Understanding Prediction Systems for HLA-Binding Peptides and T-cell Epitope Identification
2022-2023学年山东省济宁市高二(下)期中英语试卷及答案解析

2022-2023学年山东省济宁市高二(下)期中英语试卷ADiscover the best things to do in Beijing with our round-up of art and exhibitions,performances and popular activities.Jazz With JLCO and Wynton MarsalisJazz at Lincon Centre Orchesra and trumpet master Wynton Marsalis will join hands to tour three Chinese cities:Shenzhen,Beijing and Tianjin in April,bringing the most popular jazz music from the US.Their Beijing stop will be on March 20,at the Forbidden City Concert Hall.If you go:7:30 p.m.April 24.Ticket:180-1,080 yuanChen Sa Piano RecitalChinese pianist Chen Sa has appeared at many music festivals,including the Schleswig-Holstein Musik Festival and the Purl Piano Festival.The performance at the National Centre for the Performing Arts features the melodies of French composer Debussy.If you go:7:30 p.m.December 20.Ticket:80-500 yuanAfrican Wood CarvingsAfrican art motivated artists such as Pablo Picasso and Henri Matisse in the early 20th century.But besides art,the continent has a long and rich heritage of wood carving.Tree of Life,an exhibition at the National Art Museum of China,features African wood carvings from countries such as Tanzania,Mozambique and Benin.If you go:9 a.m.-5 p.m.January 21.Ticket:FreeAnother Way of TellingThis exhibition,staged at the Three Shadows Photography Art Centre,shows almost 100 works of Anna Fox and Karen Knorr,two leading documentary photographers in the UK.It features different series of works,such as photographs discussing problems of social classes,working environments,andself-awareness.If you go:10 a.m.-5 p.m.January 6.Ticket:60 yuan1. When can we enjoy music composed by Debussy?______A. At 3 p.m.January 6.B. At 10 a.m.January 21.C. At 7:30 p.m.April 24.D. At 7:30 p.m.December 20.2. What can we do at the Tree of Life exhibition______A. Enjoy classical music.B. Appreciate Pablo Picasso's works.C. Learn basic skills of wood carving.D. Get to know a special art form from Tanzania.3. Where will Karen Knorr's works be exhibited?______A. At the Forbidden City Concert Hall.B. At the National Art Museum of China.C. At the National Centre for the Performing Arts.D. At the Three Shadows Photography Art Centre.BFrom the top of Mount Qomolangma to the bottom of the Mariana Trench,plastic continues to pollute the environment,and it creates a significant threat to all life forms on Earth.Despite knowing the effects of plastic pollution,we have not been able to ban the use of plastic products.Now,thanks to the invention of a 17-year-old girl,Arora,we finally have a better choice.This plastic-like material is made from prawn (大虾)shells,and it breaks down 1.5 million times faster than most of the commercial plastic products we use today.The Australian teen first became aware of the impact of plastic waste on the environment when shopping with her mother.She wondered why her mother had to pay for the plastic bags.When asked,the cashier informed her how plastic hurts the planet and that the additional charge was there to encourage people not to use it.This inspired Arora to create a kind of plastic that would break down faster than the conventional one.But the journey of inventing "eco-friendly plastic" was not easy.She experimented with a number of organic materials such as cornflour and banana peels,both of which had to be ruled out because of theirsolubility (溶解性).One night,while having dinner,she noticed that the shells of prawns look plasticky.She immediately went to the lab to ter,she would describe that dinner as her "Eureka" moment.She extracted the material called "chitin" from the shells and then mixed it with an insoluble protein called "fibroin",which is found in silk ing the combination of these two organic materials,Arora created a plastic-like material that breaks down completely within just 33 days.Moreover,this plastic releases nitrogen when breaking down,which is why it can be used as plant fertilizer.Arora's invention has caused a stir,and she has won a number of awards.As an inspiring young woman,Arora wants to make a difference in the world,and she wants to encourage other young people to follow their passion and make a positive difference however they can.4. What inspired Arora to create a kind of special plastic?______A. A cashier's words about paid plastic bags.B. Her determination to protect the prawns.C. A class about plastic's impact on the planet.D. Her plan to save money on plastic products.5. What could be a "Eureka" moment?______A. A moment of needing reflection.B. A moment of finding the truth.C. A moment of having sudden inspiration.D. A moment of enjoying the celebration.6. What can be known about the new plastic in paragraph 4?______A. It is made from non-organic materials.B. It can break down totally in a month.C. It can be used to help plants to grow.D. It is extracted from an insoluble protein.7. Which of the following can best describe Arora?______A. Brave and clever.B. Creative and inspiring.C. Active and considerate.D. Humorous and friendly.CParenting styles have changed over the years in response to the rapid changes in the world.Whether it is tapping technology or applying the best parenting practices to meet a parenting need,parents nowadays generally invest more time in finding out how best to raise their children.Modern parents often look to the Internet and social media for parenting advice.A parent can post questions from how to manage the constant cries of an infant to how to talk to a moody teenager,and chances are,the parent will be flooded instantly with advice and relevant articles.The availability of resources has helped modern parents engage more in their children's development,both academically and emotionally.A modern parenting style that has emerged is helicopter parenting,where parents are much too focused on their children.They help children with tasks they're capable of doing on their own,like selecting activities and friends for them.Such a parenting style can hold back the development of the children's ability to handle responsibilities independently.Children might be ill-equipped with life skills such as doing laundry (洗衣),clearing their plates or coping with their schoolwork.Always protecting children from failures may also prevent them developing adaptability and acquiring skills like problem-solving.On the other hand,parents in the past tended to monitor less.Children weren't given more control over how to manage their schoolwork and choose their friends.They were often expected to shoulder the responsibilities of caring for younger brothers and sisters and managing housework.Living in thepre-internet age,parents were less informed about different parenting methods,and personalities. There is no one right way to raise a child.Each child is unique and should be raised differently by parents who are present but not wandering,who are supportive but not controlling,and who protect but not care too much.8. What does the author explain by mentioning"an infant"and"a moody teenager"in paragraph 2?______A. Devotion to kids.B. Tricky parenting problems.C. Effective parenting.D. Easy access to guidance.9. What is a distinctive characteristic of helicopter parenting?______A. Flexible.B. Efficient.C. Over involved.D. Conventional.10. What do we know about parents in the past?______A. They educated kids in a rigid way.B. They afforded kids more space for self-growth.C. They overestimated their kids' independence.D. They tended to stay away from social activities.11. What's the author's attitude towards the two parenting modes mentioned in the passage?______A. Subjective.B. Opposed.C. Favorable.D. Objective.DThere is a profound relationship between science fiction and science.It is often said that stories change the world,what is less often heard is that stories change science,and therefore the future.The use of science fiction to explore our world is similar to scenario (剧情)planning in Futures Studies,which shapes our ideas about the future,and goes beyond predicting artifacts that once seemed impossible to us like Verne's submarine or the satellites of 2001 Space Odyssey.In the words of Dutch researcher Sofia Kaloterakis,"Science fiction narratives structure our imaginative models about technoscientific projects such as robotics or space exploration".Have you ever wondered how science fiction novels have impacted the idea we have about Artificial Intelligence or how Snow Crash,Neal Stephenson's novel,has impacted what we now call the Metaverse (元宇宙)?Science fiction helps us define possible futures.It provides us with an understanding of the rules underlying fictional worlds.It also allows us to put technological prototypes (原型)in the context of their use by humans.But most importantly,it determines the way we structure scientific thought and intervene (干预)in the future.Alex McDowell,Creator of the Minority Report worldbuilding in 2002,and Peter von Stackelberg explain what fictional narratives can bring to the table:The richness of "storyworlds" — the "universes" within which stories take place — provides us with detailed rules of the context in which a larger reality unfolds that extends beyond a single story,and has the potential to provide us with deeper learning about the underlying systems that regulate those worlds. Lastly,the relationship of futures narratives to theories such as Social Constructivism has been highlighted by several scholars.A central idea of this sociological theory is that whenever we use words or other symbols to refer to objects in our world we are constructing them.And,therefore,prediction is also a social construction.In narrating we intervene in the world.In narrating the world,we construct it.In writing science fiction we intervene in the science of the future.12. What is the text mainly about?______A. The storyworlds created by science fictions.B. Artifacts and technologies in science fictions.C. Science fiction narratives affecting future studies.D. The relation between science and science fictions.13. What is the most important role of science fiction______A. It provides us with technologies and tools.B. It allows us to establish reasonable future.C. It decides our thinking and affects the future.D. It helps us learn the rules of fictional world.14. What do we know about "storyworlds"?______A. There are general rules for a single story.B. They are the "universes" where stories happen.C. There are no regulations or guiding systems.D. They have a potential context within a story.15. What can be inferred from the last paragraph?______A. Science fiction narratives can construct future worlds.B. The science of future intervenes in today's science.C. Objects can't be constructed by words or symbols.D. Scholars care little about narratives about future.Efficient ways to improve your speechFind it difficult to make a wonderful speech in public(1)______Use more facial expressionsOne psychologist feels that our facial expression is responsible more than anything else for the impression others have of us.A smile in which the eyes participate is extremely communicative.(2)______ People tend to mirror your expression,so try to show how you feel about a topic or an idea through your facial expression.Get rid of your inner fear(3)______ The way to handle it is to put it to work for you,get into action,as Shakespeare observed,action cures fear.The first is to admit it.Do the thing you fear and it will be the death of fear itself.Anothersimple aid at the last minute before you begin,is to take a few deep breaths.This will help get the butterflies in formation and also keep your voice under control.Polish your voiceOur voice is the main instrument we possess for communicating with people.So invest in a tape recorder,practice your speech by speaking it into the microphone and then listen to it.You can even have others join in the evaluation of your strong points and your weaknesses or faults as well.Simply reading a newspaper,a magazine or stories to your children out loud can help.(4)______Strengthen your memoryPsychologists tell us that most individuals don't use above ten percent of their inherent capacity for memory.How to enhance the power of memory?First,have a burning desire to remember.It's difficult to recall anything without wanting to do so.(5)______ Our success depends greatly on our ability to concentrate.The next principle is repetition,we learned many things in school by repetition.16. A. A B. B C. C D. D E. EF. FG. G17. A. A B. B C. C D. D E. EF. FG. G18. A. A B. B C. C D. D E. EF. FG. G19. A. A B. B C. C D. D E. EF. FG. G20. A. A B. B C. C D. D E. EF. FG. GMy high school life was a very fulfilling one.Apart from studying in class,I got a part-time job at a local (1)______ shop.I hoped it would be easy,and for the most part,(2)______ .I imagined myself pouring coffee and becoming close friends with my customers.But what I hadn't (3)______ was the people with so many orders and the moments when I couldn't seem to (4)______ anyone.There was always too much sugar,too little ice,or not enough skim milk. (5)______ ,I kept at it.One day,one of my customers dropped in,(6)______ .Before he left,I handed him a bag along with his iced coffee.He looked at me (7)______ because he had ordered nothing but the coffee.He opened the bag and saw his favorite doughnut (甜甜圈)I had (8)______ him.He smiled and thanked me before (9)______ out into the rain.The next evening,he came.Instead of (10)______ something,he handed me a single pink rose and a note. "Thanks for being so sweet and (11)______ yesterday.It is so nice to meet someone who is warm.Please don't (12)______ your ways because I truly believe that you will do better.Have a great day!"As time went on,I did (13)______ some customers really particular.But whenever I felt cast down,that man and his kindness would occur to me.Then I would (14)______ ,hold my head up high,clear my throat and ask politely,"How can I (15)______ you?"21. A. fashion B. coffee C. bakery D. furniture22. A. flexible B. romantic C. back-breaking D. stress-free23. A. expected B. detected C. grasped D. managed24. A. recognize B. reach C. please D. convince25. A. Moreover B. However C. Instead D. Hence26. A. excited B. rigid C. dynamic D. depressed27. A. questioningly B. curiously C. gratefully D. angrily28. A. assigned B. awarded C. given D. served29. A. coming B. heading C. storming D. sliding30. A. ordering B. whispering C. reporting D. obtaining31. A. outgoing B. straightforwardC. thoughtfulD. tolerant32. A. continue B. keep C. improve D. change33. A. inquire about B. come across C. knock into D. hear of34. A. smile B. pray C. weep D. sigh35. A. treat B. thank C. contact D. help36. I don't have much ______ (同情)for her —I think she's brought her troubles on herself.37. She wanted to work for a bigger and more ______ (有影响力的)newspaper.38. There's a growing ______ (认可)that our city is becoming more and more beautiful.39. We ought to hire several public relationship ______ (顾问)to help improve our image.40. Cheating on exams can be no longer ______ (容忍)again.41. When you finish your essay,you'd better turn to your teacher to p ______ it,which makes it more readable.42. According to the report s ______ by researchers,about 23 percent of all annual carbon dioxide emissions are caused by the destruction of tropical forests.43. On Wednesday,a polar wind brought b ______ cold to the Midwest.44. The company will r ______ him for his years of service with a grand farewell party and several presents.45. I'm sorry to d ______ you so late,but my car's broken down and I don't have my phone with me.46. I was walking around the woods when I found a poor dog ______ (abandon)there.47. ______ (fortune),many documents,masterpieces,and personal papers with regard to these questions are preserved in time.48. Since the time humankind started gardening,we ______ (try)to make our environment more beautiful.49. Previously,water quality in the Li River had suffered greatly from an increasing volume of tourists,many of ______ frequently threw garbage into the river.50. The purpose of education is______(develop)a fine personality in children.51. 假如你是李华,4月22日,第54个"世界地球日"即将来临,主题为"众生的地球(Earth for All)"。
