
- optimal coding (1)
- optimality (1)
- outdoor activities (1)
- outdoors (1)
- parallel file systems (1)
- parallel programming (1)
- patricia trie (1)
- pedagogical roles (1)
- phase coding (1)
- point inversion (1)
- point process (1)
- positivity preserving property (1)
- privacy (1)
- privacy-enhancing technologies (1)
- problem solving (1)
- proportional transaction costs (1)
- protein assembly (1)
- protein structure (1)
- random energy model (1)
- random tree (1)
- real world problems ; (1)
- representation learning (1)
- respiratory complex I (1)
- satisfiability problem (1)
- section conjecture (1)
- security (1)
- security management (1)
- self-attention (1)
- self-control (1)
- self-regulation (1)
- semimartingales (1)
- shape prior (1)
- shortest path (1)
- social engineering (1)
- spectral cut-off (1)
- spike timing (1)
- spin group (1)
- statistical inverse problems (1)
- statistical shape analysis (1)
- stochastic integration (1)
- stochastic model (1)
- storage (1)
- sum-product algorithm (1)
- synaptogenesis (1)
- synchronous teaching (1)
- task design (1)
- teaching with technology (1)
- technology-enhanced learning (1)
- torsion function (1)
- transfer entropy (1)
- valuation (1)
- variational inference (1)
- vectorization (1)
- video prediction (1)
- visual programming (1)
- ÖPNV (1)
- 𝒮-cone (1)
Institute
Das adaptive Immunsystem schützt den Menschen vor extra- wie auch intrakorporal auftretenden Pathogenen und Krebszellen. Die Funktionalität dieses Prozesses geht hierbei auf die Interaktion und Kooperation einer Vielzahl verschiedener Zelltypen des Körpers zurück und ist vorwiegend innerhalb der Lymphknoten lokalisiert. Ist auch nur ein Bestandteil dieses sensiblen Prozesses gestört, kann dies zu einem teilweisen oder vollständigen Verlust der immunologischen Fitness des Menschen führen. Daher war es das Ziel dieser Arbeit, solche Aberrationen des humanen Lymphknotengewebes umfassend digital-pathologisch zu detektieren und zu definieren.
Hierfür wurde zunächst eine digitale Gewebedatenbank etabliert. Diese basiert auf dem im Rahmen dieser Arbeit implementierten Content-Management-System Digital Tissue Management Suite. Weiterhin wurde die Software Feature analysis in tissue histomorphometry entwickelt, welche die Analyse von zweidimensionalen whole slide images ermöglicht. Hierbei werden Methoden aus dem Bereich Computer Vision und Graphentheorie eingesetzt, um morphologische und distributionale Eigenschaften der Zelltypen des Lymphknotens zu charakterisieren. Darüber hinaus enthält diese Software Plug-ins zur Visualisierung und statistischen Analyse der Daten.
Aufbauend auf der eigens implementierten, digitalen Infrastruktur, in Kombination mit der Software Imaris wurden zweidimensional und dreidimensional gescannte, reaktive und neoplastische Gewebeproben digital phänotypisiert. Hierbei konnten neue mechanische Barrieren zur Kompartimentalisierung der Keimzentren aufgeklärt werden. Weiterhin konnte der Erhalt des quantitativen Verhältnisses einzelner Zellpopulationen innerhalb der Keimzentren beschrieben werden. Ausgehend von den reaktiven Phänotypen des Lymphknotens, wurden pathophysiologische Aberrationen in verschiedenen lymphatischen Neoplasien untersucht. Hierbei konnte gezeigt werden, dass speziell die strukturelle Destruktion häufig mit einer morphologischen Veränderung der fibroblastischen Retikulumzellen einhergeht.
Neben strukturellen Veränderungen sind auch zytologische Veränderungen der Tumormikroumgebung zu verzeichnen. Eine besondere Rolle spielen hierbei sogenannte Tumor-assoziierte Makrophagen. Im Rahmen dieser Arbeit konnte gezeigt werden, dass speziell Makrophagen in der Tumormikroumgebung des diffus großzelligen B-Zell-Lymphoms und der chronisch lymphatischen Leukämie spezifische pathophysiologische Veränderungen aufzeigen. Auch konnte gezeigt werden, dass genetische Änderungen neoplastischer B-Zellen mit einer generellen Reduktion der CD20-Antigendichte einhergehen.
