3,707 research outputs found

    Decoding Single Molecule Time Traces with Dynamic Disorder

    Full text link
    Single molecule time trajectories of biomolecules provide glimpses into complex folding landscapes that are difficult to visualize using conventional ensemble measurements. Recent experiments and theoretical analyses have highlighted dynamic disorder in certain classes of biomolecules, whose dynamic pattern of conformational transitions is affected by slower transition dynamics of internal state hidden in a low dimensional projection. A systematic means to analyze such data is, however, currently not well developed. Here we report a new algorithm - Variational Bayes-double chain Markov model (VB-DCMM) - to analyze single molecule time trajectories that display dynamic disorder. The proposed analysis employing VB-DCMM allows us to detect the presence of dynamic disorder, if any, in each trajectory, identify the number of internal states, and estimate transition rates between the internal states as well as the rates of conformational transition within each internal state. Applying VB-DCMM algorithm to single molecule FRET data of H-DNA in 100 mM-Na+^+ solution, followed by data clustering, we show that at least 6 kinetic paths linking 4 distinct internal states are required to correctly interpret the duplex-triplex transitions of H-DNA

    A STUDY ON THE FACTORS INFLUENCING THE INTENTION OF BLOG USAGE

    Get PDF
    Blogs are a new type of media that have recently become popular users on the World Wide Web and have influence throughout society. The purpose of this study is to examine social motivations influencing intention of blog usage. Based on Technology Acceptance Model and Motivation Theory, This study considered perceived usefulness, perceived ease of use, reputation, reciprocity, enjoyment of helping, social identity as the determinants of influencing the intention of blog usage. The purposed model was empirically evaluated using online survey data collected from 342 user of popular blog site in Korea (NAVER Blog , cyworld mihompy, daum blog, yahoo blog etc) The results revealed that perceived usefulness, perceived ease of use, reciprocity, social identity affected directly the intention of blog usage. Also social identity has moderate effect via reciprocity and enjoyment of helping on blog usage. This study contributes to a theoretical understanding of the factors as social motivation that affect the usage of blogs. Practically this study results provide blog service providers useful strategic insights and service guideline to enhance user\u27s intention of blogs

    Mask Off: Analytic-based Malware Detection By Transfer Learning and Model Personalization

    Full text link
    The vulnerability of smartphones to cyberattacks has been a severe concern to users arising from the integrity of installed applications (\textit{apps}). Although applications are to provide legitimate and diversified on-the-go services, harmful and dangerous ones have also uncovered the feasible way to penetrate smartphones for malicious behaviors. Thorough application analysis is key to revealing malicious intent and providing more insights into the application behavior for security risk assessments. Such in-depth analysis motivates employing deep neural networks (DNNs) for a set of features and patterns extracted from applications to facilitate detecting potentially dangerous applications independently. This paper presents an Analytic-based deep neural network, Android Malware detection (ADAM), that employs a fine-grained set of features to train feature-specific DNNs to have consensus on the application labels when their ground truth is unknown. In addition, ADAM leverages the transfer learning technique to obtain its adjustability to new applications across smartphones for recycling the pre-trained model(s) and making them more adaptable by model personalization and federated learning techniques. This adjustability is also assisted by federated learning guards, which protect ADAM against poisoning attacks through model analysis. ADAM relies on a diverse dataset containing more than 153000 applications with over 41000 extracted features for DNNs training. The ADAM's feature-specific DNNs, on average, achieved more than 98% accuracy, resulting in an outstanding performance against data manipulation attacks

    Young wall realization of crystal graphs for U_q(C_n^{(1)})

    Full text link
    We give a realization of crystal graphs for basic representations of the quantum affine algebra U_q(C_n^{(1)}) using combinatorics of Young walls. The notion of splitting blocks plays a crucial role in the construction of crystal graphs

    Testing the Electronic Throttle Control

    Get PDF
    In this report, we summarize our approach for testing the Electronic Throttle Control (ETC) system. We reformulate the ETC model based on the MATLAB/SIMULINK model provided by the Berkeley group. We specify the ETC model using the hybrid modeling language called CHARON. From the CHARON model, we generate test sequences based on the control-flow and data-flow criteria. These are transformed into test cases which may be used to test an implementation of the ETC system

    Estimates of Discharge Coefficient in Levee Breach Under Two Different Approach Flow Types

    Get PDF
    The amount of released water (discharge) in a levee breach is a primary input variable to establish an emergency action plan for the area next to the levee. However, although several studies have been conducted, there is still no widely applicable discharge coefficient formula; this needs to be known to estimate discharge amount through an opening caused by a levee breach. Sometimes, the discharge coefficient developed for a sharp crested side weir is used to rate the discharge, but, in case of a levee breach, the resulting geometry and flow types are similar to that over a broad crested weir. Thus, in this study, two different openings—rectangular and trapezoidal shape—are constructed in the center of a levee at a height of 0.6m to replicate levee breach scenarios, and the effect of two different approach flow types—the river type approach and reservoir type approach—are explored to suggest a discharge coefficient formula applicable for discharge rating for a levee breach. The results show that the ratio of head above the bottom of an opening and the opening width is a key variable for calculating the discharge coefficient of a reservoir type, but the approach Froude number should also be considered for a river type approach. The measured data are used to improve rating equations and will be useful in the future to validate computational fluid dynamics simulations of wave propagation during levee failure into the inundation area
    corecore