《光伏发电系统接入配电网技术规定》标准解读和修订建议

《光伏发电系统接入配电网技术规定》标准解读和修订建议Interpretation and revision proposals ofGB/T 29319-2012, Technical requirements for connecting photovoltaic power system to distribution networkAbstract: In the context of clean and low-carbon energy transformation and new power system, China’s photovoltaic power generation will usher in great development. Its large-scale access impacts the safe and stable operation of the power grid with increasing significance. In order to strengthen the support and leading roles of the standards, it is urgent to revise the national standard GB/T 29319-2012, Technical requirements for connecting photovoltaic power system to distribution network , based on the current development trend of photovoltaic power generation and power grid transformation needs. This paper firstly interprets the important technical provisions of the standard, then analyzes the problems in its implementation and finally proposes some revision suggestions in terms of grid adaptability, power control and fault crossing, to facilitate safe and orderly development of photovoltaic power generation in China.Keywords: photovoltaic power generation, distribution network, standard guide, amendmentsBy Lu Minhui 1 Sun Wenwen 2 He Guoqing 2文/路民辉1 孙文文2 何国庆2(1. State Grid Gansu Electric Power Company; 2. China Electric Power Research Institute)1. IntroductionTo exert the supporting and leading roles of the standards, the paper interprets the important provisions of GB/T 29319-2012, for two purposes, on the one hand, enhancing the industry personnel’s understanding of the technical provisions to better implement the standard; and on the other hand, analyzing the limitations of these provisions and proposing reasonable revision suggestions for those which cannot meet current and future development needs of PV power in China.2. Interpretation of the technical standard for grid connection2.1 ScopeThis standard is applicable for building, rebuilding or expanding PV power system connected to the grid with voltage of 380V, or to the user-side with voltage of 10(6)kV. The PV power system should meet other requirements in case of connecting to the public power grid with voltage of 10(6)kV or 35kV or above.BETTER COMMUNICATION | GREATER VALUE2.2 Power control2.2.1 Active power controlActive power control means that, the PV power system has the ability of active power regulation and is able to accept the command signals of power grid scheduling dept. to adjust its active power output. Due to the small scale of PV power development at an early stage, given to the cost and technical considerations, the standard doesn’t specify mandatory requirements on the active power control of the PV power system.2.2.2 Reactive power controlConnected to the grid through inverters, PV power has strong ability of reactive power control. Therefore, according to the standard, the power factor of the PV power system should be adjustable continuously in the range of ±0.95. Moreover, it should be able to adjust reactive output based on the voltage of the connecting points and to participate in adjusting the voltage of the grid.2.3 Operational adaptabilityThe purpose of demanding the operational adaptability of PV power system is to enhance the operational reliability of the PV power system. It is unavoidable for various disturbances to occur in the course of grid operation. When the voltage and frequency are within the specified limits, the PV power system is required to be able to operate normally, to avoid its frequent start-stop to impact users’ interest and grid safety and stability. The operational adaptability means mainly the voltage adaptability and frequency adaptability.3. Problems in connection technical standards3.1 Overlapping and inconsistency of some provisionsImpacted by the revision cycle, some standards are inconsistent, or even contradictory, in terms of the provisions of voltage adaptability and frequency adaptability. For instance, for the PV power system connecting to the user-side with 10(6)kV voltage, the operating range of voltage is specified as 0.9p.u.~1.1p.u. in GB/T 29319, but 0.85p.u.~1.1p.u. in GB/T 3359.3.2 Low requirements of some provisionsAs constant increase of the installed capacity of PV power in recent years, its large-scale connection impacts grid safety more and more significantly. Countries around the world have revised their technical standards for PV power connection timely. Comparison with them suggested that, the requirements in national technical standards of PV power connection are lower, in terms of power control, fault crossing, frequency/voltage tolerance and grid supporting capacity.3.3 Some provisions unavailableThe PV power witnessed the histor y of slow development in the early stage to explosive growth in the later stage. The standard adapted itself to the development of PV power at the time. The core concept was that PV power did not participate in adjusting the frequency and voltage. That is to say, the system frequency and voltage were adjusted by the grid. However, as technological progresses and the new challenges produced by large-scale connection of PV power to the grid, the PV power needs new requirements, like cluster control, primary frequency regulation and power prediction, to improve the hospitality of PV power connection.4. Revision proposals4.1 Active power control1) The PV power system connected to the grid with voltage of 10(6)kV~35kV should be provided with active power control system to have the ability of smooth regulation of active power. The PV power system should be able to receive and automatically execute the control orders of active power and active power change issued by the power scheduling dept. The active power and active power change rate should meet the requirements of the scheduling control of the power system.2) The PV power system connected to the grid withvoltage of 380V should have the ability of active power control and receive the control orders of the scheduling dept. in the manner of cluster control. Based on the actual connection situation of the PV power system in China, the cluster control is illustrated in Figure 1.3) A PV power project of a whole county developed by one owner should be provided with the centralized monitoring system, which is able to receive the scheduling control orders.4.2 Primary frequency regulation1) The PV power system connected with voltage of 10(6)kV~35kV should have the ability of primary frequency regulation. When the system frequency is without the dead zone, the PV power system should be able to regulate the active power output automatically as per the frequencies. The parameters of frequency dead zone, difference coefficient and response time should be determined after negotiating with the grid scheduling dept.2) The PV power system connected with voltage of 380V should have the ability of primary frequency regulation.4.3 Grid adaptabilityThe voltage and frequency ranges should be enlarged for continuous and stable operation of the PV power system.1) When the voltage of the connecting points of the PV power system is within 0.85p.u.~1.1p.u. nominal voltage, the PV power system should be able to operate normally.2) When the frequency of the connecting points of the PV power system is within 48.5Hz~50.5Hz, the PV power system should be able to operate normally.4.4 Power prediction1) The PV power system, of which the connecting voltage is 10(6)kV~35kV and the installed capacity is above 10MW, should be provided with power prediction system, which should have the ability of short-term prediction of 0h~72h and super short-term prediction of 0.25h~4h.2) For the PV power system connected to the grid with voltage of 380V, since there is a great number of it and it cannot provide a power prediction system for a single PV system, the regional power prediction can be adopted, so as to achieve power prediction to all the PV systems in the region. The prediction methods usually include gridding and statistical scaling.4.5 Fault crossing1) The PV power system connected with voltage of 10(6) kV~35kV should have the ability of zero voltage crossing. Within and below the voltage contour in Figure 2, the PV power system should be able to operate continuously without disconnection; otherwise, it will be disconnected.2) For the PV power system connected with voltage of 10(6)kV~35kV, within the voltage contour in Figure 3, the PV power system should be able to operate continuously without disconnection; otherwise, it will be disconnected.Figure 1: Technical routine of low-voltage distributed PVcontrolFigure 2: Requirement on low-voltage crossing of PVpower system BETTER COMMUNICATION | GREATER VALUE3) The PV power system, which connects the grid with voltage of 10(6)kV~35kV and has not disconnected from the grid during low/high-voltage crossing, should recover the power before the fault with at least 20% of the PN/ s power change rate when the voltage at the connecting points is between 0.85p.u.~1.1p.u. nominal voltage.5. ConclusionsThe paper interprets the important provisions of GB/T 29319-2012 and analyzes the problems in its implementation, on which basis, proposes reasonable revision suggestions: first, enhance vertically the technical requirements on PV power system connected with the grid and elevate the voltage/frequency tolerance and fault crossing of the PV power system; second, extend horizontally the coverage of the standard to add new technical requirements like power prediction, primary frequency regulation, low-voltage crossing and high-voltage crossing.6. AcknowledgementsThis paper is sponsored by the science and technology project: Research on electromagnetic and electromechanical transient modeling of Gansu Power Grid based on UHV AC/DC transmission of high proportion renewable energy and its influence on transmission capacity.Figure 3: Requirement on high-voltage crossing of PVpower system[1] , Important Speech of President Xi Jinping on the General Debate of the 75th United Nations General Assembly [N/OL]. (2020-09-23). /n1/2020/0923/ c64094-31871240.html.[2] , the Speech of President Xi Jinping on the Climate Ambition Summit [N/OL]. (2020-09-23). http://cpc.people. /n1/2020/1213/c64036-31964469.html.[3] General Administration of Quality Supervision, Inspection and Quarantine of P.R.C., Standardization Administration of P.R.C. GB/ T 29319-2012 Technical Requirements for Connecting Photovoltaic Power System to Distribution Network [S]. Beijing: China Standards Press, 2017 .[4] Chen Hu, Zhang Tian, Pei Huiming, et al. Analysis of Distributed Photovoltaic Power Influence on Grid Voltage and Power Losses [J]. Electrical Measurement & Instrumentation, 2015, 52 (23): 63-69 . [5] Xie Xiaorong, He Jingbo, Mao Hangyin, et al. New Issues and Classification of Power System Stability with High Shares of Renewable and Power Electronics [J]. Proceedings of the CSEE, 2021, 41 (2): 461-475 .[6] Ding Ming, Wang Weisheng, Wang Xiuli, et al. A Review on the Effect of Large-scale PV Generation on Power Systems [J]. Proceedings of the CSEE, 2014, 34 (1): 1-14 .[7] Zeng Ming, Yang Yongqi, Li Yuanfei, et al. The Preliminary Research for Key Operation Mode and Technologies of Electrical Power System with Renewable Energy Sources Under Energy Internet [J]. Proceedings of the CSEE, 2016, 36 (3): 681-691 .[8] Bai Jianhua, Xin Songxu, Liu Jun, et al. Roadmap of Realizing the High Penetration Renewable Energy in China [J]. Proceedings of the CSEE, 2015, 35 (14): 3699-3705 .[9] Liang Zhifeng, Ye Chang, Liu Ziwen, et al.Grid-Connected Scheduling and Control of Distributed Generations Clusters: Architecture and Key Technologies [J]. Power System Technology, 2021, 45 (10): 3791-3802 .[10] Wu J unpeng, Yang Xiaodong, Zhai Xue, et al. Analysis of Primary Frequency Regulation of Grid-connected PV Station in Power System [J]. Electrical Measurement & Instrumentation, 2016, 53 (18): 88-92.About the authors:Lu Minhui, Professorate Senior Engineer, engaged primarily in the research on grid connection technology of new energy power generation. Sun Wenwen, Corresponding Author, Engineer, engaged primarily in the research on grid connection technology of new energy power generation. He Guoqing, Professorate Senior Engineer, engaged primarily in the research on grid connection technology of new energy power generation. References。