Zusammenfassend ermöglichten die Ergebnisse die Generierung eines umfassenden digital-pathologischen Profils des klassischen Hodgkin-Lymphoms. Hierbei konnten morphologische Veränderungen neoplastischer, CD30-positiver Hodgkin-Reed-Sternberg-Zellen validiert und beschrieben werden. Auch konnten pathologische Veränderungen des Konnektoms und der Tumormikroumgebung dieser Zellen parametrisiert und quantifiziert werden. Abschließend wurde unter Anwendung eines Random forest-Klassifikators die diagnostische Potenz digital-pathologischer Profile evaluiert und validiert.
FEM–BEM coupling for the thermoelastic wave equation with transparent boundary conditions in 3D
(2022)
We consider the thermoelastic wave equation in three dimensions with transparent boundary conditions on a bounded, not necessarily convex domain. In order to solve this problem numerically, we introduce a coupling of the thermoelastic wave equation in the interior domain with time-dependent boundary integral equations. Here, we want to highlight that this type of problem differs from other wave-type problems that dealt with FEM–BEM coupling so far, e.g., the acoustic as well as the elastic wave equation, since our problem consists of coupled partial differential equations involving a vector-valued displacement field and a scalar-valued temperature field. This constitutes a nontrivial challenge which is solved in this paper. Our main focus is on a coercivity property of a Calderón operator for the thermoelastic wave equation in the Laplace domain, which is valid for all complex frequencies in a half-plane. Combining Laplace transform and energy techniques, this coercivity in the frequency domain is used to prove the stability of a fully discrete numerical method in the time domain. The considered numerical method couples finite elements and the leapfrog time-stepping in the interior with boundary elements and convolution quadrature on the boundary. Finally, we present error estimates for the semi- and full discretization.
The development of epilepsy (epileptogenesis) involves a complex interplay of neuronal and immune processes. Here, we present a first-of-its-kind mathematical model to better understand the relationships among these processes. Our model describes the interaction between neuroinflammation, blood-brain barrier disruption, neuronal loss, circuit remodeling, and seizures. Formulated as a system of nonlinear differential equations, the model reproduces the available data from three animal models. The model successfully describes characteristic features of epileptogenesis such as its paradoxically long timescales (up to decades) despite short and transient injuries or the existence of qualitatively different outcomes for varying injury intensity. In line with the concept of degeneracy, our simulations reveal multiple routes toward epilepsy with neuronal loss as a sufficient but non-necessary component. Finally, we show that our model allows for in silico predictions of therapeutic strategies, revealing injury-specific therapeutic targets and optimal time windows for intervention.
AttendAffectNet-emotion prediction of movie viewers using multimodal fusion with self-attention
(2021)
In this paper, we tackle the problem of predicting the affective responses of movie viewers, based on the content of the movies. Current studies on this topic focus on video representation learning and fusion techniques to combine the extracted features for predicting affect. Yet, these typically, while ignoring the correlation between multiple modality inputs, ignore the correlation between temporal inputs (i.e., sequential features). To explore these correlations, a neural network architecture—namely AttendAffectNet (AAN)—uses the self-attention mechanism for predicting the emotions of movie viewers from different input modalities. Particularly, visual, audio, and text features are considered for predicting emotions (and expressed in terms of valence and arousal). We analyze three variants of our proposed AAN: Feature AAN, Temporal AAN, and Mixed AAN. The Feature AAN applies the self-attention mechanism in an innovative way on the features extracted from the different modalities (including video, audio, and movie subtitles) of a whole movie to, thereby, capture the relationships between them. The Temporal AAN takes the time domain of the movies and the sequential dependency of affective responses into account. In the Temporal AAN, self-attention is applied on the concatenated (multimodal) feature vectors representing different subsequent movie segments. In the Mixed AAN, we combine the strong points of the Feature AAN and the Temporal AAN, by applying self-attention first on vectors of features obtained from different modalities in each movie segment and then on the feature representations of all subsequent (temporal) movie segments. We extensively trained and validated our proposed AAN on both the MediaEval 2016 dataset for the Emotional Impact of Movies Task and the extended COGNIMUSE dataset. Our experiments demonstrate that audio features play a more influential role than those extracted from video and movie subtitles when predicting the emotions of movie viewers on these datasets. The models that use all visual, audio, and text features simultaneously as their inputs performed better than those using features extracted from each modality separately. In addition, the Feature AAN outperformed other AAN variants on the above-mentioned datasets, highlighting the importance of taking different features as context to one another when fusing them. The Feature AAN also performed better than the baseline models when predicting the valence dimension.
