49,910 research outputs found
Development and optimization of a miniaturized western blot-based screening platform to identify regulators of post-translational modifications
Post-translational modifications (PTMs) are fundamental traits of protein functionality and their study has been addressed using several approaches over the past years. However, screening methods developed to detect regulators of PTMs imply many challenges and are usually based on expensive techniques. Herein, we described the development and optimization of a western blot-based platform for identification of regulators of a specific PTM—mono-ubiquitylation of proliferating cell nuclear antigen (PCNA). This cell-based method does not require specific equipment, apart from the basic western blot (WB) devices and minor accessories, which are accessible for most research labs. The modifications introduced to the classical WB protocol allow the performance of PTM analysis from a single well of a 96-well plate with minimal sample manipulation and low intra- and inter-plate variability, making this method ideal to screen arrayed compound libraries in a 96-well format. As such, our experimental pipeline provides the proof of concept to design small screenings of PTM regulators by improving the quantitative accuracy and throughput capacity of classical western blots.Fil: Villafañez, Florencia. Consejo Nacional de Investigaciones CientĂficas y TĂ©cnicas. Centro CientĂfico TecnolĂłgico CĂłrdoba. Centro de Investigaciones en BioquĂmica ClĂnica e InmunologĂa; Argentina. Universidad Nacional de CĂłrdoba; ArgentinaFil: Gottifredi, Vanesa. Consejo Nacional de Investigaciones CientĂficas y TĂ©cnicas. Oficina de CoordinaciĂłn Administrativa Parque Centenario. Instituto de Investigaciones BioquĂmicas de Buenos Aires. FundaciĂłn Instituto Leloir. Instituto de Investigaciones BioquĂmicas de Buenos Aires; ArgentinaFil: Soria, Ramiro Gaston. Universidad Nacional de CĂłrdoba; Argentina. Consejo Nacional de Investigaciones CientĂficas y TĂ©cnicas. Centro CientĂfico TecnolĂłgico CĂłrdoba. Centro de Investigaciones en BioquĂmica ClĂnica e InmunologĂa; Argentin
Scather: programming with multi-party computation and MapReduce
We present a prototype of a distributed computational infrastructure, an associated high level programming language, and an underlying formal framework that allow multiple parties to leverage their own cloud-based computational resources (capable of supporting MapReduce [27] operations) in concert with multi-party computation (MPC) to execute statistical analysis algorithms that have privacy-preserving properties. Our architecture allows a data analyst unfamiliar with MPC to: (1) author an analysis algorithm that is agnostic with regard to data privacy policies, (2) to use an automated process to derive algorithm implementation variants that have different privacy and performance properties, and (3) to compile those implementation variants so that they can be deployed on an infrastructures that allows computations to take place locally within each participant’s MapReduce cluster as well as across all the participants’ clusters using an MPC protocol. We describe implementation details of the architecture, discuss and demonstrate how the formal framework enables the exploration of tradeoffs between the efficiency and privacy properties of an analysis algorithm, and present two example applications that illustrate how such an infrastructure can be utilized in practice.This work was supported in part by NSF Grants: #1430145, #1414119, #1347522, and #1012798
Protocol of the SOMNIA project : an observational study to create a neurophysiological database for advanced clinical sleep monitoring
Introduction Polysomnography (PSG) is the primary tool for sleep monitoring and the diagnosis of sleep disorders. Recent advances in signal analysis make it possible to reveal more information from this rich data source. Furthermore, many innovative sleep monitoring techniques are being developed that are less obtrusive, easier to use over long time periods and in the home situation. Here, we describe the methods of the Sleep and Obstructive Sleep Apnoea Monitoring with Non-Invasive Applications (SOMNIA) project, yielding a database combining clinical PSG with advanced unobtrusive sleep monitoring modalities in a large cohort of patients with various sleep disorders. The SOMNIA database will facilitate the validation and assessment of the diagnostic value of the new techniques, as well as the development of additional indices and biomarkers derived from new and/or traditional sleep monitoring methods.