生物信息学英文介绍

生物信息学英文介绍Introduction to Bioinformatics.Bioinformatics is an interdisciplinary field that combines biology, computer science, mathematics, statistics, and other disciplines to analyze and interpret biological data. At its core, bioinformatics leverages computational tools and algorithms to process, manage, and minebiological information, enabling a deeper understanding of the molecular basis of life and its diverse phenomena.The field of bioinformatics has exploded in recent years, driven by the exponential growth of biological data generated by high-throughput sequencing technologies, proteomics, genomics, and other omics approaches. This data deluge has presented both challenges and opportunities for researchers. On one hand, the sheer volume and complexityof the data require sophisticated computational methods for analysis. On the other hand, the wealth of information contained within these data holds the promise oftransformative insights into the functions, interactions, and evolution of biological systems.The core tasks of bioinformatics encompass genome annotation, sequence alignment and comparison, gene expression analysis, protein structure prediction and function annotation, and the integration of multi-omic data. These tasks require a range of computational tools and algorithms, often developed by bioinformatics experts in collaboration with biologists and other researchers.Genome annotation, for example, involves the identification of genes and other genetic elements within a genome and the prediction of their functions. This process involves the use of bioinformatics algorithms to identify protein-coding genes, non-coding RNAs, and regulatory elements based on sequence patterns and other features. The resulting annotations provide a foundation forunderstanding the genetic basis of traits and diseases.Sequence alignment and comparison are crucial for understanding the evolutionary relationships betweenspecies and for identifying conserved regions within genomes. Bioinformatics algorithms, such as BLAST and multiple sequence alignment tools, are widely used for these purposes. These algorithms enable researchers to compare sequences quickly and accurately, revealing patterns of conservation and divergence that inform our understanding of biological diversity and function.Gene expression analysis is another key area of bioinformatics. It involves the quantification of thelevels of mRNAs, proteins, and other molecules within cells and tissues, and the interpretation of these data to understand the regulation of gene expression and its impact on cellular phenotypes. Bioinformatics tools and algorithms are essential for processing and analyzing the vast amounts of data generated by high-throughput sequencing and other experimental techniques.Protein structure prediction and function annotation are also important areas of bioinformatics. The structure of a protein determines its function, and bioinformatics methods can help predict the three-dimensional structure ofa protein based on its amino acid sequence. These predictions can then be used to infer the protein'sfunction and to understand how it interacts with other molecules within the cell.The integration of multi-omic data is a rapidly emerging area of bioinformatics. It involves theintegration and analysis of data from different omics platforms, such as genomics, transcriptomics, proteomics, and metabolomics. This approach enables researchers to understand the interconnectedness of different biological processes and to identify complex relationships between genes, proteins, and metabolites.In addition to these core tasks, bioinformatics also plays a crucial role in translational research and personalized medicine. It enables the identification of disease-associated genes and the development of targeted therapeutics. By analyzing genetic and other biological data from patients, bioinformatics can help predict disease outcomes and guide treatment decisions.The future of bioinformatics is bright. With the continued development of high-throughput sequencing technologies and other omics approaches, the amount of biological data available for analysis will continue to grow. This will drive the need for more sophisticated computational methods and algorithms to process and interpret these data. At the same time, the integration of bioinformatics with other disciplines, such as artificial intelligence and machine learning, will open up new possibilities for understanding the complex systems that underlie life.In conclusion, bioinformatics is an essential field for understanding the molecular basis of life and its diverse phenomena. It leverages computational tools and algorithms to process, manage, and mine biological information, enabling a deeper understanding of the functions, interactions, and evolution of biological systems. As the amount of biological data continues to grow, the role of bioinformatics in research and medicine will become increasingly important.。
数学建模论文英文

数学建模论文英文Abstract:Mathematical modeling is an essential tool in various scientific and engineering disciplines, facilitating the understanding and prediction of complex systems. This paper explores the fundamental principles of mathematical modeling, its applications, and the methodologies employed in constructing and analyzing models. Through case studies, we demonstrate the power of mathematical models in solving real-world problems.Introduction:The introduction of mathematical modeling serves as a foundation for the entire paper. It provides an overview of the significance of mathematical modeling in modern problem-solving and sets the stage for the subsequent sections. It also outlines the objectives and scope of the paper.Literature Review:This section reviews existing literature on mathematical modeling, highlighting the evolution of the field, key concepts, and the diverse range of applications. It also identifies gaps in current knowledge that the present study aims to address.Methodology:The methodology section describes the approach taken to construct and analyze mathematical models. It includes theselection of appropriate mathematical tools, the formulation of the model, and the validation process. This section is crucial for ensuring the scientific rigor of the study.Model Development:In this section, we delve into the process of model development, including the identification of variables, the establishment of relationships, and the formulation of equations. The development of the model is presented in a step-by-step manner to ensure clarity and reproducibility.Case Studies:Case studies are presented to demonstrate the practical application of mathematical models. Each case study is carefully selected to illustrate the versatility and effectiveness of mathematical modeling in addressing specific problems.Results and Discussion:This section presents the results obtained from the application of the mathematical models to the case studies. The results are analyzed to draw insights and conclusions about the effectiveness of the models. The discussion also includes an evaluation of the model's limitations and potential areas for improvement.Conclusion:The conclusion summarizes the key findings of the paper and reflects on the implications of the study. It also suggests directions for future research in the field of mathematical modeling.References:A comprehensive list of references is provided to acknowledge the sources of information and ideas presented in the paper. The references are formatted according to a recognizedcitation style.Appendices:The appendices contain any additional information that supports the paper, such as detailed mathematical derivations, supplementary data, or extended tables and figures.Acknowledgments:The acknowledgments section, if present, expresses gratitudeto individuals or organizations that contributed to the research but are not authors of the paper.This structure ensures that the mathematical modeling paperis comprehensive, logically organized, and adheres to academic standards.。
759线性系统理论Linear System Theory

正式考試 2 次 (各40%)
長庚大學電機系
State feedback and state estimation
Controller and observer design
Minimal realizations (option)
Measure of controllability (option)
長庚大學電機系
1-10
評 量 標 準
Theoretical analysis rather than trial and errors.
Theoretical analysis is important because
– physical system is usually too expensive or too dangerous to be experimented – thorough understanding of system behaviors
1-1
線 性 系 統 理 論 Linear System Theory
林心宇 長庚大學電機工程學系
2010秋
長庚大學電機系
1-2
教師資料
教師:林心宇
– – – – Office Room: 工學大樓六樓 Telephone: Ext. 3221 E-mail: shinylin@.tw Office Hour: 2:00 – 4:00 pm, Thursaourse
Broad applications cover many areas such as control systems, signal processing, communications, aeronautics, etc.
美国AMS.emc.Jan2004.Seattle

SST-dependent wind speed difference across the North Wall of the Gulf Stream Gulf Stream Waters – 30 to 40 kt Cooler Slope Waters – 15 to 25 kt
Sea Ice Modeling and Analysis
• • •
Sea Surface Temperature & Winds
–
Real-time Sea Ice products Basin-scale Ocean Model (new development)
NOAA Wavewatch III (NWW3)
• Developed from community WAM
Similar result for January IC
U. S. Surface Temperature Hindcast Skill
3 Month Averages January IC Comparison with CPC CCA Method (right) Coupled System skill may be complementary to CCA
• Higher resolution experiments
Global Climate and Weather Branch Development
• Sub-grid scale orographic drag
– Parallel run shows 1% improvement in NH & SH – Late winter implementation
Real Time Ocean Forecasting
消费者感知风险:概念和模型【外文翻译】
外文翻译原文Consumer perceived risk:conceptualisations and models Material Source:European Journal of Marketing /V olume 33 issue 1/2Author:Vincent-Wayne Mitchell Keywords Consumer behaviour, Consumer’s risk, Marketing strate gy, Model, Perception, RiskAbstract Reviews the literature on consumer-perceived risk over the past 30 years. The review begins by establishing perceived risk’s relationship with related marketing constructs such as involvement and trust. It then tackles some debates within the literature, concerning subjective and objective risk and differences between the concepts of risk and uncertainty. It describes how different models have been devised and operationalised to measure risk and how these have developed over the years. Aims to identify and report the theoretical and model developments over the past 30 years and to propose criteria which researchers can use in deciding the most useful model for their own research. The criteria are: understanding, prediction, suitability for reliability and validity assessment, practicality and usability. It is suggested that the basic two-component model is still the most generally useful for researchers and practitioners alike.IntroductionIn 1960, when Bauer first brought the concept of risk to the attention of the American marketing community he stated that:I have neither confidence nor anxiety that my proposal will cause any major stir. At most, it is to be hoped that it will attract the attention of a few researchers and practitioners and at least survive through infancy (Bauer, 1960, p. 389).So, why do marketing practitioners and researchers continue to be interested? First, perceived risk theory has intuitive appeal and plays a role in facilitating marketers seeing the world through their customer’s eyes. Second, it can be almost universally applied and its versatility has been demonstrated in a wide range of applications, from spaghetti(Cunningham, 1967) to industrial reprographic equipment (Newall, 1977). Third, it is suggested that perceived risk is morepowerful at explaining consumers’ behaviour since consumers are more often motivated to avoid mistakes than to maximise utility in purchasing. Fourth, risk analysis can be used in marketing resource allocation decisions. For example, a study of risk relievers used by consumers can help to increase marketing efficiency by channelling resources into strategies which consumers find more useful, while withdrawing them from those which they find less useful. Risk perceptionanalysis can also be helpful in brand-image development, targeting, positioning and segmentation; e.g. by highlighting risk aspects in comparative advertising; repositioning commodity products to give added value, and segmenting consumers as on the basis of their risk-reducing strategy usage. Finally, examining risk perceptions can generate new product ideas. In a recent study of breakfast cereals, one of the risks consumers perceived was a result of disliking milk. This suggested the development of non-milk-based breakfast products such as Kellogg’s Pop Tarts (Mitchell and Boustani, 1993).Perceived risk applicationsAlthough perceived risk has found application in many areas, it is beyond the scope of this paper to review all of these[1]. Instead, this section outlines the main areas of application in consumer and organisational markets and draws distinctions between high and low involvement goods and between goods and services.A number of authors have shown that services are riskier than products (Guseman, 1981; Lewis, 1976; Mitchell and Greatorex, 1993). This is because of the inherent properties of services, i.e. heterogeneity, perishability, inseparability and intangibility which undermine consumer confidence and increase the perceived risk, mainly by augmenting the degree of uncertainty in the decision. The most frequently studied services are life insurance, doctors and hairdressers, then legal services, banks and dry cleaners with more recent studies focusing on professional services (e.g. Boze, 1987; Crocker, 1983; Garner and Garner, 1985; Motilla, 1983).The versatility of perceived risk and its universal appeal for researchers keen to explain less usual consumer phenomena is demonstrated by studies on topics such as experts systems and artificial intelligence (Taunton, 1989; Wong, 1988), flexible manufacturing systems (Phillips, 1987), complaints about advertising (Lawson, 1985), financial