3DAROC18 Summary Day #1

Total Page:16

File Type:pdf, Size:1020Kb

3DAROC18 Summary Day #1 3DAROC18 Summary day #1 David Castillo, François Serra & Marc A. Marti-Renom Structural Genomics Group (CNAG-CRG) Data groups Experimental observations Statistical rules Laws of physics Integrative modeling Data collection Data interpretation Representation Modeling Sampling Model analysis LETTERS NATURE XVI ARTICLES 0 I 0 II 0 Chromosome a 0 c XV III 0 I II III IV V VI VII VIII IX X XI XII XVI XIII 1 XIV I XV II Downloaded from genome.cshlp.org0 on May 30, 2012 - Published by Cold Spring Harbor Laboratory Press IV III 0.5 XIV IV V 0 0 0 VI VII Molecular Cell XIII V VIII –0.5 0 IX 0 0VI 1.0 Figure 6 Population-based analysis of 3.0 Chromosome X −1 Chr18 XI a bVII XII XII –1.5 The 3D Architecture of a Bacterial Genome 0 XIII chromosome territory localizations in the nucleus. 0 VIII XIV 0 X 2 XI IX Chr19 0 0 −2 X XV 6 XVI 18 10 Principles3 of 3D genome organization in yeast 780 5 2.5 770 760 750 7 740 730 0 (a) The distribution of the radial positions for 10 20 30 8 720 40 710 50 60 12 70 13 700 80 0.8 690 90 I 680 100 1 15 9 4 b 670 110 d 120 660 130 650 140 0 chromosomes 18 (red dashed line) and 19 (blue 640 15 630 160 11 620 170 8 3D modeling of genomic180 domains: other methods 610 190 60 14 2.0 0 200 590 210 580 220 6 1 solid line), calculated from the genome structure 570 230 20 560 550 0 540 10 20 4 530 30 0.6 Centromeres16 520 40 21 19 17 population. Radial positions are calculated for 510 50 Telomeres 500 60 Early origins 490 70 2 1.5 80 80 22 Late origins 4 470 90 Breakpoints (Scer) 100 Percentage of positive interactions 460 110 Breakpoints (Scer and Kwal) 4500 12 44 1 0 0 the center of mass of each chromosome and are 14030 430 00.20.40.60.81 Density 150 A 420 16 410 170 Percentage of negative interactions 400 180 0 190 390 200 380 210 220 230 370 240 250 XIV 360 270 260 350 340 330 320 310 300 290 given as a fraction of the nuclear radius. (b) The 1.0 (i) 280 0.4 (ii) (iii) (iv) Figure 4 | Inter-chromosomal interactions. a 0.0 , Circos diagram showing chromosome I, and a distinct region of corresponding size on chromosome average radial position of all chromosomes plotted interactions between chromosome I and the remaining chromosomes. All 16 XIV. c, Inter-chromosomal interactions between all pairs of the 32 yeast a yeast chromosomesVisualizing are aligned circumferentially, and arcs depict distinct Relative radial position chromosomal arms (the 10 kb region starting from the midpoint 3D of the Genomes inter-chromosomal interactions. Bold red hatch marks correspond to centromere in each arm is excluded). For each chromosome, the shorter arm against their size. Error bars, s.d. (c) Clustering of 0.5 centromeres. To aid visualization of centromere0.5 clustering, these is always placed before the longer arm. Note that the arms of small representations were created using the overlap set of inter-chromosomal 0.2chromosomes tend to interact with one another. The colour scale chromosomes with respect to the average distance interactions identified from both HindIII and EcoRI libraries at an FDR corresponds to the natural log of the ratio of the observed versus expected threshold of 1%. Additional heat maps1.1 and Circos diagrams are provided in number of interactions (see Supplementary Materials). d, Enrichment of Supplementary Fig. 9. b, Circos diagram, generated using the inter- interactions between centromeres, telomeres, early origins of replication, 0 chromosomal interactions identified from the HindIII libraries at an FDR and chromosomal breakpoints. To measure enrichment of strong Spatial Organizations of Chromosomes between the center of mass of each chromosome threshold of 1%, depicting the distinct interactions between a small and a interactions with respect to a given class of genomic loci, we use receiver large chromosome (I and XIV, respectively).1.7 Most of the interactions operating curve (ROC) analysis. pair in the genome structure population. The 0 0.2 0.4 between0.6 these two chromosomes0.8 primarily involve1.0 the entirety of 50 100 150 200 250 chromosomal pairings, except for pairing between the two