4,907 research outputs found

    Examining A Renormalizable Supersymmetric SO(10) Model

    Get PDF
    We examine a renormalizable SUSY SO(10) model without fine-tuning. We show how to construct MSSM doublets and to predict proton decay. We find that in the minimal set of Yukawa couplings the model is consistent with the experiments, while including 120H120_H to fit the data there are inconsistencies.Comment: 18 page

    The excess of 5′ introns in eukaryotic genomes

    Get PDF
    In this work, 21 completely sequenced eukaryotic genomes were analyzed using an intragene comparison approach. We found that all of these genomes show a significant 5′-biased distribution of introns of protein-coding genes. Our findings are different from previous studies based on the intergene method, where introns are biased towards the 5′ end of genes only in intron-poor genomes, but are evenly distributed in intron-rich genomes. In addition, by analyzing the patterns of intron distribution of a set of well-compiled housekeeping genes from human and their respective orthologs identified by a bidirectional best BLAST hit method from the other genomes, we found that the trend of 5′-biased intron positions of the set of housekeeping genes for each genome is much more skewed than that of all genes of the same genome, and rarely if any of the housekeeping genes examined have an extremely 3′-biased position distribution in which all introns of a gene are located only at the 3′ portion of the gene. The most parsimonious explanation for our findings may be the model in which intron loss is caused by homologous recombination between the genomic copy of a gene and a reverse transcriptase product of a spliced mRNA

    Short video users’ personality traits and social sharing motivation

    Get PDF
    Purpose/significanceStudying the correlation between short video users’ personality traits and their sharing motivation can enrich the theoretical research on social sharing motivation and provide a reference for short-video content management and platform construction.Methods/processBased on uses and gratifications theory and personality traits theory, a structural model affecting short-video users’ sharing motivations was proposed. A total of 579 valid questionnaires were collected from a social network, and the proposed hypotheses were tested using SPSS and Amos software.Results/conclusionThe results show that the personality traits of short-video users affect their sharing motivation and that their specific sharing motivation also differ due to their personality traits. At the same time, the research results also confirm the Matthew effect of “the rich getting richer” and the social compensation effect of “the poor getting richer” in the context of social platforms that host short videos

    Modeling and evaluating information leakage caused by inferences in supply chains

    Get PDF
    While information sharing can benefit supply chains significantly, it may also have a "side effect", namely, information leakage. A limitation common to many existing solutions for preventing information leakage in supply chains is that they rely, either implicitly or explicitly, upon two unrealistic assumptions. First, what information is confidential is well known. Second, confidential information will not be revealed, if only it is not shared, regardless of how much other information is being shared. As it shall be shown in this thesis, those assumptions are not always true due to potential information leakage caused by inferences. Specifically, a conceptual model of such information leakage is proposed in this thesis. The model will enable companies in a supply chain to better understand how their confidential information may be leaked through inferences. On the basis of the proposed conceptual model, a quantitative approach is devised to evaluate the risk of information leakage caused by inferences when a given amount of information is shared. The quantitative approach will allow companies in a supply chain to measure and consequently to mitigate the risk of information leakage. Finally, a case study is discussed to illustrate how the proposed approaches work in practice
    • …
    corecore