risk assessment (Farrelly et al., 1985), top executive travel (Brown, 1987) and diffusion theory (Onkvisit and Shaw, 1989).Very many studies have examined fairly low-cost convenience food and nonfood stuffs, with which consumers are little involved and within which there isminimal perceived risk. This is a problem because when risk is below a risk threshold, perceived risk theory has little explicatory power; except when these products are the subject of a consumer “scare”. A priority for future research should be to use high-value products or services, for example, cars, fridges, washing machines, brown goods, boats, caravans, houses, time-share accommodation, jewellery, objets d’art, holidays, wedding arrangements, private pension plans, etc.Applications in the organisational purchasing area have been fewer, but have shown that one of the main differences between organisational and consumer risk is the degree of complexity of consequences. Recent work has suggested that organisational buyers perceived not only personal and organizational risks, but also professional risks which are associated with their role as a professional within an organisation (Mitchell, 1998). Hakansson and Wootz(1979) refer to a model of organisational decision making with three dimensions of uncertainty:(1) need uncertainty;(2) transaction uncertaintywhile Valla (1982) identified five categories of risk with which a buyer must contend. These were:(1) technical risk;(2) financial risk;(3) delivery risk;(4) service risk; and(5) risk related to supplier/customer long-term relationships.Proposed model assessment criteriaWhen examining the models and conceptualizations presented in the literature,some framework is required. Here, several criteria are proposed on which to judge the usefulness of perceived risk models. These include:•the level of concept understanding generated;•predictive success;•suitability for reliability and validity testing;•level of practical and managerial insight offered; and•usability.Developing any proposed model should increase our understanding of the construct or concept. Rivett (1994) notes that an important quality of a model should be its capacity to reach out into the unknown or the unknowable. He points out a model’s first quality is to cut out irrelevance and to simplify.One main objective of model building is prediction. In doing this, “we must always remember that mathematics is the vehicle which takes us to our destination and is not our destination itself” (Rivett, 1994, p. 26). In consumer behaviour research, this mainly takes the form of predicting consumers’ propensity to purchase. This criterion overlaps with the validity criterion, since known-group validity can often use purchasers and non-purchasers as criterion groups to separate high and low-risk perceivers. This criterion focuses our attention on why the model is being constructed and highlights the comparison problems caused by the potential diversity of answers.The suitability for reliability and validity assessment criterion is clearly underpinned by a positivist research paradigm. Much of the literature, while using the paradigm, has not followed through on assessing the reliability and validity of models. It is not always expected that once a model is proposed the researcher should provide all the necessary data relating to its reliability and validity in order to assess its usefulness in describing or explaining the concept, however, not to provide any data or assessment of how the model could be subject to such tests has regrettably been a common occurrence in the literature; even after 1979 when Churchill (1979) had identified assessing construct validity as being essential for developing good measures. In terms of further research, a major contribution to the marketing literature is waiting to be made from comparing the various perceived risk models and measures using known-group validity and multi-trait-multi-method matrices. Some limitedreliability and validity evidence is available (see e.g. Lumpkin and Massey,1983); however, the quest remains a major challenge for future researchers.Consumer perceived risk measurement modelsOperationalizing perceived risk has resulted in many models, some of which are similar. This section considers the more useful measurement models (see Table I) beginning with the simplest and moving to the more complicated.Basic modelsCunningham (1967) was one of the first to suggest a two-component model, with each dimension, uncertainty and dangerousness of consequence, measured on four-point scales. These were collapsed to three-point scales then combined multiplicatively to give a one-to-nine risk scale. The decision to group the perceived risk scale into three equivalent gradations was based primarily on an evaluation of the resultant cell sizes. As Cunningham himself admits, “an arbitrary method ofconstructing the perceived risk index was used”(Cunningham, 1967, p. 84).This two-component model or variations on it has been the mainstay of perceived risk research over the past 30 years. A major preoccupation with researchers is deciding how the various elements of perceived risk should be combined, i.e. should the basic components of risk be multiplied or added?In 1976, Peter and Ryan commented that the two components are usually combined multiplicatively to give an overall indication of perceived risk: Risk = probability of negative consequences occurring Importance of negative consequencesAlthough the logic of this multiplicative model is not provided in the literature, it is likely to come from probability theory, where probabilities are multiplied by monetary value to determine the expected values of gambles (Peter and Ryan,1976, p. 184). Peter and Ryan (1976) measured probabilities and importance of loss and correlated them with brand preference. For five out of six brands the summated perceived risk model for the high-importance segment was correlated more highly with brand preference than was the multiplicative form.They also concluded that the importance of losses may be more useful as a segmentation variable than as a component of a multiplicative perceived risk model. Most of the work in the risk area has proposed some sort of multiplicative formation (e.g. Cunningham, 1967; Sieber and Lanzetta, 1964). By contrast, Wright (1973) forcefully argues that such mathematical representations of consumer decision processes may be overly complicated.The argument of multiplicative versus additive has continued to engage researchers over the three decades. Bettman (1973) provided evidence that an additive model fits slightly better; although the R2 values were quite close for the two models, and the model coefficients had very similar patterns. Horton(1976) too reported that the linear model is generally superior to the multiplicative model at both the product class and aggregated levels. Finally, work by Lanzetta and Driscoll (1968) is supportive of a linear model. They suggested that a positive correlation between importance and uncertainty of consequences might lead to an additive model being better. Recent work by Joag et al. (1990) using a simulated industrial setting revealed that when a decision had multiple plays (e.g. purchasing 100 personal computers) decision makers combined probabilities and outcomes to form their risk perceptions in a manner consistent with a multiplicative informationintegration model. In contrast, when a decision had a single trial (e.g. purchasing one large mainframe computer), information was combined in a manner consistent with a nonmultiplicative integration pattern. Given the research evidence, an additive model might better predict risk perception in more cases than a multiplicative model, but the careful researcher should test both formulations.Complex risk modelsRecently Dowling and Staelin (1994) have incorporated Bettman’s inherent and handled risk notion into a formal model. They refer a person’s pre disposition towards a product category (inherent risk) as product-category risk, while the second component (handled risk) is referred to as product-specific risk.Acknowledgement is given to other antecedents of risk including:(1) levels of the attributes of a specific product, e.g. price, quality rating etc.;(2) the likelihood of failure that leads to negative consequences;(3) the individual’s purchase goals;(4) other conditions, e.g. purchase channel.A third major component is their concept of two types of acceptable risk related to the product category (e.g. sky diving) and a specific product within the product category. The acceptable risk level was defined as the lowest productspecific risk score associated with a subject’s response that he/she wou ld prefer to seek more information. Their study is one of the first to assess empirically the effect of an acceptance level of risk on any type of consumer behaviour. The model also incorporates risk reduction activity. For example, when productspecific risk is less than a person’s acceptable risk level, the person’s intention to engage in search behaviour is hypothesised not to be influenced by productspecific risk. A new method was used to assess risk by using a conjoint methodology in which the part worths (i.e. risk utilities) are estimated for each potential consequence for all product attributes for every individual.One of the most complex measurement models has been developed by Deering and Jacoby (1972) who measured risk using ten questions (see Table I). The first composite measure (CM-1) combined responses to two questions used in previous studies (e.g. Cunningham, 1967a), questions one and two in Table I. These items formed a nine-point scale on which high values indicated a high degree of danger or uncertainty. In the second composite measure (CM-2), the uncertainty questions emphasise an individual’s specific differences in their ability to predict product attributes. Questions, 3, 4 and 5 were combined asfollows:CM-2 = (3) (4 + 5)/2In the third composite risk measure (CM-3), consequences were again represented by ratings of importance (4) and investment (5) as in CM-2. The unpredictability component included the perceived unpredictability of product dependability with repeated use (6), product construction and materials (7), results of product failure (8), and the degree (9) and kind (10) of goal fulfillment involved. The formula for obtaining CM-3 is seen in Table I.This has remained one of the most comprehensive measures of product risk to the present day, rivalled only by a number of models which have taken a multi-attribute approach (e.g. Dowling and Staelin, 1994; Greatorex and Mitchell, 1993; Zikmund and Scott, 1977). The number of other studies using a similar approach has been negligible; perhaps because of the amount of data required. It is unfortunate that Deering and Jacoby (1972) did not report on thevariation between the measures. Perhaps if they had been able to demonstrate the benefits which might be reaped from collecting such additional information, their expanded measure may have been more extensively used by subsequent researchers. The amount of data required and the lack of information on loss types may have resulted in the decision by many researchers not to use the model.ConclusionThe perceived risk concept, with its 38 years of tradition, has stood the test of time and continues to motivate researchers to use its tenet. This is despite, orperhaps because of, the multiple definitions of the concept. A universallyagreed theoretical or operational definition still eludes marketing academics in the field. Meanwhile, the weight of empirical research has used Cunningham’s (1967) two-component model for which there continues to be a good rationale for so doing. The two-component model appears to be the most generally useful and comes out well on the five proposed evaluative criteria of usability, practical implications, prediction, suitability for reliability and validity testing, and developing understanding. However, controversy still exists over whether the two components of probability and consequence should be combined additively or multiplicatively; although the evidence indicates that the additive model is likely to be superior in most cases. Some reservations have been expressed about the independence assumption of the two components and researchers await the results of further work on this question. Until such work is forthcoming, an additive model of probability of loss plus importance of loss is suggested as a working measure.Good models of perceived risk can only really be judged on what the researcher is attempting to achieve by designing the model. In this respect, each researcher has licence to design objective-specific models which may have very limited general use. Far from this being discouraged, it should be encouraged, but only when other existing models, many of which are presented with this paper, have been evaluated for fitness for purpose.译文消费者感知风险:概念和模型资料来源: 欧洲市场营销/音量杂志33卷1/2作者:文森特,韦恩米切尔关键词消费者行为,消费者的风险,营销策略,模型,感知,风险摘要综述了过去30年间通过建立感知风险与相关市场的关系如参与和信任结构,在消费者感知风险领域的研究。
Das-Naglieri认知评估系统及其在评估干预中的应用
软件工程英文参考文献(优秀范文105个)
当前,计算机技术与网络技术得到了较快发展,计算机软件工程进入到社会各个领域当中,使很多操作实现了自动化,得到了人们的普遍欢迎,解放了大量的人力.为了适应时代的发展,社会各个领域大力引进计算机软件工程.下面是软件工程英文参考文献105个,供大家参考阅读。