smallest depict intra-chromosomal folding, we incorporated a metric that Relativearms distance (1R and 9R) (Supplementary2.1 Fig. 16a). However, the preference converts interaction probabilitiesChromosome into nuclear distances (assigningsize (Mb) clustering dendrogram, which identifies two for intra-chromosomal arm pairing versus inter-chromosomal arm 130 bp of packed chromatin a length of 1 nm, ref. 30) (Supplemen- b from nuclearpairing center decreased with increasing distance from centromeres tary Figs 17 and 18 and Supplementary Methods). Using this ruler, dominant clusters is shown on top. The matrix ofJhunjhunwala (2008) Cell (Supplementary Fig. 16 b–d). These2.5 observations indicate that yeast we calculated the spatial distances between all possible pairings of the Hu (2013) PLoS Computational Biology chromosome arms are highly flexible. 16 centromeres (Supplementary Tables 14 and 15) The results are average distances between pairs of chromosomes Combining our set of 4,097,539 total and 306,312 distinct inter- consistent with previous observations12. Kalhor (2011) Nature Biotechnology! Cluster 2 actions with known spatial distances3.0 that separate sub-nuclear land- The resulting map resembles a water lily, with 32 chromosome c 12 d marks , we derived a three-dimensional map of the yeast genome. To arms jutting out from a base of clustered centromeres (Fig. 5). Tjong (2012) Genome Research is shown at the bottom. The intensity of blue ClusterDuan 1 Minus Probe Genome Position (Mb) (2010) Nature 3.5 I I Figure 5 | Three-dimensionalCluster model 1 of the yeast II II genome. Two views representing two different color increases with decreasing distance. (d) (Left III III IV IV angles are provided. Chromosomes are coloured 4.0 V V VI VI as in Fig. 4a (also indicated in the upper right). All VII VII panels) The density contour plot of the combined VIII VIII chromosomes cluster via centromeres at one pole 0.0IX 0.5 1.1 1.6 2.1 2.5IX 3.1 3.6 4.0 X X of the nucleus (the area within the dashed oval), XI XI 15 10 Nucleic Acids Research, 2010 XII XII while chromosome XII extends outward towards localization probability for all the chromosomes in XIII Plus Probe Genome PositionXIII (Mb) XIV XIV the nucleolus, which is occupied by rDNA repeats 11 XV XV (indicated by the white arrow). After exiting the XVI XVI 1 nucleolus, the remainder of chromosome XII cluster 1 (top panel) and cluster 2 (bottom panel) A B B interacts with the long arm of chromosome IV. 14 10Kb Cluster 1 Cluster 2 Cluster 3 Cluster 4 A10a calculated from all the structures in the genome 20 A1 A2 A3 A4 A5 A6 A7 A9 A11 A13 16 3' 5' structure population. The rainbow color-coding A10b 21 6 19 3' 5' on the central nuclear plane ranges from blue 4 5 22 ©2010 Macmillan Publishers Limited. All rights reserved (minimum value) to red (maximum value).http://genomebiology.com/2009/10/4/R37 17 Genome Biology 2009, Volume 10, Issue 4, Article R37 Fraser et al. R37.12 2 4 (Right panels) A representative genome 6 3 X Cluster 2 2 structure from the genome structure population. 3 HoxA genes Base density (kb) Figure 5.2008 3D Topology of the(a) Immunoglobulin Heavy-Chain Locus(b) o o TECH NICAL REo P ORTS o 2014 10 A2A1 A3 A4 A5 A6 1 Downloaded from Nucleic Acids Research, 2012, Vol. 40, No. 16 7723 Chromosome territories are shownThe for 3D topologyall the of the Igh locus in pre-pro-B and pro-B cells was resolved using trilateration. The relative positions of 12 genomic markers180 spanning the entire 180 180 180 5 A7 A9 A10b A11 A13 immunoglobulin heavy-chain locus were computed. Two different views are shown for both cell types. 0 7 0 20 40 60 80 100 120 140 160 chromosomes in cluster 1 (top) and(A) 3D all Topology the of the Igh locus in pre-pro-B cells. D 8 Figure 4 3D models of the ENm008Genomic ENCODE Position (kb) region containing the chromosomes in clusters 2 (bottom).