In this presentation, we developed an algorithm for describing the bending structure of myxobacteria. In this algorithm, cell structure is presented by.

Slides:



Advertisements
Similar presentations
Simulazione di Biomolecole: metodi e applicazioni giorgio colombo
Advertisements

AI Pathfinding Representing the Search Space
0 Jack SimonsJack Simons, Henry Eyring Scientist and Professor Chemistry Department University of Utah Electronic Structure Theory Session 7.
Chapter 14 Chemical Kinetics.
Transfer FAS UAS SAINT-PETERSBURG STATE UNIVERSITY COMPUTATIONAL PHYSICS Introduction Physical basis Molecular dynamics Temperature and thermostat Numerical.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Fixed charge problem of Modified-BMH potential during molecular dynamic simulation of Si/SiO 2 interface 김세진 1,2, 김상필 1,3, 최정혜 1, 이승철 1, 이광렬 1, 김도연 2,
By Lydia E. Kavraki, Petr Svestka, Jean-Claude Latombe, Mark H. Overmars Emre Dirican
Principal Component Analysis in MD Simulation Speaker: ZHOU Chen-Yang Supervisor: Wu Yun-Dong.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts – Chapter.
The Gliding Motility of Myxobacteria Nan Chen and Yi-lin Wu Advisor: Prof. Mark Alber Center for the Study of Biocomplexity, University of Notre Dame.
Optimization methods Morten Nielsen Department of Systems biology, DTU.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
ISQED’2015: D. Seemuth, A. Davoodi, K. Morrow 1 Automatic Die Placement and Flexible I/O Assignment in 2.5D IC Design Daniel P. Seemuth Prof. Azadeh Davoodi.
CSC 2300 Data Structures & Algorithms February 27, 2007 Chapter 5. Hashing.
Tirgul 8 Universal Hashing Remarks on Programming Exercise 1 Solution to question 2 in theoretical homework 2.
Hashing Text Read Weiss, §5.1 – 5.5 Goal Perform inserts, deletes, and finds in constant average time Topics Hash table, hash function, collisions Collision.
WSN Simulation Template for OMNeT++
Tirgul 7. Find an efficient implementation of a dynamic collection of elements with unique keys Supported Operations: Insert, Search and Delete. The keys.
Monte Carlo Simulation of Ising Model and Phase Transition Studies
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Distributed Software Development
Prosjektstyring Expected Present value - project A We will choose one of two projects, A or B. Project A, shown on the.
ANUA 2011, Ft. Lauderdale INTRO Position Control ANUA 2011, Ft. Lauderdale education solutions development inc.
JUTS JSim Urban Traffic Simulator 1 J-Sim Urban Traffic Simulator J-Sim based, XML using grafical and console simulation tool. David Hartman ZČU-FAV-KIV.
ICS220 – Data Structures and Algorithms Lecture 10 Dr. Ken Cosh.
CompuCell Software Current capabilities and Research Plan Rajiv Chaturvedi Jesús A. Izaguirre With Patrick M. Virtue.
Computational Lab in Physics: Final Project Monte Carlo Nuclear Collisions: Glauber Model.
Introduction to Dynamic Routing Protocol
Notes on Modeling with Discrete Particle Systems Audi Byrne July 28 th, 2004 Kenworthy Lab Meeting Deutsch et al.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Sketch Outline Ising, bio-LGCA and bio-Potts models Potts model general description computational description Examples of ‘energies’ (specifying interactions)
DISCRETE RANDOM VARIABLES.
Stipple Placement using Distance in a Weighted Graph David Mould University of Saskatchewan.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
March 23 & 28, Csci 2111: Data and File Structures Week 10, Lectures 1 & 2 Hashing.
March 23 & 28, Hashing. 2 What is Hashing? A Hash function is a function h(K) which transforms a key K into an address. Hashing is like indexing.
Ihab Mohammed and Safaa Alwajidi. Introduction Hash tables are dictionary structure that store objects with keys and provide very fast access. Hash table.
Chapter 23 Electric Potential. Basics The potential due to an electric dipole is just the sum of the potentials due to each charge, and can be calculated.
Molecular Modelling - Lecture 2 Techniques for Conformational Sampling Uses CHARMM force field Written in C++
Austin Howard & Chris Wohlgamuth April 28, 2009 This presentation is available at
THE NORMAL APPROXIMATION TO THE BINOMIAL. Under certain conditions the Normal distribution can be used as an approximation to the Binomial, thus reducing.
1 CMS Calorimetry & Neural Network Abstract We review an application of neural network feed forward algorithm in CMS calorimetry ( NIM A482(2002)p776 ).
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Occam’s Razor No Free Lunch Theorem Minimum.
Application of Statistics and Percolation Theory Temmy Brotherson Michael Lam.
Membrane Structure and Function
Introduction to Databases Angela Clark University of South Alabama.
K means ++ and K means Parallel Jun Wang. Review of K means Simple and fast Choose k centers randomly Class points to its nearest center Update centers.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Monte Carlo Simulation of Folding Processes for 2D Linkages Modeling Proteins with Off-Grid HP-Chains Ileana Streinu Smith College Leo Guibas Rachel Kolodny.
ERHIC Orbit Correction Studies (Minor Update) Using Oct’14 lattice and dispersion diagnostic January 5, 2015Stephen Brooks, eRHIC FFAG meeting1.
Belief Networks Kostas Kontogiannis E&CE 457. Belief Networks A belief network is a graph in which the following holds: –A set of random variables makes.
Distributed cooperation and coordination using the Max-Sum algorithm
1 Information Retrieval and Use De-normalisation and Distributed database systems Geoff Leese September 2008, revised October 2009.
Beard & McLain, “Small Unmanned Aircraft,” Princeton University Press, 2012, Chapter 12: Slide 1 Chapter 12 Path Planning.
Computational Physics (Lecture 10) PHY4370. Simulation Details To simulate Ising models First step is to choose a lattice. For example, we can us SC,
Pattern Formation via BLAG Mike Parks & Saad Khairallah.
Thermodynamics Phases (states) of Matter & Latent Heat States of Matter.
Hashing 1 Lec# 12 Presented by Halla Abdel Hameed.
6.8 Maximizer of the Posterior Marginals 6.9 Iterated Conditional Modes of the Posterior Distribution Jang, HaYoung.
Lec4: Introduction to Dynamic Routing Protocol
Computational Physics (Lecture 10)
Model Opera 3D Analysis Macro Model 4250 A
Introduction to Dynamic Routing Protocol
Introduction to Dynamic Routing Protocol
Simulation of Self-Assembly of Ampiphiles Using Molecular Dynamics
Navigation In Dynamic Environment
The Nuts and Bolts of First-Principles Simulation
Do Now Give 1 example of potential energy.
Stefan Oßwald, Philipp Karkowski, Maren Bennewitz
Presentation transcript:

In this presentation, we developed an algorithm for describing the bending structure of myxobacteria. In this algorithm, cell structure is presented by key nodes and connection bonds. System potential energy includes stretching energy and bonding energy. Cell collision is implemented by a MC algorithm. Further development is still in progress.

Algorithm for bending structure of Myxobacteria Nan Chen and Yilin Wu

Key nodes are used to describe the flexibility of myxobacteria Algorithm Description

Stretching Energy Bending Energy Stretching and bending Energy

MonteCarlo Algorithm for cells movement Algorithm for one MC step For I = 1 to n-1 Randomly choose one node Randomly choose one moving direction and distance If (Collision happen) Not accepted and next Calculate energy change Calculate acceptance probability if (Accpted) update configuration

Turn to this direction Algorithm for cells collision

Why we choose MC algorithm, not deterministic algorithm (MD)? Advantage MC Algorithm could easily handle very complicated cell configurations MC algorithm allows cells still to move when cell lock happens Disadvantage MC algorithm is slower than deterministic algorithm

Algorithm of Adding slime field The 2D surface was already mapped into 2D lattice. I create a slime field on this lattice; In every time step, each cell deposits slimes by adding 1 slime to each lattice site occupied by the A-end; In every time step, before moving a cell, specify the position O(x, y) of the its S-end or head; The cell “ searches ” the slime field in front of S- end. Sum all the slimes in the N areas (as shown in next slide) respectively, denoting by S(i), i= 1, … N; The probability to choose one of the N directions (as shown in next slide) is proportional to the slime concentrations in the N areas:

Slime distribution f(x) X Y X’ Y’ Moving direction Search area S end A end n N-1

Summary ● Further work to integrate both the cell-cell interactions and slime field.