Linking mathematics with reality is not new. It is also not new to use outdoor activities to learn mathematics. It seems to be new, to combine such mathematical outdoor activities with mobile technology, like the geocache community which makes use of GPS technology to guide their members to special places and points of interest. The use of mobile technologies to learn at any time and any location is known as “mobile learning”. This type of learning can be seen as an extension of eLearning. Considering the definition of O’Malley one notices that this definition does not exactly match with the idea of the MathCityMap-Project (MCM), because the learning environment in the MCM-Project is predetermined. Combined with the math trail method the project enables mobile learning within math trails with latest technology.In the MCM-Project students experience mathematics at real places and within real situations in out-of-school activities,with help of GPS-enabled smartphones and special math problems. In contrast to the paper versions of math trails we are able to give direct feedback on the solutions by using “mobile devices” such as smartphones or tablets. If the user has difficulties in solving the modeling task, stepped hints can be provided. The teacher is able to use the MCM-Portal to upload tasks developed by himself or by his students and he is also able to build a personal math trail for his students.
The single-source shortest-path problem is a fundamental problem in computer science. We consider a generalization of the shortest-path problem, the $k$-shortest path problem. Let $G$ be a directed edge-weighted graph with $n$ nodes and $m$ edges and $s,t$ be two fixed nodes. The goal is to compute $k$ paths $P_1,\dots,P_k$ between two fixed nodes $s$ and $t$ in non-decreasing order of their length such that all other paths between $s$ and $t$ are at least as long as the $k$\nth path $P_k$. We focus on the version of the $k$-shortest path problem where the paths are not allowed to visit nodes multiple times, sometime referred to as $k$-shortest simple path problem.
The probably best known $k$-shortest path algorithm is Yen's algorithm. It has a worst-case time complexity of O(kn\cdot scp(n,m)), where scp(n,m) is the complexity of the single-source shortest-path algorithm used as a subroutine. In case of Dijkstra's algorithm scp(n,m) is O(m + n\log n). One of the more recent improvements of Yen's algorithm is by Feng.
Even though Feng's algorithm is much faster in practice, it has the same worst-case complexity as Yen's algorithm.
The main results presented in this thesis are upper bounds on the average-case of Yen's and Feng's algorithm, as well as practical improvements and a parallel implementation of Yen's and Feng's algorithms including these improvements. The implementation is publicly available under GPLv3 open source license.
We show in our analysis that Yen's algorithm has an average-case complexity of O(k \log(n)\cdot scp(n,m)) on G(n,p) graphs with at least logarithmic average-degree and random edge weights following a distribution with certain properties.
On G(n,p) graphs with constant to logarithmic average-degree and uniform random edge-weights over $[0;1]$, we show an average-case complexity of O(k\cdot\frac{\log^2 n}{np}\cdot scp(n,m)). Feng's algorithm has an even better average-case complexity of O(k\cdot scp(n,m)) on unweighted G(n,p) graphs with logarithmic average-degree and for constant values of $k$. We further provide evidence that the same holds true for G(n,p) graphs with uniform random edge-weights over $[0;1]$.