(B) 3D TopologyThe of the Igh locus in pro-B cells.18 Grey objects indicate CH regions and the 30 flanking region of the Igh locus. Blue objects indicate proximal VH a b regions. Green objects indicate distal VH regions. Red line indicates the linker connecting-globin the proximallocus. V(Haand) 3D JH structureregions. Linkers of the are indicatedGM12878 only to models show represented 12 http://nar.oxfordjournals.org All rights reserved. connectivity. C 10Kb localization probabilities are calculated following 13 by the centroid of cluster 1. The 3D model is A10acolored as in its linear . A1 A2 A3 A4 A5 A6 A7 A9 A11 A13 28 9 3' representation 5'(Fig. 1a). Regulatory elements are represented as spheres a previously described procedure from. the spatial distance measurements4 directly to the cumula- conclude that it is the Igh topology3' that mechanistically permits 5' colored red (HS40), orange (other HSs) and greenA10b (CTCF). (b) 3D tive frequency distributions as predicted by4 a13 3D random18 7 walk10 long-rangeX 2 22 genomic21 20 interactions1 15 to occur in pro-B cells with Inc (see Experimental Procedures for details).
Recommended publications
  • Types and Programming Languages by Benjamin C
    < Free Open Study > . .Types and Programming Languages by Benjamin C. Pierce ISBN:0262162091 The MIT Press © 2002 (623 pages) This thorough type-systems reference examines theory, pragmatics, implementation, and more Table of Contents Types and Programming Languages Preface Chapter 1 - Introduction Chapter 2 - Mathematical Preliminaries Part I - Untyped Systems Chapter 3 - Untyped Arithmetic Expressions Chapter 4 - An ML Implementation of Arithmetic Expressions Chapter 5 - The Untyped Lambda-Calculus Chapter 6 - Nameless Representation of Terms Chapter 7 - An ML Implementation of the Lambda-Calculus Part II - Simple Types Chapter 8 - Typed Arithmetic Expressions Chapter 9 - Simply Typed Lambda-Calculus Chapter 10 - An ML Implementation of Simple Types Chapter 11 - Simple Extensions Chapter 12 - Normalization Chapter 13 - References Chapter 14 - Exceptions Part III - Subtyping Chapter 15 - Subtyping Chapter 16 - Metatheory of Subtyping Chapter 17 - An ML Implementation of Subtyping Chapter 18 - Case Study: Imperative Objects Chapter 19 - Case Study: Featherweight Java Part IV - Recursive Types Chapter 20 - Recursive Types Chapter 21 - Metatheory of Recursive Types Part V - Polymorphism Chapter 22 - Type Reconstruction Chapter 23 - Universal Types Chapter 24 - Existential Types Chapter 25 - An ML Implementation of System F Chapter 26 - Bounded Quantification Chapter 27 - Case Study: Imperative Objects, Redux Chapter 28 - Metatheory of Bounded Quantification Part VI - Higher-Order Systems Chapter 29 - Type Operators and Kinding Chapter 30 - Higher-Order Polymorphism Chapter 31 - Higher-Order Subtyping Chapter 32 - Case Study: Purely Functional Objects Part VII - Appendices Appendix A - Solutions to Selected Exercises Appendix B - Notational Conventions References Index List of Figures < Free Open Study > < Free Open Study > Back Cover A type system is a syntactic method for automatically checking the absence of certain erroneous behaviors by classifying program phrases according to the kinds of values they compute.
    [Show full text]
  • The Gnu Binary Utilities
    The gnu Binary Utilities Version cygnus-2.7.1-96q4 May 1993 Roland H. Pesch Jeffrey M. Osier Cygnus Support Cygnus Support TEXinfo 2.122 (Cygnus+WRS) Copyright c 1991, 92, 93, 94, 95, 1996 Free Software Foundation, Inc. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modi®ed versions of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modi®ed versions. The GNU Binary Utilities Introduction ..................................... 467 1ar.............................................. 469 1.1 Controlling ar on the command line ................... 470 1.2 Controlling ar with a script ............................ 472 2ld.............................................. 477 3nm............................................ 479 4 objcopy ....................................... 483 5 objdump ...................................... 489 6 ranlib ......................................... 493 7 size............................................ 495 8 strings ........................................ 497 9 strip........................................... 499 Utilities 10 c++®lt ........................................ 501 11 nlmconv ....................................
