Hydrodynamics of contraction-based motility in a compressible active fluid

Cell motility is crucial to biological functions ranging from wound healing to immune response. The physics of cell crawling on a substrate is by now well understood, whilst cell motion in bulk (cell swimming) is far from being completely characterized. We present here a minimal model for pattern formation within a compressible actomyosin gel, in both 2D and 3D, which shows that contractility leads to the emergence of an actomyosin droplet within a low density background. This droplet then becomes self-motile for sufficiently large motor contractility.

Critical nodes discovery in pathophysiological signaling pathways

Network-based ranking methods (e.g. centrality analysis) have found extensive use in systems medicine for the prediction of essential proteins, for the prioritization of drug targets candidates in the treatment of several pathologies and in biomarker discovery, and for human disease genes identification. Here we propose to use critical nodes as defined by the Critical Node Problem for the analysis of key physiological and pathophysiological signaling pathways, as target candidates for treatment and management of several cancer types, neurologic and inflammatory dysfunctions, among others.

Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset

This paper describes the efforts, pitfalls, and successes of applying unsupervised classification techniques to analyze the Trap-2017 dataset. Guided by the informative perspective on the nature of the dataset obtained through a set of specifically-written perl/bash scripts, we devised an automated clustering tool implemented in python upon openly-available scientific libraries. By applying our tool on the original raw data it is possibile to infer a set of trending behaviors for vehicles travelling over a route, yielding an instrument to classify both routes and plates.

On Carriers Collaboration in Hub Location Problems

This paper considers a hub location problem where several carriers operate on a shared network to satisfy a given demand represented by a set of commodities. Possible cooperative strategies are studied where carriers can share resources or swap their respective commodities to produce tangible cost savings while fully satisfying the existing demand. Three different collaborative policies are introduced and discussed, and mixed integer programming formulations are provided for each of them.

Spiders like Onions: on the Network of Tor Hidden Services

Tor hidden services allow offering and accessing various Internet resources while guaranteeing a high degree of provider and user anonymity. So far, most research work on the Tor network aimed at discovering protocol vulnerabilities to de-anonymize users and services. Other work aimed at estimating the number of available hidden services and classifying them. Something that still remains largely unknown is the structure of the graph defined by the network of Tor services.

Modeling the Effect of High Calorie Diet on the Interplay between Adipose Tissue, Inflammation, and Diabetes

Background. Type 2 diabetes (T2D) is a chronic metabolic disease potentially leading to serious widespread tissue damage. Human organism develops T2D when the glucose-insulin control is broken for reasons that are not fully understood but have been demonstrated to be linked to the emergence of a chronic inflammation. Indeed such low-level chronic inflammation affects the pancreatic production of insulin and triggers the development of insulin resistance, eventually leading to an impaired control of the blood glucose concentration.

Long-time behaviour of the approximate solution to quasi-convolution Volterra equations

The integral representation of some biological phenomena consists in Volterra equations whose kernels involve a convolution term plus a non convolution one. Some significative applications arise in linearised models of cell migration and collective motion, as described in Di Costanzo et al. (Discrete Contin. Dyn. Syst. Ser. B 25 (2020) 443-472), Etchegaray et al. (Integral Methods in Science and Engineering (2015)), Grec et al. (J. Theor. Biol. 452 (2018) 35-46) where the asymptotic behaviour of the analytical solution has been extensively investigated.

Trust-Based Enforcement of Security Policies

Two conflicting high-level goals govern the enforcement of security policies, abridged in the phrase ``high security at a low cost''. While these drivers seem irreconcilable, formal modelling languages and automated verification techniques can facilitate the task of finding the right balance. We propose a modelling language and a framework in which security checks can be relaxed or strengthened to save resources or increase protection, on the basis of trust relationships among communicating parties.