ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
نویسندگان
چکیده
The major goal of this study was to create a continuous time Markov chain (CTMC) models of voltage gating of gap junction (GJ) channels formed of connexin protein. This goal was achieved by using the Piece Linear Aggregate (PLA) formalism to describe the function of GJs and transforming PLA into Markov process. Infinitesimal generator of CTMC was used to automate construction of Markov chain model from description of the system using PLA formalism. Developed Markov chain models were used to simulate gap junctional conductance dependence on transjunctional voltage. The proposed method was implemented to create models of voltage gating of GJ channels containing 4 and 12 gates. CTMC modeling results were compared with the results obtained using a discrete time Markov chain (DTMC) model. It was shown that CTMC modeling requires less CPU time than an analogous DTMC model.
منابع مشابه
ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
This paper describes a new two-task approach for extracting the centerline from simple 2D polygons. An algorithm of the first task, which generates a set of points for future centerline, is presented. The idea of the algorithm is to use the polygon hatching by parallel lines and creating paths from its middle points in different polygon rotations. The centerline is derived from the intersection...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
Abstract. In this work, we investigate a multi-risk model describing insurance business with two or more independent series of claim amounts. Each series of claim amounts consists of independent nonnegative random variables. Claims of each series occur periodically with some fixed inter-arrival time. Claim amounts occur until they can be compensated by a common premium rate and the initial insu...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
Speech recognition is one of the fundamental requirements for fully autonomous robotic systems nowadays. The objective of the presented work is to offer a smartphone based speech recognition system for ROS (Robot Operating System) based autonomous robotic systems. The proposed recognition process consists of three steps, namely acquisition, preprocessing, and result extraction. In the contribut...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. Having motivated, we first define a forma...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
Certificate-based signature (CBS) is an attractive paradigm since it simultaneously solves the certificate revocation problem in conventional signatures and the key escrow problem in ID-based signatures. In particular, short certificate-based signatures are useful in bandwidth reduction for communication due to their short signature lengths. However, it is still a challenging and open problem t...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
We studied outlier document filtering (ODF) for extractive sentence summarization. Our results are superior compared to the average of the participant systems’ using DUC 2006. Furthermore, we add extractive paragraph summarization to the same system. It is surprising that the results are nearly the same for ROUGE metrics. Although extractive paragraph summarization has a better performance for ...
متن کامل