    [Show full text]
  • Computer Matching Agreement
    COMPUTER MATCHING AGREEMENT BETWEEN NEW tvIEXICO HUMAN SERVICES DEPARTMENT AND UNIVERSAL SERVICE ADMINISTRATIVE COMPANY AND THE FEDERAL COMMUNICATIONS COMMISSION INTRODUCTION This document constitutes an agreement between the Universal Service Administrative Company (USAC), the Federal Communications Commission (FCC or Commission), and the New Mexico Human Services Department (Department) (collectively, Parties). The purpose of this Agreement is to improve the efficiency and effectiveness of the Universal Service Fund (U SF’) Lifeline program, which provides support for discounted broadband and voice services to low-income consumers. Because the Parties intend to share information about individuals who are applying for or currently receive Lifeline benefits in order to verify the individuals’ eligibility for the program, the Parties have determined that they must execute a written agreement that complies with the Computer Matching and Privacy Protection Act of 1988 (CMPPA), Public Law 100-503, 102 Stat. 2507 (1988), which was enacted as an amendment to the Privacy Act of 1974 (Privacy Act), 5 U.S.C. § 552a. By agreeing to the terms and conditions of this Agreement, the Parties intend to comply with the requirements of the CMPPA that are codified in subsection (o) of the Privacy Act. 5 U.S.C. § 552a(o). As discussed in section 11.B. below, U$AC has been designated by the FCC as the permanent federal Administrator of the Universal Service funds programs, including the Lifeline program that is the subject of this Agreement. A. Title of Matching Program The title of this matching program as it will be reported by the FCC and the Office of Management and Budget (0MB) is as follows: “Computer Matching Agreement with the New Mexico Human Services Department.” B.
    [Show full text]
  • Project1: Build a Small Scanner/Parser
    Project1: Build A Small Scanner/Parser Introducing Lex, Yacc, and POET cs5363 1 Project1: Building A Scanner/Parser Parse a subset of the C language Support two types of atomic values: int float Support one type of compound values: arrays Support a basic set of language concepts Variable declarations (int, float, and array variables) Expressions (arithmetic and boolean operations) Statements (assignments, conditionals, and loops) You can choose a different but equivalent language Need to make your own test cases Options of implementation (links available at class web site) Manual in C/C++/Java (or whatever other lang.) Lex and Yacc (together with C/C++) POET: a scripting compiler writing language Or any other approach you choose --- must document how to download/use any tools involved cs5363 2 This is just starting… There will be two other sub-projects Type checking Check the types of expressions in the input program Optimization/analysis/translation Do something with the input code, output the result The starting project is important because it determines which language you can use for the other projects Lex+Yacc ===> can work only with C/C++ POET ==> work with POET Manual ==> stick to whatever language you pick This class: introduce Lex/Yacc/POET to you cs5363 3 Using Lex to build scanners lex.yy.c MyLex.l lex/flex lex.yy.c a.out gcc/cc Input stream a.out tokens Write a lex specification Save it in a file (MyLex.l) Compile the lex specification file by invoking lex/flex lex MyLex.l A lex.yy.c file is generated
    [Show full text]
  • File Management Tools
    File Management Tools ● gzip and gunzip ● tar ● find ● df and du ● od ● nm and strip ● sftp and scp Gzip and Gunzip ● The gzip utility compresses a specified list of files. After compressing each specified file, it renames it to have a “.gz” extension. ● General form. gzip [filename]* ● The gunzip utility uncompresses a specified list of files that had been previously compressed with gzip. ● General form. gunzip [filename]* Tar (38.2) ● Tar is a utility for creating and extracting archives. It was originally setup for archives on tape, but it now is mostly used for archives on disk. It is very useful for sending a set of files to someone over the network. Tar is also useful for making backups. ● General form. tar options filenames Commonly Used Tar Options c # insert files into a tar file f # use the name of the tar file that is specified v # output the name of each file as it is inserted into or # extracted from a tar file x # extract the files from a tar file Creating an Archive with Tar ● Below is the typical tar command used to create an archive from a set of files. Note that each specified filename can also be a directory. Tar will insert all files in that directory and any subdirectories. tar cvf tarfilename filenames ● Examples: tar cvf proj.tar proj # insert proj directory # files into proj.tar tar cvf code.tar *.c *.h # insert *.c and *.h files # into code.tar Extracting Files from a Tar Archive ● Below is the typical tar command used to extract the files from a tar archive.