On the practical side, we suggest new heuristics to prune even more single-source shortest-path computations than Feng's algorithm and evaluate all presented algorithms on G(n,p) and Grid graphs with up to 256 million nodes. We demonstrate speedups by a factor of up to 40 compared to Feng's algorithm.
Finally we discuss two ways to parallelize the suggested algorithms and evaluate them on grid graphs showing speedups by a factor of 2 using 4 threads and by a factor of up to 8 using 16 threads, respectively.
Cyber Physical Systems (CPS) are growing more and more complex due to the availability of cheap hardware, sensors, actuators and communication links. A network of cooperating CPSs (CPN) additionally increases the complexity. This poses challenges as well as it offers chances: the increasing complexity makes it harder to design, operate, optimize and maintain such CPNs. However, on the other side an appropriate use of the increasing resources in computational nodes, sensors, actuators can significantly improve the system performance, reliability and flexibility. Therefore, self-X features like self-organization, self-adaptation and self-healing are key principles for such systems.
Additionally, CPNs are often deployed in dynamic, unpredictable environments and safety-critical domains, such as transportation, energy, and healthcare. In such domains, usually applications of different criticality level exist. In an automotive environment for example, the brake has a higher criticality level regarding safety as the infotainment. As a result of mixed-criticality, applications requiring hard real-time guarantees compete with those requiring soft real-time guarantees and best-effort application for the given resources within the overall system. This leads to the need to accommodate multiple levels of criticality while ensuring safety and reliability, which increases the already high complexity even more.
This thesis deals with the question on how to conveniently, effectively and efficiently handle the management and complexity of mixed-critical CPNs (MC-CPNs). Since this cannot be done by the system developer without the assistance of the system itself any longer, it is essential to develop new approaches and techniques to ensure that such systems can operate under a range of conditions while meeting stringent requirements.
Based on five research hypothesis, this thesis introduces a comprehensive adaptive mixed-criticality supporting middleware for Cyber-Physical Networks (Chameleon), which efficiently and autonomously takes care of the management and complexity of CPNs with regard to the mixed-criticality aspect.
Chameleon contributes to the state-of-art by introducing and combining the following concepts:
- A comprehensive self-adaption mechanism on all levels of the system model is provided.
- This mechanism allows a flexible combination of parametric and structural adaptation actions (relocation, scheduling, tuning, ...) to modify the behavior of the system.
- Real-time constraints of mixed-critical applications (hard real-time, soft real-time, best-effort) are considered in all possible adaptation conditions and actions by the use of the importance parameter.
- CPNs are supported by the introduction of different scopes (local, system, global) for the adaptation conditions and actions. This also enables the combination of different scopes for conditions and actions.
- The realization of the adaptation with a MAPE-K loop instantiated by a distributed LCS allows for real-time capable reasoning of adaptation actions which also works on resource-spare systems.
- The developed rule language Rango offers an intuitive way to specify an initial rule set for LCS in the context of CPS/CPNs and supports the system administrators in the process of rule set generation.
Proteins are biological macromolecules playing essential roles in all living organisms.
Proteins often bind with each other forming complexes to fulfill their function. Such protein complexes assemble along an ordered pathway. An assembled protein complex can often be divided into structural and functional modules. Knowing the order of assembly and the modules of a protein complex is important to understand biological processes and treat diseases related to misassembly.
Typical structures of the Protein Data Bank (PDB) contain two to three subunits and a few thousand atoms. Recent developments have led to large protein complexes being resolved. The increasing number and size of the protein complexes demand for computational assistance for the visualization and analysis. One such large protein complex is respiratory complex I accounting for 45 subunits in Homo sapiens.
Complex I is a well understood protein complex that served as case study to validate our methods.
Our aim was to analyze time-resolved Molecular Dynamics (MD) simulation data, identify modules of a protein complex and generate hypotheses for the assembly pathway of a protein complex. For that purpose, we abstracted the topology of protein complexes to Complex Graphs of the Protein Topology Graph Library (PTGL). The subunits are represented as vertices, and spatial contacts as edges. The edges are weighted with the number of contacts based on a distance threshold. This allowed us to apply graph-theoretic methods to visualize and analyze protein complexes.