软件工程英文参考文献一:[1]Carine Khalil,Sabine Khalil. Exploring knowledge management in agile software development organizations[J]. International Entrepreneurship and Management Journal,2020,16(4).[2]Kevin A. Gary,Ruben Acuna,Alexandra Mehlhase,Robert Heinrichs,Sohum Sohoni. SCALING TO MEET THE ONLINE DEMAND IN SOFTWARE ENGINEERING[J]. International Journal on Innovations in Online Education,2020,4(1).[3]Hosseini Hadi,Zirakjou Abbas,Goodarzi Vahabodin,Mousavi Seyyed Mohammad,Khonakdar Hossein Ali,Zamanlui Soheila. Lightweight aerogels based on bacterial cellulose/silver nanoparticles/polyaniline with tuning morphology of polyaniline and application in soft tissue engineering.[J]. International journal of biological macromolecules,2020,152.[4]Dylan G. Kelly,Patrick Seeling. Introducing underrepresented high school students to software engineering: Using the micro:bit microcontroller to program connected autonomous cars[J]. Computer Applications in Engineering Education,2020,28(3).[5]. Soft Computing; Research Conducted at School of Computing Science and Engineering Has Updated Our Knowledge about Soft Computing (Indeterminate Likert scale: feedback based on neutrosophy, its distance measures and clustering algorithm)[J]. News of Science,2020.[6]. Engineering; New Engineering Findings from Hanyang University Outlined (Can-based Aging Monitoring Technique for Automotive Asics With Efficient Soft Error Resilience)[J]. Journal of Transportation,2020.[7]. Engineering - Software Engineering; New Findings from University of Michigan in the Area of Software Engineering Reported (Multi-criteria Test Cases Selection for Model Transformations)[J]. Journal of Transportation,2020.[8]Tamas Galli,Francisco Chiclana,Francois Siewe. Software Product Quality Models, Developments, Trends, and Evaluation[J]. SN Computer Science,2020,1(2).[9]. Infotech; Infotech Joins BIM for Bridges and Structures Transportation Pooled Fund Project as an Official Software Advisor[J]. Computer TechnologyJournal,2020.[10]. Engineering; Study Findings from Beijing Jiaotong University Provide New Insights into Engineering (Analyzing Software Rejuvenation Techniques In a Virtualized System: Service Provider and User Views)[J]. Computer Technology Journal,2020.[11]. Soft Computing; Data on Soft Computing Reported by Researchers at Sakarya University (An exponential jerk system, its fractional-order form with dynamical analysis and engineering application)[J]. Computer Technology Journal,2020.[12]. Engineering; Studies from Henan University Yield New Data on Engineering (Extracting Phrases As Software Features From Overlapping Sentence Clusters In Product Descriptions)[J]. Computer Technology Journal,2020.[13]. Engineering; Data from Nanjing University of Aeronautics and Astronautics Provide New Insights into Engineering (A Systematic Study to Improve the Requirements Engineering Process in the Domain of Global Software Development)[J]. Computer Technology Journal,2020.[14]. Soft Computing; Investigators at Air Force Engineering University Report Findings in Soft Computing (Evidential model for intuitionistic fuzzy multi-attribute group decision making)[J]. Computer Technology Journal,2020.[15]. Engineering; Researchers from COMSATS University Islamabad Describe Findings in Engineering (A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks)[J]. Computer Technology Journal,2020.[16]Pedro Delgado-Pérez,Francisco Chicano. An Experimental and Practical Study on the Equivalent Mutant Connection: An Evolutionary Approach[J]. Information and Software Technology,2020.[17]Koehler Leman Julia,Weitzner Brian D,Renfrew P Douglas,Lewis Steven M,Moretti Rocco,Watkins Andrew M,Mulligan Vikram Khipple,Lyskov Sergey,Adolf-Bryfogle Jared,Labonte Jason W,Krys Justyna,Bystroff Christopher,Schief William,Gront Dominik,Schueler-Furman Ora,Baker David,Bradley Philip,Dunbrack Roland,Kortemme Tanja,Leaver-Fay Andrew,Strauss Charlie E M,Meiler Jens,Kuhlman Brian,Gray Jeffrey J,Bonneau Richard. Better together: Elements of successful scientific software development in a distributed collaborative community.[J]. PLoS computational biology,2020,16(5).[18]. Mathematics; Data on Mathematics Reported by Researchers at Thapar Institute of Engineering and Technology (Algorithms Based on COPRAS and Aggregation Operators with New Information Measures for Possibility Intuitionistic Fuzzy SoftDecision-Making)[J]. Journal of Mathematics,2020.[19]. Engineering - Medical and Biological Engineering; Reports from Heriot-Watt University Describe Recent Advances in Medical and Biological Engineering (A Novel Palpation-based Method for Tumor Nodule Quantification In Soft Tissue-computational Framework and Experimental Validation)[J]. Journal of Engineering,2020.[20]. Engineering - Industrial Engineering; Studies from Xi'an Jiaotong University Have Provided New Data on Industrial Engineering (Dc Voltage Control Strategy of Three-terminal Medium-voltage Power Electronic Transformer-based Soft Normally Open Points)[J]. Journal of Engineering,2020.[21]. Engineering; Reports from Hohai University Add New Data to Findings in Engineering (Soft Error Resilience of Deep Residual Networks for Object Recognition)[J]. Journal of Engineering,2020.[22]. Engineering - Mechanical Engineering; Study Data from K.N. Toosi University of Technology Update Understanding of Mechanical Engineering (Coupled Directional Dilation-Damage Approach to Model the Cyclic-Undrained Response of Soft Clay under Pure Principal Stress Axes Rotation)[J]. Journal of Engineering,2020.[23]. Soft Computing; Researchers from Abes Engineering College Report Details of New Studies and Findings in the Area of Soft Computing (An intelligent personalized web blog searching technique using fuzzy-based feedback recurrent neural network)[J]. Network Weekly News,2020.[24]. Engineering; Studies from University of Alexandria in the Area of Engineering Reported (Software Defined Network-Based Management for Enhanced 5G Network Services)[J]. Network Weekly News,2020.[25]. Soft Computing; Data on Soft Computing Discussed by Researchers at Department of Electrical and Communication Engineering [A metaheuristic optimization model for spectral allocation in cognitive networks based on ant colony algorithm (M-ACO)][J]. Computer Technology Journal,2020.[26]. Engineering - Software Engineering; Complutense University Madrid Reports Findings in Software Engineering (Recolibry Suite: a Set of Intelligent Tools for the Development of Recommender Systems)[J]. Computer Technology Journal,2020.[27]. Engineering - Software Engineering; Data on Software Engineering Reported by Researchers at Gautam Buddha University (A novel quality prediction model for component based software system using ACO-NM optimized extreme learning machine)[J]. Computer Technology Journal,2020.[28]. Soft Computing; New Soft Computing Study Findings Recently Were Reported by Researchers at University College of Engineering (A novel QIM-DCT based fusion approach for classification of remote sensing images via PSO and SVM models)[J]. Computer Technology Journal,2020.[29]Morshedloo Fatemeh,Khoshfetrat Ali Baradar,Kazemi Davoud,Ahmadian Mehri. Gelatin improves peroxidase-mediated alginate hydrogel characteristics as a potential injectable hydrogel for soft tissue engineering applications.[J]. Journal of biomedical materials research. Part B, Applied biomaterials,2020.[30]Jung-Chieh Lee,Chung-Yang Chen. Exploring the team dynamic learning process in software process tailoring performance[J]. Journal of Enterprise Information Management,2020,33(3).[31]. Soft Computing; Study Results from Velammal Engineering College in the Area of Soft Computing Reported (Efficient routing in UASN during the thermohaline environment condition to improve the propagation delay and throughput)[J]. Mathematics Week,2020.[32]. Soft Matter; Findings from School of Materials Science and Engineering Provide New Insights into Soft Matter (A practical guide to active colloids: choosing synthetic model systems for soft matter physics research)[J]. Physics Week,2020.[33]Julio César Puche-Regaliza,Alfredo Jiménez,Pablo Arranz-Val. Diagnosis of Software Projects Based on the Viable System Model[J]. Systemic Practice and Action Research,2020,33(1).[34]Meinert Edward,Milne-Ives Madison,Surodina Svitlana,Lam Ching. Agile requirements engineering and software planning for a digital health platform to engage the effects of isolation caused by social distancing: A case study and feasibility study protocol.[J]. JMIR public health and surveillance,2020.[35]. Engineering - Civil Engineering; Studies Conducted at Shandong Jianzhu University on Civil Engineering Recently Published (Seismic Response Analysis and Control of Frame Structures with Soft First Storey under Near-Fault Ground Motions)[J]. Journal of Engineering,2020.软件工程英文参考文献二:[36]Chao-ze Lu,Guo-sun Zeng,Ying-jie Xie. Bigraph specification of software architecture and evolution analysis in mobile computing environment[J]. Future Generation Computer Systems,2020,108.[37]Ompal Singh, Saurabh Panwar, P. K. Kapur.. Determining SoftwareTime-to-Market and Testing Stop Time when Release Time is a Change-Point[J]. International Journal of Mathematical, Engineering and Management Sciences,2020,5(2).[38]Ayushi Verma,Neetu Sardana,Sangeeta Lal. Developer Recommendation for Stack Exchange Software Engineering Q&A Website based on K-Means clustering and Developer Social Network Metric[J]. Procedia Computer Science,2020,167.[39]Jagdeep Singh,Sachin Bagga,Ranjodh Kaur. Software-based Prediction of Liver Disease with Feature Selection and Classification Techniques[J]. Procedia Computer Science,2020,167.[40]. Engineering - Software Engineering; Studies from Concordia University Update Current Data on Software Engineering (On the impact of using trivial packages: an empirical case study on npm and PyPI)[J]. Computer Technology Journal,2020.[41]. Engineering - Software Engineering; Study Findings from University of Alberta Broaden Understanding of Software Engineering (Building the perfect game - an empirical study of game modifications)[J]. Computer Technology Journal,2020.[42]. Engineering - Software Engineering; Investigators at National Research Council (CNR) Detail Findings in Software Engineering [A Framework for Quantitative Modeling and Analysis of Highly (Re)Configurable Systems][J]. Computer Technology Journal,2020.[43]. Engineering - Knowledge Engineering; Data from University of Paris Saclay Provide New Insights into Knowledge Engineering (Dynamic monitoring of software use with recurrent neural networks)[J]. Computer Technology Journal,2020.[44]. Engineering - Circuits Research; Findings from Federal University Santa Maria Yields New Data on Circuits Research (A New Cpfsk Demodulation Approach for Software Defined Radio)[J]. Computer Technology Journal,2020.[45]. Soft Computing; Investigators from Lovely Professional University Release New Data on Soft Computing (An intensify Harris Hawks optimizer for numerical and engineering optimization problems)[J]. Computer Technology Journal,2020.[46]. GlobalLogic Inc.; GlobalLogic Acquires Meelogic Consulting AG, a European Healthcare and Automotive-Focused Software Engineering Services Firm[J]. Computer Technology Journal,2020.[47]. Engineering - Circuits and Systems Research; Data on Circuits and Systems Research Described by Researchers at Northeastern University (Softcharge: Software Defined Multi-device Wireless Charging Over Large Surfaces)[J]. TelecommunicationsWeekly,2020.[48]. Soft Computing; Researchers from Department of Electrical and Communication Engineering Report on Findings in Soft Computing (Dynamic Histogram Equalization for contrast enhancement for digital images)[J]. Technology News Focus,2020.[49]Mohamed Ellithey Barghoth,Akram Salah,Manal A. Ismail. A Comprehensive Software Project Management Framework[J]. Journal of Computer and Communications,2020,08(03).[50]. Soft Computing; Researchers from Air Force Engineering University Describe Findings in Soft Computing (Random orthocenter strategy in interior search algorithm and its engineering application)[J]. Journal of Mathematics,2020.[51]. Soft Computing; Study Findings on Soft Computing Are Outlined in Reports from Department of Mechanical Engineering (Constrained design optimization of selected mechanical system components using Rao algorithms)[J]. Mathematics Week,2020.[52]Iqbal Javed,Ahmad Rodina B,Khan Muzafar,Fazal-E-Amin,Alyahya Sultan,Nizam Nasir Mohd Hairul,Akhunzada Adnan,Shoaib Muhammad. Requirements engineering issues causing software development outsourcing failure.[J]. PloS one,2020,15(4).[53]Raymond C.Z. Cohen,Simon M. Harrison,Paul W. Cleary. Dive Mechanic: Bringing 3D virtual experimentation using biomechanical modelling to elite level diving with the Workspace workflow engine[J]. Mathematics and Computers in Simulation,2020,175.[54]Emelie Engstr?m,Margaret-Anne Storey,Per Runeson,Martin H?st,Maria Teresa Baldassarre. How software engineering research aligns with design science: a review[J]. Empirical Software Engineering,2020(prepublish).[55]Christian Lettner,Michael Moser,Josef Pichler. An integrated approach for power transformer modeling and manufacturing[J]. Procedia Manufacturing,2020,42.[56]. Engineering - Mechanical Engineering; New Findings from Leibniz University Hannover Update Understanding of Mechanical Engineering (A finite element for soft tissue deformation based on the absolute nodal coordinate formulation)[J]. Computer Technology Journal,2020.[57]. Science - Social Science; Studies from University of Burgos Yield New Information about Social Science (Diagnosis of Software Projects Based on the Viable System Model)[J]. Computer Technology Journal,2020.[58]. Technology - Powder Technology; Investigators at Research Center Pharmaceutical Engineering GmbH Discuss Findings in Powder Technology [Extended Validation and Verification of Xps/avl-fire (Tm), a Computational Cfd-dem Software Platform][J]. Computer Technology Journal,2020.[59]Guadalupe-Isaura Trujillo-Tzanahua,Ulises Juárez-Martínez,Alberto-Alfonso Aguilar-Lasserre,María-Karen Cortés-Verdín,Catherine Azzaro-Pantel. Multiple software product lines to configure applications of internet of things[J]. IET Software,2020,14(2).[60]Eduardo Juárez,Rocio Aldeco-Pérez,Jose.Manuel Velázquez. Academic approach to transform organisations: one engineer at a time[J]. IET Software,2020,14(2).[61]Dennys García-López,Marco Segura-Morales,Edson Loza-Aguirre. Improving the quality and quantity of functional and non-functional requirements obtained during requirements elicitation stage for the development of e-commerce mobile applications: an alternative reference process model[J]. IET Software,2020,14(2).[62]. Guest Editorial: Software Engineering Applications to Solve Organisations Issues[J]. IET Software,2020,14(2).[63]?,?. Engine Control Unit ? ? ?[J]. ,2020,47(4).[64]. Engineering - Software Engineering; Study Data from Nanjing University Update Understanding of Software Engineering (Identifying Failure-causing Schemas In the Presence of Multiple Faults)[J]. Mathematics Week,2020.