    [Show full text]
  • A DENOTATIONAL ENGINEERING of PROGRAMMING LANGUAGES to Make Software Systems Reliable and User Manuals Clear, Complete and Unambiguous
    A DENOTATIONAL ENGINEERING OF PROGRAMMING LANGUAGES to make software systems reliable and user manuals clear, complete and unambiguous A book in statu nascendi Andrzej Jacek Blikle in cooperation with Piotr Chrząstowski-Wachtel It always seems impossible until it's done. Nelson Mandela Warsaw, March 22nd, 2019 „A Denotational Engineering of Programming Languages” by Andrzej Blikle in cooperation with Piotr Chrząstowski-Wachtel has been licensed under a Creative Commons: Attribution — NonCommercial — NoDerivatives 4.0 International. For details see: https://creativecommons.org/licenses/by-nc-nd/4.0/le- galcode Andrzej Blikle in cooperation with Piotr Chrząstowski-Wachtel, A Denotational Engineering of Programming Languages 2 About the current versions of the book Both versions ― Polish and English ― are in statu nascendi which means that they are both in the process of correction due to my readers’ remarks. Since December 2018 both versions, and currently also two related papers, are available in PDF format and can be downloaded from my website: http://www.moznainaczej.com.pl/what-has-been-done/the-book as well as from my accounts on ResearchGate, academia.edu and arXiv.org I very warmly invite all my readers to send their remarks and questions about all aspects of the book. I am certainly aware of the fact that my English requires a lot of improvements and therefore I shall very much appreciate all linguistic corrections and suggestions as well. You may write to me on [email protected]. All interested persons are also invited to join the project Denotational Engineering. For more details see: http://www.moznainaczej.com.pl/an-invitation-to-the-project Acknowledgements to the Polish version Since June 2018 a preliminary version of the Polish version has been made available to selected readers which resulted with a flow of remarks.
    [Show full text]
  • User's Manual
    USER’S MANUAL USER’S > UniQTM UniQTM User’s Manual Ed.: 821003146 rev.H © 2016 Datalogic S.p.A. and its Group companies • All rights reserved. • Protected to the fullest extent under U.S. and international laws. • Copying or altering of this document is prohibited without express written consent from Datalogic S.p.A. • Datalogic and the Datalogic logo are registered trademarks of Datalogic S.p.A. in many countries, including the U.S. and the E.U. All other brand and product names mentioned herein are for identification purposes only and may be trademarks or registered trademarks of their respective owners. Datalogic shall not be liable for technical or editorial errors or omissions contained herein, nor for incidental or consequential damages resulting from the use of this material. Printed in Donnas (AO), Italy. ii SYMBOLS Symbols used in this manual along with their meaning are shown below. Symbols and signs are repeated within the chapters and/or sections and have the following meaning: Generic Warning: This symbol indicates the need to read the manual carefully or the necessity of an important maneuver or maintenance operation. Electricity Warning: This symbol indicates dangerous voltage associated with the laser product, or powerful enough to constitute an electrical risk. This symbol may also appear on the marking system at the risk area. Laser Warning: This symbol indicates the danger of exposure to visible or invisible laser radiation. This symbol may also appear on the marking system at the risk area. Fire Warning: This symbol indicates the danger of a fire when processing flammable materials.