We extended the implementations of two methods to achieve a computation of Complex Graphs in feasible runtimes. The first method skipped checks for contacts using the information which residues are sequential neighbors. We extended the method to protein complexes and structures containing ligands. The second method introduced spheres encompassing all atoms of a subunit and skipped the check for contacts if the corresponding spheres do not overlap. Both methods combined allowed skipping up to 93 % of the checks for contacts for sample complexes of 40 subunits compared to up to 10 % of the previous implementation. We showed that the runtime of the combined method scaled linearly with the number of atoms compared to a non-linear scaling of the previous implementation We implemented a third method fixing the assignment of an orientation to secondary structure elements. We placed a three-dimensional vector in each secondary structure element and computed the angle between secondary structure elements to assign an orientation. This method sped up the runtime especially for large structures, such as the capsid of human immunodeficiency virus, for which the runtime decreased from 43 to less than 9 hours.
The feasible runtimes allowed us to investigate two data sets of MD trajectories of respiratory complex I of Thermus thermophilus that we received. The data sets differ only by whether ubiquinone is bound to the complex. We implemented a pipeline, PTGLdynamics, to compute the contacts and Complex Graphs for all time steps of the trajectories. We investigated different methods to track changes of contacts during the simulation and created a heat map put onto the three-dimensional structure visualizing the changes. We also created line plots to visualize the changes of contacts over the course of the simulation. Both visualizations helped spotting outstandingly flexible or rigid regions of the structure or time points of the simulation in which major dynamics occur.
We introduced normalizations of the edge weights of Complex Graphs for identi-fying modules and predicting the assembly pathway. The idea is to normalize the number of contacts for the number of residues of a subunit. We defined five different normalizations.
To identify structural and functional modules, we applied the Leiden graph clustering algorithm to the Complex Graphs of respiratory complex I and the respiratory supercomplex. We examined the results for the different normalizations of the weights of the Complex Graphs. The absolute edge weight produced the best result identifying three of four modules that have been defined in the literature for respiratory complex I.
We applied agglomerative hierarchical clustering to the edges of a Complex Graph to create hypotheses of the assembly pathway. The rationale was that subunits with an extensive interface in the final structure assemble early. We tested our method against two existing methods on a data set of 21 proteins with reported assembly pathways. Our prediction outperformed the other methods and ran in feasible runtimes of a few minutes at most.
We also tested our method on respiratory complex I, the respiratory supercomplex and the respiratory megacomplex. We compared the results for the different normalizations with an assembly pathway of respiratory complex I described in the literature. We transformed the assembly pathways to dendrograms and compared the predictions to the reference using the Robinson-Foulds distance and clustering information distance. We analyzed the landscape of the clustering information distance by generating random dendrograms and showed that our result is far better than expected at random. We showed in a detailed analysis that the assembly prediction using one normalization was able to capture key features of the assembly pathway that has been proposed in the literature.
In conclusion, we presented different applications of graph theory to automatically analyze the topology of protein complexes. Our programs run in feasible runtimes even for large complexes. We showed that graph-theoretic modeling of the protein structure can be used to analyze MD simulation data, identify modules of protein complexes and predict assembly pathways.
The present paper is concerned with the half-space Dirichlet problem [...] where ℝ𝑁+:={𝑥∈ℝ𝑁:𝑥𝑁>0} for some 𝑁≥1 and 𝑝>1, 𝑐>0 are constants. We analyse the existence, non-existence and multiplicity of bounded positive solutions to (𝑃𝑐). We prove that the existence and multiplicity of bounded positive solutions to (𝑃𝑐) depend in a striking way on the value of 𝑐>0 and also on the dimension N. We find an explicit number 𝑐𝑝∈(1,𝑒√), depending only on p, which determines the threshold between existence and non-existence. In particular, in dimensions 𝑁≥2, we prove that, for 0<𝑐<𝑐𝑝, problem (𝑃𝑐) admits infinitely many bounded positive solutions, whereas, for 𝑐>𝑐𝑝, there are no bounded positive solutions to (𝑃𝑐).