[65]. Energy - Renewable Energy; Researchers from Institute of Electrical Engineering Detail New Studies and Findings in the Area of Renewable Energy (A Local Control Strategy for Distributed Energy Fluctuation Suppression Based on Soft Open Point)[J]. Journal of Mathematics,2020.[66]Ahmed Zeraoui,Mahfoud Benzerzour,Walid Maherzi,Raid Mansi,Nor-Edine Abriak. New software for the optimization of the formulation and the treatment of dredged sediments for utilization in civil engineering[J]. Journal of Soils and Sediments,2020(prepublish).[67]. Engineering - Concurrent Engineering; Reports from Delhi Technological University Add New Data to Findings in Concurrent Engineering (Systematic literature review of sentiment analysis on Twitter using soft computing techniques)[J]. Journal of Engineering,2020.[68]. Engineering; New Findings from Future University in Egypt in the Area of Engineering Reported (Decision support system for optimum soft clay improvementtechnique for highway construction projects)[J]. Journal of Engineering,2020.[69]Erica Mour?o,Jo?o Felipe Pimentel,Leonardo Murta,Marcos Kalinowski,Emilia Mendes,Claes Wohlin. On the performance of hybrid search strategies for systematic literature reviews in software engineering[J]. Information and Software Technology,2020,123.[70]. Soft Computing; Researchers from Anna University Discuss Findings in Soft Computing (A novel fuzzy mechanism for risk assessment in software projects)[J]. News of Science,2020.软件工程英文参考文献三:[71]. Software and Systems Research; New Software and Systems Research Study Results from Chalmers University of Technology Described (Why and How To Balance Alignment and Diversity of Requirements Engineering Practices In Automotive)[J]. Journal of Transportation,2020.[72]Anupama Kaushik,Devendra Kr. Tayal,Kalpana Yadav. A Comparative Analysis on Effort Estimation for Agile and Non-agile Software Projects Using DBN-ALO[J]. Arabian Journal for Science and Engineering,2020,45(6).[73]Subhrata Das,Adarsh Anand,Mohini Agarwal,Mangey Ram. Release Time Problem Incorporating the Effect of Imperfect Debugging and Fault Generation: An Analysis for Multi-Upgraded Software System[J]. International Journal of Reliability, Quality and Safety Engineering,2020,27(02).[74]Saerom Lee,Hyunmi Baek,Sehwan Oh. The role of openness in open collaboration:A focus on open‐source software development projects[J]. ETRI Journal,2020,42(2).[75]. Soft Computing; Study Results from Computer Science and Engineering Broaden Understanding of Soft Computing (Efficient attribute selection technique for leukaemia prediction using microarray gene data)[J]. Computer Technology Journal,2020.[76]. Engineering - Computational Engineering; Findings from University of Cincinnati in the Area of Computational Engineering Described (Exploratory Metamorphic Testing for Scientific Software)[J]. Computer Technology Journal,2020.[77]. Organizational and End User Computing; Data from Gyeongnam National University of Science and Technology Advance Knowledge in Organizational and End User Computing (A Contingent Approach to Facilitating Conflict Resolution in Software Development Outsourcing Projects)[J]. Computer Technology Journal,2020.[78]. Soft Computing; Findings from Department of Industrial Engineering in the Area of Soft Computing Reported (Analysis of fuzzy supply chain performance based on different buyback contract configurations)[J]. Computer Technology Journal,2020.[79]Hana Mkaouar,Bechir Zalila,Jér?me Hugues,Mohamed Jmaiel. A formal approach to AADL model-based software engineering[J]. International Journal on Software Tools for Technology Transfer,2020,22(5).[80]Riesch Michael,Nguyen Tien Dat,Jirauschek Christian. bertha: Project skeleton for scientific software.[J]. PloS one,2020,15(3).[81]. Computers; Findings from Department of Computer Sciences and Engineering Reveals New Findings on Computers (An assessment of software defined networking approach in surveillance using sparse optimization algorithm)[J]. Telecommunications Weekly,2020.[82]Luigi Ranghetti,Mirco Boschetti,Francesco Nutini,Lorenzo Busetto. “sen2r”: An R toolbox for automatically downloading and preprocessing Sentinel-2 satellite data[J]. Computers and Geosciences,2020,139.[83]Mathie Najberg,Muhammad Haji Mansor,Théodore Taillé,Céline Bouré,Rodolfo Molina-Pe?a,Frank Boury,José Luis Cenis,Emmanuel Garcion,Carmen Alvarez-Lorenzo. Aerogel sponges of silk fibroin, hyaluronic acid and heparin for soft tissue engineering: Composition-properties relationship[J]. Carbohydrate Polymers,2020,237.[84]Isonkobong Udousoro. Effective Requirement Engineering Process Model in Software Engineering[J]. Software Engineering,2020,8(1).[85]. Soft Computing; Research Conducted at Department of Computer Sciences and Engineering Has Updated Our Knowledge about Soft Computing [Hyperparameter tuning in convolutional neural networks for domain adaptation in sentiment classification (HTCNN-DASC)][J]. Network Weekly News,2020.[86]. Engineering - Software Engineering; Data on Software Engineering Discussed by Researchers at Universita della Svizzera italiana (Investigating Types and Survivability of Performance Bugs In Mobile Apps)[J]. Computer Technology Journal,2020.[87]. Engineering - Software Engineering; Findings from Nanjing University Broaden Understanding of Software Engineering (Boosting Crash-inducing Change Localization With Rank-performance-based Feature Subset Selection)[J]. Computer Technology Journal,2020.[88]. Engineering - Software Engineering; Study Data from Queen's University Belfast Update Knowledge of Software Engineering (Practical relevance of software engineering research: synthesizing the community's voice)[J]. Computer Technology Journal,2020.[89]. Engineering - Software Engineering; Researchers from Concordia University Detail New Studies and Findings in the Area of Software Engineering (MSRBot: Using bots to answer questions from software repositories)[J]. Computer Technology Journal,2020.[90]Anonymous. DBTA LIVE[J]. Database Trends and Applications,2020,34(2).[91]Tachanun KANGWANTRAKOOL,Kobkrit VIRIYAYUDHAKORN,Thanaruk THEERAMUNKONG. Software Development Effort Estimation from Unstructured Software Project Description by Sequence Models[J]. IEICE Transactions on Information and Systems,2020,E103.D(4).[92]Reza Mohammadi,Reza Javidan,Negar Rikhtegar,Manijeh Keshtgari. An intelligent multicast traffic engineering method over software defined networks[J]. Journal of High Speed Networks,2020,26(1).[93]. Engineering - Civil Engineering; Hohai University Researchers Detail New Studies and Findings in the Area of Civil Engineering (An Experimental Study on Settlement due to the Mutual Embedding of Miscellaneous Fill and Soft Soil)[J]. Journal of Engineering,2020.[94]. Engineering - Biomechanical Engineering; Researchers from Washington University St. Louis Detail New Studies and Findings in the Area of Biomechanical Engineering (Estimation of Anisotropic Material Properties of Soft Tissue By Mri of Ultrasound-induced Shear Waves)[J]. Journal of Engineering,2020.[95]. Engineering - Rock Engineering; Reports from University of Alicante Add New Data to Findings in Rock Engineering (Evaluation of Strength and Deformability of Soft Sedimentary Rocks In Dry and Saturated Conditions Through Needle Penetration and Point Load Tests: a Comparative ...)[J]. Journal of Engineering,2020.[96]. Computers; Study Findings from Department of Electrical and Communication Engineering Broaden Understanding of Computers [Improved energy efficient design in software defined wireless electroencephalography sensor networks (WESN) using distributed ...][J]. Network Weekly News,2020.[97]Mouro Erica,Pimentel Joo Felipe,Murta Leonardo,Kalinowski Marcos,Mendes Emilia,Wohlin Claes. On the Performance of Hybrid Search Strategies for Systematic Literature Reviews in Software Engineering[J]. Information and SoftwareTechnology,2020(prepublish).[98]Osuna Enrique,Rodrguez Luis-Felipe,Gutierrez-Garcia J. Octavio,Castro LuisA.. Development of computational models of emotions: A software engineering perspective[J]. Cognitive Systems Research,2020,60(C).[99]Sharifzadeh Bahador,Kalbasi Rasool,Jahangiri Mehdi,Toghraie Davood,Karimipour Arash. Computer modeling of pulsatile blood flow in elastic artery using a software program for application in biomedical engineering[J]. Computer Methods and Programs in Biomedicine,2020.[100]Shen Xiaoning,Guo Yinan,Li Aimin. Cooperative coevolution with an improved resource allocation for large-scale multi-objective software project scheduling[J]. Applied Soft Computing,2020,88(C).[101]Jung Jaesoon,Kook Junghwan,Goo Seongyeol,Wang Semyung. Corrigendum to Sound transmission analysis of plate structures using the finite element method and elementary radiator approach with radiator error index [Advances in Engineering Software 112 (2017 115][J]. Advances in Engineering Software,2020,140(C).[102]Zhang Chenyi,Pang Jun. Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018[J]. Science of Computer Programming,2020,187(C).[103]Karras Oliver,Schneider Kurt,Fricker Samuel A.. Representing software project vision by means of video: A quality model for vision videos[J]. Journal of Systems and Software,2020,162(C).[104]Sutanto Juliana,Jiang Qiqi,Tan Chuan-Hoo. The contingent role of interproject connectedness in cultivating open source software projects[J]. The Journal of Strategic Information Systems,2020(prepublish).[105]Weiner Iddo,Feldman Yael,Shahar Noam,Yacoby Iftach,Tuller Tamir. CSO A sequence optimization software for engineering chloroplast expression in Chlamydomonas reinhardtii[J]. Algal Research,2020,46(C).以上就是关于软件工程英文参考文献的分享,希望对你有所帮助。
21世纪大学英语英语课文讲解Unit 8 (a)
Unit 8 教案Pre-reading Activities:Warm-up Questions1.What do you know about Bill Gates and his company Microsoft? What is Gates most famous for?2. What do you consider to be the most important technological achievements of the last 20 years? Why is each important?3. What kind of technological innovations might we see in the next 20 years?4. Skim the text to get the answers to the following questions:a). What sort of “revolution” does Gates believe is currently occurring?b). What stage of the revolution are we in now?c). How long does Gates expect it to go on?Text –related Information1.Bill (William) Gates (1955—)Bill Gates is an American computer programmer and businessman who in 1975 co-founded Microsoft (later Microsoft ) with Paul Allen, a private company for the manufacture and sale ofcomputers. As a teenager, he helped computerize his high school’s payroll 发薪簿system and founded a company that sold traffic-counting systems to local governments. At 19 he dropped out of Harvard University and co-founded Microsoft Corp. with Paul G. Allen (b. 1954). Microsoft began its domination of the fledgling乳臭小儿microcomputer industry when Gates licensed the operating system MS-DOS to IBM in 1980 for use in IBM’s fist personal computer. As Microsoft’s largest shareholder,chairman and chief executive Gates became a the youngest multi-billionaire in 1986, and within a de cade he was the world’s richest private individual. Beginning in 1995, he refocused Microsoft on the development of software solutions for the Internet, and he also moved the company into the computer hardware and gaming markets with the Xbox video machine. In 1999 he and his wife created the largest charitable foundation in the U.S.2. The Road AheadAuthored by Bill Gates, The Road Ahead was first published by the Penguin Group (New Y ork) in 1995. In the book, Bill Gates looks ahead to show how the emerging technologies of the digital age will transform all our lives and gives us his vision of the undiscovered territory on the information highway.3. Harvard SquareHarvard Square is a large triangular area in the center of Cambridge, Massachusetts. Often traffic-congested, it is located next to Harvard University at the intersection of Massachusetts A venue and John F. Kennedy Street, and is a highly traveled space for Harvard and MIT students, along with residents of Boston, Cambridge, and other nearby cities. In an extended sense, the name “Harvard Square” can refer to the entire neighborhood surrounding this intersection for several blocks in each direction.4. Microsoft Corp.In 1975, two young men from Seattle founded a company that would be to the Computer Age what the Ford Motor Company was to the Automobile Age. Like Henry Ford, William H. Gates Ⅲand Paul Allen transformed a new technology by building on the inventions of others, creating a mass market for what had once been a novelty for the few. Their company—originally called Micro-soft, an abbreviation for microcomputer software—helped change the living, working, and recreational habits of hundreds of millions of people around the world.ⅡSummary of the TextIn this foreword the author described some features of his oncoming chapters. His own adventure with PCs started 20 years ago. It was a technology literally ignored by the public then. Bu now, it concerns with PC-related technology flourished, together with widespread misunderstandings. The book was meant to give a general idea of the future development. The author was trying to be serious, but maybe his prediction will be rather humorous in ten or twenty years. Personal career was ignored in this book, technical detail was also not given, and it was a book written for a largest possible audience. Meant to be prolonged speech, although hundreds of times more difficult than writing a speech.III Text StructurePart I (para.1): Beginning with his story, the author pointed out the personal compute revolution has affected millions of lives.Part II (para.2-7): The upcoming communications revolution and misunderstanding: The wide spread misunderstanding of the information highway makes it necessary for a broad set of peopleto participate in the debate on the communication revolution.1.(para.2): The author explained the profound meaning, condition, upcoming change, even problem and benefits of the communications revolution.2.(para.3):PC industry is the foundation for the Communication Revolution.3.(para4-7): The author made clear about some misunderstanding on information highway.Part III.(para8-12) The purpose for which Bill Gates wrote the book1.