Methods and analysis We aim to include at least 2100 subjects (both adults and children) with a variety of sleep disorders who undergo a PSG as part of standard clinical care in a dedicated sleep centre. Full-video PSG will be performed according to the standards of the American Academy of Sleep Medicine. Each recording will be supplemented with one or more new monitoring systems, including wrist-worn photoplethysmography and actigraphy, pressure sensing mattresses, multimicrophone recording of respiratory sounds including snoring, suprasternal pressure monitoring and multielectrode electromyography of the diaphragm
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Search engines are the prevalently used tools to collect information about
individuals on the Internet. Search results typically comprise a variety of
sources that contain personal information -- either intentionally released by
the person herself, or unintentionally leaked or published by third parties,
often with detrimental effects on the individual's privacy. To grant
individuals the ability to regain control over their disseminated personal
information, the European Court of Justice recently ruled that EU citizens have
a right to be forgotten in the sense that indexing systems, must offer them
technical means to request removal of links from search results that point to
sources violating their data protection rights. As of now, these technical
means consist of a web form that requires a user to manually identify all
relevant links upfront and to insert them into the web form, followed by a
manual evaluation by employees of the indexing system to assess if the request
is eligible and lawful.
We propose a universal framework Oblivion to support the automation of the
right to be forgotten in a scalable, provable and privacy-preserving manner.
First, Oblivion enables a user to automatically find and tag her disseminated
personal information using natural language processing and image recognition
techniques and file a request in a privacy-preserving manner. Second, Oblivion
provides indexing systems with an automated and provable eligibility mechanism,
asserting that the author of a request is indeed affected by an online
resource. The automated ligibility proof ensures censorship-resistance so that
only legitimately affected individuals can request the removal of corresponding
links from search results. We have conducted comprehensive evaluations, showing
that Oblivion is capable of handling 278 removal requests per second, and is
hence suitable for large-scale deployment
Private Multi-party Matrix Multiplication and Trust Computations
This paper deals with distributed matrix multiplication. Each player owns
only one row of both matrices and wishes to learn about one distinct row of the
product matrix, without revealing its input to the other players. We first
improve on a weighted average protocol, in order to securely compute a
dot-product with a quadratic volume of communications and linear number of
rounds. We also propose a protocol with five communication rounds, using a
Paillier-like underlying homomorphic public key cryptosystem, which is secure
in the semi-honest model or secure with high probability in the malicious
adversary model. Using ProVerif, a cryptographic protocol verification tool, we
are able to check the security of the protocol and provide a countermeasure for
each attack found by the tool. We also give a randomization method to avoid
collusion attacks. As an application, we show that this protocol enables a
distributed and secure evaluation of trust relationships in a network, for a
large class of trust evaluation schemes.Comment: Pierangela Samarati. SECRYPT 2016 : 13th International Conference on
Security and Cryptography, Lisbonne, Portugal, 26--28 Juillet 2016. 201
Active Learning Strategies for Technology Assisted Sensitivity Review
Government documents must be reviewed to identify and protect any sensitive information, such as personal information, before the documents can be released to the public. However, in the era of digital government documents, such as e-mail, traditional sensitivity review procedures are no longer practical, for example due to the volume of documents to be reviewed. Therefore, there is a need for new technology assisted review protocols to integrate automatic sensitivity classification into the sensitivity review process. Moreover, to effectively assist sensitivity review, such assistive technologies must incorporate reviewer feedback to enable sensitivity classifiers to quickly learn and adapt to the sensitivities within a collection, when the types of sensitivity are not known a priori. In this work, we present a thorough evaluation of active learning strategies for sensitivity review. Moreover, we present an active learning strategy that integrates reviewer feedback, from sensitive text annotations, to identify features of sensitivity that enable us to learn an effective sensitivity classifier (0.7 Balanced Accuracy) using significantly less reviewer effort, according to the sign test (p < 0.01 ). Moreover, this approach results in a 51% reduction in the number of documents required to be reviewed to achieve the same level of classification accuracy, compared to when the approach is deployed without annotation features
- …