    [Show full text]
  • MV-8594C-200M-2C-3A0 850 and 940 Nm
    Laser Diodes 850-940nm 200mW Mixed VCSEL Diode + Photo Diode MV-8594C-200M-2C-3A0 MV-8594C-200M-2C-3A0 consists of two VCSEL chips one is 850nm 200mW and the other is 940nm 200mW, together with 1 or 2 photo diodes incorporated into in one 3535 packaging (Al2O3). Features Applications ● Single860nm wavelength Multimode VCSEL ●Proximity 3D sensor sensorss ● LowLow wavelengthwavelength driftdrift ●Wristband Lidars pulse oximeter ● DualOxide VCSEL isolation package technology ●G IRlucose illuminations sensor ● LowLow thresholdthreshold currentcurrent ●PM2.5/10 Medical applicationsdetector ● HighHigh reliabilityreliability ●Smoke Proximity detector sensors ● EasyEasy toto collimatecollimate ●Steam Militarysensor applications PRODUCT IDENTIFY Part Number Description MV-8594C-200M-2C-3A0 850-940nm 200mW mixed VCSEL Diode CODE RULES MV – 8594C- 200M – 2 C - 3 A 0 ① ② ③ ④⑤ ⑥⑦ ⑧⑨⑩ Annex, option 0 Product version, A Photo diode, 3= contains PD@850 and @940 Package type, 3535 Substrate, 2= Al2O3 Power units, M =milliwatts Power, 200 Number of chips, C 1St Wavelength, 850 nm, 2nd wavelength, 940 nm Product classification, Multi VCSEL No of First Second PD chips wavelength wavelength A 1 1 0 B 1 1 1 C 1 1 2 Photodiode Range filter substrate responsivity 1 400-1100 nm no Si 0.97@850nm 2 870-970nm yes Si 0.98@940nm 3 Contain PDs (1+2) 08/20 / V1 MH-HW brightlaser/mv-8594c-200m-2c-3a0 1 Germany & Other Countries France United Kingdom Nordic Countries USA Laser Components GmbH Laser Components S.A.S. Laser Components (UK) Ltd. Laser Components Nordic AB Laser Components USA, Inc. Tel: +49 8142 2864 – 0 Tel: +33 1 39 59 52 25 Tel: +44 1245 491 499 Tel: +46 31 703 71 73 Tel: +1 603 821 – 7040 Fax: +49 8142 2864 – 11 Fax: +33 1 39 59 53 50 Fax: +44 1245 491 801 Fax: +46 31 703 71 01 Fax: +1 603 821 – 7041 [email protected] [email protected] [email protected] [email protected] [email protected] www.lasercomponents.com www.lasercomponents.fr www.lasercomponents.co.uk www.lasercomponents.se www.laser-components.com Laser Diodes I.
    [Show full text]
  • Unix Programmer's Manual
    There is no warranty of merchantability nor any warranty of fitness for a particu!ar purpose nor any other warranty, either expressed or imp!ied, a’s to the accuracy of the enclosed m~=:crials or a~ Io ~helr ,~.ui~::~::.j!it’/ for ~ny p~rficu~ar pur~.~o~e. ~".-~--, ....-.re: " n~ I T~ ~hone Laaorator es 8ssumg$ no rO, p::::nS,-,,.:~:y ~or their use by the recipient. Furln=,, [: ’ La:::.c:,:e?o:,os ~:’urnes no ob~ja~tjon ~o furnish 6ny a~o,~,,..n~e at ~ny k:nd v,,hetsoever, or to furnish any additional jnformstjcn or documenta’tjon. UNIX PROGRAMMER’S MANUAL F~ifth ~ K. Thompson D. M. Ritchie June, 1974 Copyright:.©d972, 1973, 1974 Bell Telephone:Laboratories, Incorporated Copyright © 1972, 1973, 1974 Bell Telephone Laboratories, Incorporated This manual was set by a Graphic Systems photo- typesetter driven by the troff formatting program operating under the UNIX system. The text of the manual was prepared using the ed text editor. PREFACE to the Fifth Edition . The number of UNIX installations is now above 50, and many more are expected. None of these has exactly the same complement of hardware or software. Therefore, at any particular installa- tion, it is quite possible that this manual will give inappropriate information. The authors are grateful to L. L. Cherry, L. A. Dimino, R. C. Haight, S. C. Johnson, B. W. Ker- nighan, M. E. Lesk, and E. N. Pinson for their contributions to the system software, and to L. E. McMahon for software and for his contributions to this manual.