(para.8-10): The author explained the purpose of writing the book further. The book is a travel guide for the forth coming journey.2.(para.11-12): The author told us his feeling of writing the book.para.11 The process of thinking about and writing the book longer than I expected.para.12 Hope: I hope it stimulates understanding, debate, and creative ideas.3.Skill learning in writing and reading1) Reading skill: “Metaphor”暗喻Metaphor i s a way of thinking of one thing in terms of another thing makes a COMPARISION between two unlike elements. This comparison is IMPLIED rather than STA TED(1). Make a list of all the words and phrases you can find with which Gates refers to computer technology as if it were a road, journey, or adventure.(2). Do you think this comparison of computer technologies to a journey is an effective one? If so, explain how the image of travel fits well with the new technologies. If not, what would be a better comparison?a. The past twenty years have been an incredible adventure for me. (Line 1)b.It has led us to places we had barely imagined. (Line 9)c.We are all beginning another great journey. (Line 11)d. We aren’t sure where this one will lead u s either. (Line 11)e. This revolution will ... take us all farther. (Line 13)f. There is never a reliable map for unexplored territory.(Line 18)g. But this next journey, to the so-called information highway.(Line 30)h. I hope it can serve as a travel guide for the forthcoming journey. (Line 61)W ords & Expressions1. Incredible:adj. 1. impossible to believe, 难以置信的The plot of the book is incredible. 这本书的情节让人难以置信。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Understanding Prediction Systems forHLA-Binding Peptides and T-cell EpitopeIdentificationLiwen You1,2,3,Ping Zhang3,Mikael Bod´e n4,Vladimir Brusic3,51School of Information Science,Computer and Electrical Engineering,HalmstadUniversity,Halmstad,Sweden2Department of Theoretical Physics,Lund University,Lund,Sweden3School of Land,Crop,and Food Sciences,and4School of Information Technology and Electrical Engineering,University ofQueensland,Brisbane QLD,Australia5Cancer Vaccine Center,Dana-Farber Cancer Institute,Boston MA,USA liwen@thep.lu.se;p.zhang2@.au;m.boden@.au;vladimir brusic@Abstract.Peptide binding to HLA molecules is a critical step in in-duction and regulation of T-cell mediated immune responses.Becauseof combinatorial complexity of immune responses,systematic studiesrequire combination of computational methods and experimentation.Most of available computational predictions are based on discriminatingbinders from non-binders based on use of suitable prediction thresholds.We compared four state-of-the-art binding affinity prediction models andfound that nonlinear models show better performance than linear mod-els.A comprehensive analysis of HLA binders(A*0101,A*0201,A*0301,A*1101,A*2402,B*0702,B*0801and B*1501)showed that non-linearpredictors predict peptide binding affinity with high accuracy.The anal-ysis of known T-cell epitopes of survivin and known HIV T-cell epitopesshowed lack of correlation between binding affinity and immunogenicityof HLA-presented peptides.T-cell epitopes,therefore,can not be directlydetermined from binding affinities by simple selection of the highest affin-ity binders.1IntroductionMajor histocompatibility complex(MHC)molecules present peptides,derived from antigens and host proteins,on the cell surface.The recognition of pre-sented peptides by TCD8+cells is necessary for recognition of infected or patho-logically mutated cells and induction of cellular immune responses and subse-quent elimination of tumors and infected cells.Human MHC is known as the human leukocyte antigen(HLA).Antigen processing and presentation involves primarily three steps:proteasomal cleavage,translocation of cleaved fragments by transporter associated with antigen processing,and HLA-peptide binding. The HLA/peptide binding is by far the most discriminative step:natural preva-lence of HLA-binding peptides is in the range of0.1-5%for any given proteinof which some20%remain functionally relevant[1,2].Therefore,computational prediction and modeling of HLA/peptide binding can greatly facilitate peptide screening,with tremendous savings in time and experimental effort.The HLA peptide binding prediction can be approached as simple classifi-cation problem of discriminating binders from non-binders.However,peptide binding is necessary but it does not guarantee an immune response.A binding affinity metric like inhibition concentration(IC50)of a standard probe quanti-fies HLA/peptide binding.Given a large number of binding data recently made available[3]we have extended the approach by studying peptide binding as a regression problem.Many different attempts have been made to predict MHC peptide binding. There are primarily three approaches:by structure modelling,data-driven using peptide sequences and their binding affinities,or by the combination thereof. Sequence-based approaches can be further categorized into motif/profile based methods[4–9]and machine learning methods which use Artificial Neural Net-works(ANN)[10,11],Hidden Markov Models(HMM)[12],or Support Vector Machines(SVM)[13–19].An example of combined method is the adaptive dou-ble threading[20].The prediction methods have been compared for accuracy of classification(binders vs.non-binders)[3,21,22].However different data sets are used to build models and evaluation data vary between different studies making it intrinsically difficult to compare predictor performance.Recently,a comprehensive experimental relative binding affinity analysis of a complete overlapping peptide library derived from the tumor-associated antigen survivin[23]was reported for eight different types of HLA class I molecules.Also, a large data set of peptide binding affinities became available at the Immune Epitope Database and Analysis Resource(IEDB,)[3]. Combining these two data sets,we analysed the factors that affect accuracy of prediction models and explored the correlation of peptide binding and immuno-genicity.The results of this study provide an improved understanding of the prediction systems design issues and their use for identification of HLA-binding peptides and T-cell epitopes.2Materials and MethodsFour different prediction methods were used in this study.Support Vector Re-gression(SVR)and epitope information were used to build a regression model to predict HLA-peptide binding affinities using thefirst of the data sets.The three models used at IEDB,namely ANN and two matrix methods were used as comparison predictors.We defined prediction performance criteria to enable fair comparisons between models.Specifically,we used match curve area and correlation coefficient to compare model performance.2.1DatasetsSurvivin,a member of the apoptosis inhibitor protein family,is one of a lim-ited number of shared tumor-associated antigens that is over-expressed in themajority of human cancers.There is an intense interest in using survivin as a tar-get for therapeutic CTL response.Bachinsky et al.[23]used a high-throughput technique to identify peptides derived from survivin that bind eight HLA class I alleles:HLA-A*0101,HLA-A*0201,HLA-A*0301,HLA-A*2402,HLA-A*1101, HLA-B*0702,HLA-B*0801,HLA-B*1501.A library of134overlapping non-amers spanning the full length of the survivin protein(UniProt O15392with 142amino acids)was experimentally screened for peptides capable of binding each allele.Binding to each allele was reported as a percentage relative to a positive control peptide for that allele as values from0to>100%.An arbi-trary cutoffof30%of the control was used as a positive cutofffor experimental binders.Therewith,they identified nineteen HLA-A*0201,zero HLA-A*0101, seven HLA-A*0301,twelve HLA-A*1101,twenty-four HLA-A*2402,six HLA-B*0702,six HLA-B*0801and eight HLA-B*1501binding peptides.Friedrichs et al.[24]collected a set of survivin-derived peptides,which can induce HLA restricted CTL responses.Two peptides reported as survivin-derived nonamer T-cell epitopes are HLA-A*0201restricted96LTLGEFLKL104and A* 2402restricted20STFKNWPFL28.Another set of proteins that has been comprehensively studied in T-cell re-sponses are HIV proteins.We analyzed all HIV protein T-cell epitopes avail-able in the HIV molecular immunology database(/content/im-munology).In addition,we analysed mutations of a small set of HLA-restricted CD8+T-cell epitopes.Peters et al.[3]have made public a set of48,828quantitative peptide-binding affinity measurements relating to48different mammalian MHC class I alleles. They used this data to establish a set of predictions with one neural network method(IEDB ANN)and two matrix-based prediction methods(IEDB SMM and IEDB ARB)and compared them with other available online predictors. In this study,we only used eight nonamer datasets of the eight HLA alleles of interest in this study.The data set(which we denote as the IEDB data set) was downloaded from().The datasets used in this study were:A*0101(1157peptides),A*0201(3089),A*0301(2094), A*1101(1985),A*2402(197),B*0702(1262),B*0801(708),and B*1501(978).2.2SVM regression model and peptide coding using extra epitopeinformationThe SVM isfirmly based on statistical learning theory.It can be used to solve both classification and regression problems by optimizing given generalization bounds.Its regression form(SVR)is based on a loss function that ignores errors within a certain distance of the true value(we use theε-insensitive loss function). In SVMs data is implicitly projected into a high-dimensional feature space using a kernel function.We employed the Gaussian kernel,K(x,z)=exp(−||x−z||2/σ2),where x and z are two samples andσis a kernel parameter.The Gaussian kernel requires peptides to be represented as numerical vectors.A sparse orthogonal coding was used to represent peptides,with each amino acid encoded by20bits(19bits set to zero and1bit set to one).Hence,a nonamer isrepresented in a180-dimensional space.The coding vector was extended by nine positions encoding the shape of the binding motif for each studied allele.The final coded peptide vector had189elements and we refer to it as the extended sparse coding.2.3IEDB Prediction modelsIEDB ANN,SMM and ARB prediction models are used by IEDB website and all three methods predict the quantitative binding affinity.The ANN is a nonlinear model and the other two generate scoring matrices.They have been used as benchmarking predictions[3]and we compared the SVR model performance with them.2.4Performance evaluation methodsTo compare two classifiers discriminating binders vs.non-binders,area under ROC(Receiver operating characteristic curve;the AUC value)compares overall performance of classifiers and does not require a decision threshold to be de-termined.For regression,the correlation coefficient between predicted and true binding affinities were used.To assess potential epitopes/binders along protein sequences,we used“match curve”plots of the number of true binders in the top N ranked predicted affinities(y-axis)vs.N(x-axis).If most of true epitopes can be found within a short list of top ranked predicted binders,the prediction system is very useful for screening epitopes along protein sequences.3Study designThis study has three parts designed to understand prediction systems for HLA-binding peptides,the relationship between binding affinities and known T-cell epitopes for survivin and selected HIV proteins,and the relationship of natural epitopes and their mutants.3.1SVR HLA-binding predictorThe Gaussian kernel and the extended sparse coding SVR were combined with the IEDB datasets to build a regression model for binding affinity prediction for each HLA allele.Since vast majority of IC50values from the IEDB database for the eight HLA alleles are within1to50,000nM,we transformed the binding affinities to the range of0and1by using1−log(binding affinity)/log(50000) as described in[25].The model building was done using single-levelfive-fold cross-validation for each allele.We used the test data in each run to tune regularization and ker-nel parameters.We gotfive different regression models from the cross-validation process.We repeated thefive-fold cross-validationfive times.Regression perfor-mance was reported as the mean value of correlation coefficients from thefiveruns.In addition,we chose the models from a single cross-validation run which gave the best cross-validation performance.Thesefive regression models were used as a committee for the corresponding single allele to get predicted binding affinity values for all yet unseen peptides.3.2Prediction of HLA-binding peptides in survivin proteinThe comprehensive experimental relative binding affinity analysis of the com-plete survivin peptide set presented an opportunity to evaluate how different predictive models perform against an independent data set representing a com-plete protein.We applied our regression model on the survivin dataset and re-trieved prediction results from the IEDB prediction servers to compare their parison was based on the correlation coefficient calculated from the predicted binding affinities and the experimentally measured relative binding affinities.3.3Prediction of T-cell epitopes on HIV proteins and SurvivinproteinWe used the SVR model to predict binding affinities for known T-cell epitopes on HIV proteins and survivin within the eight alleles.When a known epitope is longer than a nonamer,we took the highest binding affinity of all possible non-amers within the epitope as its binding affinity.We also did one site mutagenesis on eight T-cell epitopes of HIV proteins and survivin in order to compare their affinities to corresponding ascendant epitopes andfind mutation patterns.4Results4.1Cross-validation performance on the eight HLA-allelesTable1shows the correlation coefficient(with standard deviation)of SVR mod-els on the eight HLA-alleles using cross-validation.Most of correlation coeffi-cient performances are satisfactory except for the B*0801allele.Figure1shows the binding affinity distributions of data sets for HLA-A*0201,A*2402and B*0801and the horizontal line in each subplot denotes the binding affinity value, log10(500).From the