48,392 research outputs found

    Development and optimization of a miniaturized western blot-based screening platform to identify regulators of post-translational modifications

    Get PDF
    Post-translational modifications (PTMs) are fundamental traits of protein functionality and their study has been addressed using several approaches over the past years. However, screening methods developed to detect regulators of PTMs imply many challenges and are usually based on expensive techniques. Herein, we described the development and optimization of a western blot-based platform for identification of regulators of a specific PTM—mono-ubiquitylation of proliferating cell nuclear antigen (PCNA). This cell-based method does not require specific equipment, apart from the basic western blot (WB) devices and minor accessories, which are accessible for most research labs. The modifications introduced to the classical WB protocol allow the performance of PTM analysis from a single well of a 96-well plate with minimal sample manipulation and low intra- and inter-plate variability, making this method ideal to screen arrayed compound libraries in a 96-well format. As such, our experimental pipeline provides the proof of concept to design small screenings of PTM regulators by improving the quantitative accuracy and throughput capacity of classical western blots.Fil: Villafañez, Florencia. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Córdoba. Centro de Investigaciones en Bioquímica Clínica e Inmunología; Argentina. Universidad Nacional de Córdoba; ArgentinaFil: Gottifredi, Vanesa. Consejo Nacional de Investigaciones Científicas y Técnicas. Oficina de Coordinación Administrativa Parque Centenario. Instituto de Investigaciones Bioquímicas de Buenos Aires. Fundación Instituto Leloir. Instituto de Investigaciones Bioquímicas de Buenos Aires; ArgentinaFil: Soria, Ramiro Gaston. Universidad Nacional de Córdoba; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Córdoba. Centro de Investigaciones en Bioquímica Clínica e Inmunología; Argentin

    Benchmarking for wireless sensor networks

    Get PDF

    Scather: programming with multi-party computation and MapReduce

    Full text link
    We present a prototype of a distributed computational infrastructure, an associated high level programming language, and an underlying formal framework that allow multiple parties to leverage their own cloud-based computational resources (capable of supporting MapReduce [27] operations) in concert with multi-party computation (MPC) to execute statistical analysis algorithms that have privacy-preserving properties. Our architecture allows a data analyst unfamiliar with MPC to: (1) author an analysis algorithm that is agnostic with regard to data privacy policies, (2) to use an automated process to derive algorithm implementation variants that have different privacy and performance properties, and (3) to compile those implementation variants so that they can be deployed on an infrastructures that allows computations to take place locally within each participant’s MapReduce cluster as well as across all the participants’ clusters using an MPC protocol. We describe implementation details of the architecture, discuss and demonstrate how the formal framework enables the exploration of tradeoffs between the efficiency and privacy properties of an analysis algorithm, and present two example applications that illustrate how such an infrastructure can be utilized in practice.This work was supported in part by NSF Grants: #1430145, #1414119, #1347522, and #1012798

    Protocol of the SOMNIA project : an observational study to create a neurophysiological database for advanced clinical sleep monitoring

    Get PDF
    Introduction Polysomnography (PSG) is the primary tool for sleep monitoring and the diagnosis of sleep disorders. Recent advances in signal analysis make it possible to reveal more information from this rich data source. Furthermore, many innovative sleep monitoring techniques are being developed that are less obtrusive, easier to use over long time periods and in the home situation. Here, we describe the methods of the Sleep and Obstructive Sleep Apnoea Monitoring with Non-Invasive Applications (SOMNIA) project, yielding a database combining clinical PSG with advanced unobtrusive sleep monitoring modalities in a large cohort of patients with various sleep disorders. The SOMNIA database will facilitate the validation and assessment of the diagnostic value of the new techniques, as well as the development of additional indices and biomarkers derived from new and/or traditional sleep monitoring methods. Methods and analysis We aim to include at least 2100 subjects (both adults and children) with a variety of sleep disorders who undergo a PSG as part of standard clinical care in a dedicated sleep centre. Full-video PSG will be performed according to the standards of the American Academy of Sleep Medicine. Each recording will be supplemented with one or more new monitoring systems, including wrist-worn photoplethysmography and actigraphy, pressure sensing mattresses, multimicrophone recording of respiratory sounds including snoring, suprasternal pressure monitoring and multielectrode electromyography of the diaphragm

    Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

    Get PDF
    Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or unintentionally leaked or published by third parties, often with detrimental effects on the individual's privacy. To grant individuals the ability to regain control over their disseminated personal information, the European Court of Justice recently ruled that EU citizens have a right to be forgotten in the sense that indexing systems, must offer them technical means to request removal of links from search results that point to sources violating their data protection rights. As of now, these technical means consist of a web form that requires a user to manually identify all relevant links upfront and to insert them into the web form, followed by a manual evaluation by employees of the indexing system to assess if the request is eligible and lawful. We propose a universal framework Oblivion to support the automation of the right to be forgotten in a scalable, provable and privacy-preserving manner. First, Oblivion enables a user to automatically find and tag her disseminated personal information using natural language processing and image recognition techniques and file a request in a privacy-preserving manner. Second, Oblivion provides indexing systems with an automated and provable eligibility mechanism, asserting that the author of a request is indeed affected by an online resource. The automated ligibility proof ensures censorship-resistance so that only legitimately affected individuals can request the removal of corresponding links from search results. We have conducted comprehensive evaluations, showing that Oblivion is capable of handling 278 removal requests per second, and is hence suitable for large-scale deployment

    Private Multi-party Matrix Multiplication and Trust Computations

    Full text link
    This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.Comment: Pierangela Samarati. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Lisbonne, Portugal, 26--28 Juillet 2016. 201

    Active Learning Strategies for Technology Assisted Sensitivity Review

    Get PDF
    Government documents must be reviewed to identify and protect any sensitive information, such as personal information, before the documents can be released to the public. However, in the era of digital government documents, such as e-mail, traditional sensitivity review procedures are no longer practical, for example due to the volume of documents to be reviewed. Therefore, there is a need for new technology assisted review protocols to integrate automatic sensitivity classification into the sensitivity review process. Moreover, to effectively assist sensitivity review, such assistive technologies must incorporate reviewer feedback to enable sensitivity classifiers to quickly learn and adapt to the sensitivities within a collection, when the types of sensitivity are not known a priori. In this work, we present a thorough evaluation of active learning strategies for sensitivity review. Moreover, we present an active learning strategy that integrates reviewer feedback, from sensitive text annotations, to identify features of sensitivity that enable us to learn an effective sensitivity classifier (0.7 Balanced Accuracy) using significantly less reviewer effort, according to the sign test (p < 0.01 ). Moreover, this approach results in a 51% reduction in the number of documents required to be reviewed to achieve the same level of classification accuracy, compared to when the approach is deployed without annotation features
    • …
    corecore