    [Show full text]
  • Standard TECO (Text Editor and Corrector)
    Standard TECO TextEditor and Corrector for the VAX, PDP-11, PDP-10, and PDP-8 May 1990 This manual was updated for the online version only in May 1990. User’s Guide and Language Reference Manual TECO-32 Version 40 TECO-11 Version 40 TECO-10 Version 3 TECO-8 Version 7 This manual describes the TECO Text Editor and COrrector. It includes a description for the novice user and an in-depth discussion of all available commands for more advanced users. General permission to copy or modify, but not for profit, is hereby granted, provided that the copyright notice is included and reference made to the fact that reproduction privileges were granted by the TECO SIG. © Digital Equipment Corporation 1979, 1985, 1990 TECO SIG. All Rights Reserved. This document was prepared using DECdocument, Version 3.3-1b. Contents Preface ............................................................ xvii Introduction ........................................................ xix Preface to the May 1985 edition ...................................... xxiii Preface to the May 1990 edition ...................................... xxv 1 Basics of TECO 1.1 Using TECO ................................................ 1–1 1.2 Data Structure Fundamentals . ................................ 1–2 1.3 File Selection Commands ...................................... 1–3 1.3.1 Simplified File Selection .................................... 1–3 1.3.2 Input File Specification (ER command) . ....................... 1–4 1.3.3 Output File Specification (EW command) ...................... 1–4 1.3.4 Closing Files (EX command) ................................ 1–5 1.4 Input and Output Commands . ................................ 1–5 1.5 Pointer Positioning Commands . ................................ 1–5 1.6 Type-Out Commands . ........................................ 1–6 1.6.1 Immediate Inspection Commands [not in TECO-10] .............. 1–7 1.7 Text Modification Commands . ................................ 1–7 1.8 Search Commands .
    [Show full text]
  • Embedded Design Handbook
    Embedded Design Handbook Subscribe EDH | 2020.07.22 Send Feedback Latest document on the web: PDF | HTML Contents Contents 1. Introduction................................................................................................................... 6 1.1. Document Revision History for Embedded Design Handbook........................................ 6 2. First Time Designer's Guide............................................................................................ 8 2.1. FPGAs and Soft-Core Processors.............................................................................. 8 2.2. Embedded System Design...................................................................................... 9 2.3. Embedded Design Resources................................................................................. 11 2.3.1. Intel Embedded Support........................................................................... 11 2.3.2. Intel Embedded Training........................................................................... 11 2.3.3. Intel Embedded Documentation................................................................. 12 2.3.4. Third Party Intellectual Property.................................................................12 2.4. Intel Embedded Glossary...................................................................................... 13 2.5. First Time Designer's Guide Revision History............................................................14 3. Hardware System Design with Intel Quartus Prime and Platform Designer.................
    [Show full text]
  • Rear Drive Axle/Differential - Drive Pinion Front Bearing Removal and Installation
    10/9/13 TOPIx - WSM-7811 - Workshop manual Freelander 2 2007-10 Published: 11-May-2011 Rear Drive Axle/Differential - Drive Pinion Front Bearing Removal and Installation Removal 1. Raise and support the vehicle. 2. Drain the differential fluid. Refer to: Differential Draining and Filling (205-02 Rear Drive Axle/Differential, General Procedures). 3. Remove the rear differential. Refer to: Differential Case (205-02 Rear Drive Axle/Differential, Removal and Installation). 4. Remove the differential casing bolts. 5. Remove the differential case. 6. Remove and discard the differential case seal. 7. Remove the crown wheel assembly. https://topix.landrover.jlrext.com/topix/content/document/view?id=146634&groupId=276 1/9 10/9/13 TOPIx - WSM-7811 - Workshop manual Freelander 2 2007-10 8. Position the differential assembly in a suitable vice as shown. 9. CAUTION: Make sure the pinion seal recess is not damaged as the seal is removed. Using the special tool remove the pinion shaft oil seal. 10. WARNING: High torque application. CAUTION: Do not use air tools or heat to remove the nut (as this could contaminate the head bearing). Failure to follow this instruction may result in damage to the component. https://topix.landrover.jlrext.com/topix/content/document/view?id=146634&groupId=276 2/9 10/9/13 TOPIx - WSM-7811 - Workshop manual Freelander 2 2007-10 NOTE: The special tool should be turned clockwise to remove the pinion shaft nut. Using the special tools remove the pinion shaft nut. 11. Secure the differential casing to the special tool. Position the support bolt to its lowest setting.
    [Show full text]