analysis of experimental data from[3],log10(500)was taken as a threshold for binder and non-binder,which means that for a peptide with log10(IC50)value less than log10(500)it should be treated as a binder.Although the threshold,log10(500),is arbitrary,it enables objective separation of binders from non-binders.From Figure1,it is clear that there are very few samples (only21)with binding affinities less than the threshold versus the total around 700samples for B*0801allele.For A*2402alleles,there are only197samples in total,but the predictor performance is superior to that of B*0801.A possi-ble explanation is that the dataset is more balanced.For the A*0201allele the dataset is slightly unbalanced,however,there are still about1000samples withIC 50values below the binding threshold.This observation holds for other alleles.More samples with stronger binding affinities seem to imply better prediction performance.Table 1.SVR cross-validation correlation coefficient (r)performance on HLA-alleles.AlleleA*0101A*0201A*0301A*1101A*2402B*0702B*0801B*1501Size 11573089209419851971262708978Mean(r)0.7810.8470.7660.8230.6690.8120.2870.726Std 0.0050.0020.0040.0020.0030.0040.0730.008HLA−B*0801l o g 10(b i n d i n g a f f i n i t y )HLA−A*2402Sample indexFig.1.Experimental binding affinity plots for A*0201,A*2402and B*0801data sets.The horizontal lines denote the binding affinity values,log 10(500).4.2Prediction of binding affinity along survivin protein sequenceFor each of the eight HLA alleles we calculated the correlation coefficient be-tween experimental binding values and predicted binding affinities.log 10(IC 50)values of all nonamers in the survivin sequence were predicted using IEDB ANN,SMM and ARB prediction tools (/analyze/html/mhc binding.html).Figure 2illustrates performance differences between models (HLA-A*2402ANN method is not available from the IEDB web server).IEDB ANN is generally superior,followed by SVR.SMM and ARB show similar per-formance inferior to the other two.For screening potential epitopes/binders in long protein sequences,it is useful to look at the match curve to assess how many peptides are typically requiredHLA allelesC o r r e l a t i o n c o e f f i c i e n t Fig.2.Correlation coefficient performance comparison between IEDB ANN,SMM,ARB and SVR models on the whole survivin dataset.to test to identify all true epitopes/binders.Figure 3shows the match curves for the eight alleles using the IEDB ANN and our SVR models using experi-mental data for survivin peptides.For A*0101there are no binders according to the experimental settings in [23]and for A*2402results for IEDB ANN are unavailable.The classification performance of ANN and SVR is very similar.For A*0201,A*0301and B*0801,SVR is slightly better than the IEDB ANN.Most of experimentally determined binders are within a few numbers of the predicted top peptides.The worst performance by this measure is for the A*2402allele,where 19of 23binders are within predicted top 65peptides.4.3Predictions of T-cell epitopesFigure 4displays the predicted binding affinities,log 10(IC 50),using SVR for known HIV T-cell epitopes.The upper horizontal line indicates log 10(5000)and followed by log 10(500)and log 10(50).In [10],a peptide with log 10(IC 50)less than log 10(5)is a very good binder;good binder with affinity between log 10(5)and log 10(50);intermediate binder between log 10(50)and log 10(500)and low affinity binder between log 10(500)and log 10(5000).In B*1501,all epitopes are low affinity binders.In B*0801predictions are not informative,reflecting poor training set.For other alleles,T-cell epitopes show a broad range of binding affinities,most of which are between log 10(50)and log 10(5000).We compared the predicted binding affinities with experimental data for known survivin T-cell epitopes,shown in Table 2.Both known T-cell epitopes have moderate binding affinity.The 96-104epitope is the third highest binder to A*0201while 20-28is the second highest binder to A*2402of all survivinTop scoring peptidesA*0101Top scoring peptidesN u m b e r o f b i n d e r s i d e n t i f i e dA*0201Top scoring peptidesN u m b e r o f b i n d e r s i d e n t i f i e dTop scoring peptidesN u m b e r o f b i n d e r s i d e n t i f i e dTop scoring peptidesN u m b e r o f b i n d e r s i d e n t i f ie d A*2402Top scoring peptides N u m b e r o f b i n d e r s i d e n t i f i e dB*0702Top scoring peptidesN u m b e r o f b i n d e r s i d e n t i f i e dB*0801Top scoring peptidesN u m b e r o f b i n d e r s i d e n t i f i e dB*1501Fig.3.Match curves for experimentally identified binders on survivinprotein.A*0301P r e d i c te d l o g 10(I C 50)A*1101B*0702B*0801B*1501T−cell epitopes in HIV proteinsA*2402T−cell epitopes in HIV proteinsFig.4.SVR predicted binding affinities for known HIV T-cell epitopes.peptides[23].Predicted binding affinities are approximately within2-fold con-centration of their experimental affinities indicating excellent correlation.Table2.Predicted binding affinities(IC50)of known survivin T-cell epitopes.Allele Start End Peptide IC50ExperimentalName Position Position(SVR)IC50(from[23])A*020196104LTLGEFLKL893430nMA*24022028STFKNWPFL1290740nM Table3shows natural epitopes and their in silico mutant versions with the highest predicted binding affinities.The affinity change varies from2to10fold. For A*0201,the mutant happens at the second position from T to M or L;for A*0101,it is at the ninth position from E to Y;for A*1101,at the seventh position from C to F;and for A*2402,at the second position from T to Y.This example illustrates a possible vaccine engineering applications with modified peptides.In a successful case study of immunotherapy with modified survivin 96-104peptide LMLGEFLKL in a liver metasthasis of pancreatic cancer the result was a complete remission of metasthasis[26].Table4shows in silico mutations of natural HIV epitopes and their mutants with the highest binding affinities.Table3.Mutant epitopes with the highest binding affinities vs.natural epitopes.Allele Natural IC50Mutant IC50Name Epitope(SVR)Epitopes(SVR)A*0101QFEELTLGE33144QFEELTLGY2443A*0201STFKNWPFL2077SMFKNWPFL891A*0201LTLGEFLKL893LLLGEFLKL231A*1101LAQCFFCFK21LAQCFFFFK3A*2402STFKNWPFL1290SYFKNWPFL1635ConclusionsIEDB ANN model is the best among the four models,followed by the SVR model.The predictions by SMM and ARB models are inferior to them.The two non-linear methods produced more accurate predictions than two linear methods.We also found that,provided that training sets are representative,the more training samples result in a better prediction performance.IEDB ANN and SVR models performed similarly in scanning potential binders when tested on survivin sequence.Both true epitopes were within top2.5%ofpredicted binders.Therefore,in silico models can save significant experimental time and costs in screening potential targets.By analyzing predicted binding affinities of known HIV T-cell epitopes,we found that the range of binding affinities varies for different alleles;and the range of binding affinities include high,moderate,and low affinity.Most of the survivin epitopes are intermediate affinity binders compared to their one-site mutated descendants,some of which are high-affinity binders.The change of IC50varies from2to10fold for mutated epitopes and most of them were at epitope anchors or auxiliary anchors.These phenomena indicate that high binding affinity binding and immunogenicity are not necessary correlated.Table 4.Differences between natural HIV epitopes and their mutants resulting in improved binding affinity.Allele P5P4P3P2P1P1 P2 P3 P4A*0201Q→Y W/R→M R→M A→I G→F E→F G→L/P T→K K→F G→FL→Q Q→R P→LY/F→L Y→LP/G→V A→YI→YA*0301Y→V D→M Q→R C→F D/Y→LC→PA*1101Y→V Q→R Q→F A→R W→A R→KT→K Q→V M→A A/T→FA→Y A*2402S→Y R→Y Q→V G→A A/P→FP→L B*0702V→P R→Y G→A G→L T→L T→K I→KE/F→M K/W→F B*0801D→R V/G→P Y→R Q→R G/Y/V→L G/P→L C→F B*1501P→V Y→R Q→RD→K6DiscussionBinding affinity alone is not sufficient to describe the interaction between HLA allele molecules and peptides.Other factors like dissociation rate or stability of each complex are also the determinants of the interaction.Classification of interaction into binders and non-binders only is not informative of immunogenic properties of peptides.Known survivin-derived T-cell epitopes are low affinity binders to their respective HLA molecules.Most of its known T-cell epitopes of tumor antigen survivin are low affin-ity binders,which might offer an explanation for lack of response to antigens in cancer patients,self-tolerance,and subdominance[23].It is unclear which epitopes within a given tumor-associated antigen should be selected to circum-vent tolerance and hence serve as the best target in anti-tumor vaccination.One challenge for vaccine design is to enhance the immunogenicity of weak antigens and prevent silencing of active T-cell clones.One possible strategy is to optimize tumor-associated antigen epitope analogs for priming.The in silico mutation analysis demonstrated that the optimization should target mainly anchor or auxiliary anchor positions.Acknowledgements.LY was supported by the National Research School in Ge-nomics and Bioinformatics,Sweden.The authors acknowledge the support of the ImmunoGrid project,EC contract FP6-2004-IST-4,No.028069. References1.Brusic,V.,Zeleznikow,J.:Computational binding assays of antigenic peptides.Letters in Peptide Sci.6(1999)313–3242.Yewdell,J.W.:Confronting complexity:real-world immunodominance in antiviralCD8+T cell responses.Immunity25(2006)533–5433.Peters,B.,Bui,H.H.,Frankild,S.,Nielson,M.,Lundegaard,C.,Kostem,E.,Basch,D.,Lamberth,K.,Harndahl,M.,Fleri,W.,Wilson,S.S.,Sidney,J.,Lund,O.,Buus,S.,Sette,A.:A community resource benchmarking predictions of peptide binding to MHC-I molecules.PLoS Comput.Biol.2(6)(2006)574–5844.Rammensee,H.G.,Bachmann,J.,Emmerich,N.P.,Bachor,O.A.,Stevanovic,S.:SYFPEITHI:database for MHC ligands and peptide motifs.Immunogenetics50(3-4)(1999)213–2195.Parker,K.C.,Bednarek,M.A.,Coligan,J.E.:Scheme for ranking potential HLA-A2binding peptides based on independent binding of individual peptide side-chains.J.Immunol.152(1)(1994)163–756.Udaka,K.,Wiesmuller,K.H.,Kienle,S.,Jung,G.,Tamamura,H.,Yamagishi,H.,Okumura,K.,Walden,P.,Suto,T.,Kawasaki,T.:An automated prediction of MHC class I-binding peptides based on positional scanning with peptide libraries.Immunogenetics51(10)(2000)816–8287.Guan,P.,Doytchinova,I.A.,Zygouri,C.,Flower,D.R.:MHCPred:bringing aquantitative dimension to the online prediction of MHC binding.Applied Bioin-formatics2(1)(2003)63–668.Peters,B.,Sette,A.:Generating quantitative models describing the sequencespecificity of biological processes with the stabilized matrix method.BMC Bioin-formatics6(132)(2005)9.Bui,H.H.,Sidney,J.,Peters,B.,Sathiamurthy,M.,Sinichi,A.,Purton,K.A.,Mothe,B.R.,Chisari,F.V.,Watkins,D.I.,Sette,A.:Automated generation and evaluation of specific MHC binding predictive tools:ARB matrix applications.Immunogenetics57(5)(2005)304–31410.Buus,S.,Lauemoller,S.L.,Worning,P.,Kesmir,C.,Frimurer,T.,Corbet,S.,Fomsgaard,A.,Hilden,J.,Holm,A.,Brunak,S.:Sensitive quantitative predic-tions of peptide-MHC binding by a‘Query by Committee’artificial neural network approach.Tissue Antigens62(5)(2003)378–38411.Brusic,V.,Bucci,K.,Schonbach,C.,Petrovsky,N.,Zeleznikow,J.,Kazura,J.W.:Efficient discovery of immune response targets by cyclical refinement of QSAR models of peptide binding.Journal of Molecular Graphics and Modelling19(5) (2001)405–41112.Mamitsuka,H.:Predicting peptides that bind to MHC molecules using supervisedlearning of hidden Markov models.Proteins33(4)(1998)460–47413.D¨o nnes,P.,Elofsson, A.:Prediction of MHC class I binding peptides,usingSVMHC.BMC Bioinformatics3(25)(2002)14.Zhao,Y.,Pinilla,C.,Valmori,D.,Martin,R.,Simon,R.:Application of supportvector machines for T-cell epitopes prediction.Bioinformatics19(2003)1978–1984 15.Riedesel,H.,Kolbeck,B.,Schmetzer,O.,Knapp,E.W.:Peptide binding at class Imajor histocompatibility complex scored with linear functions and support vector machines.Genome Informatics15(1)(2004)198–21216.Yang,Z.R.,Johnson,F.C.:Prediction of T-cell epitopes using biosupport vectormachines.J Chem Inf Model45(5)(2005)1424–142817.Bozic,I.,Zhang,G.L.,Brusic,V.:Predictive vaccinology:optimisation of predic-tions using support vector machine classifiers.Lecture Notes in Computer Science 3578(2005)375–38118.Zhang,G.L.,Bozic,I.,Kwoh, C.K.,August,J.T.,Brusic,V.:Prediction ofsupertype-specific HLA class I binding peptides using support vector machines.Journal of Immunological Methods320(1-2)(2007)19.Cui,J.,Han,L.Y.,Lin,H.H.,Zhang,H.L.,Tang,Z.Q.:Prediction of MHC-bindingpeptides offlexible lengths from sequence-derived structural and physicochemical properties.Molecular Immunology44(5)(2007)866–87720.Jojic,N.,Reyes-Gomez,M.,Heckerman, D.,Kadie, C.,Schueler-Furman,O.:Learning MHC I-peptide binding.Bioinformatics22(14)(2006)e227–23521.Yu,K.,Petrovsky,N.,Schonbach,C.,Koh,J.Y.,Brusic,V.:Methods for predictionof peptide binding to MHC molecules:a comparative study.Molecular Medicine 8(3)(2002)137–14822.Trost,B.,Bickis,M.,Kusalik,A.:Strength in numbers:achieving greater accuracyin MHC-I binding prediction by combining the results from multiple prediction tools.Immunome Research3(2007)523.Bachinsky,M.M.,Guillen,D.E.,Patel,S.R.,Singleton,J.,Chen,C.,Soltis,D.A.,Tussey,L.G.:Mapping and binding analysis of peptides derived from the tumor-associated antigen survivin for eight HLA alleles.Cancer Immunity5(2005)1–9 24.Friedrichs,B.,Siegel,S.,Andersen,M.H.,Schmitz,N.,Zeis,M.:Survivin-derivedpeptide epitopes and their role for induction of antitumor immunity in hematolog-ical malignancies.Leukemia&Lymphoma47(6)(2006)978–98525.Nielsen,M.,Lundegaard,C.,Worning,P.,Lauemøller,S.L.,Lamberth,K.,Buus,S.,Brunak,S.,Lund,O.:Reliable prediction of T-cell epitopes using neural net-works with novel sequence representations.Protein Sci.12(5)(2003)1007–1017 26.Wobser,M.,Keikavoussi,P.,Kunzmann,V.,Weininger,M.,Andersen,M.H.,Becker,J.C.:Complete remission of liver metastasis of pancreatic cancer under vaccination with a HLA-A2restricted peptide derived from the universal tumor antigen survivin.Cancer Immunology and Immunotherapy55(10)(2006)1294–1298。