9 research outputs found

    Distinct evolutionary origins of intron retention splicing events in NHX1 antiporter transcripts relate to sequence specific distinctions in Oryza species

    Get PDF
    The genome of Asian cultivated rice (Oryza sativa L.) shows the presence of six organelle-specific and one plasma membrane (OsNHX1-7) NHX-type cation proton antiporters. Of these, vacuolar-localized OsNHX1 is extensively characterized. The genus Oryza consists of 27 species and 11 genome-types, with cultivated rice, diploid O. sativa, having an AA-type genome. Oryza NHX1 orthologous regions (gene organization, 5′ upstream cis elements, amino acid residues/motifs) from closely related Oryza AA genomes cluster distinctly from NHX1 regions from more ancestral Oryza BB, FF and KKLL genomes. These sequence-specific distinctions also extend to two separate intron retention (IR) events involving Oryza NHX1 transcripts that occur at the 5′ and 3′ ends of the NHX1 transcripts. We demonstrate that the IR event involving the 5′ UTR is present only in more recently evolved Oryza AA genomes while the IR event governing retention of the 13th intron of Oryza NHX1 (terminal intron) is more ancient in origin, also occurring in halophytic wild rice, Oryza coarctata (KKLL). We also report presence of a retro-copy of the OcNHX1 cDNA in the genome of O. coarctata (rOcNHX1). Preferential species and tissue specific up- or down-regulation of the correctly spliced NHX1 transcript/5′ UTR/13th intron-retaining splice variants under salinity was observed. The implications of IR on NHX1 mRNA stability and ORF diversity in Oryza spp. is discussed

    Support Vector Machine Classification using Proximity Authentication and Surveillance System in IoT Industrial Network

    Get PDF
    This research focuses on developing a proximity-based authentication and surveillance system using Internet of Things (IoT) devices in industrial networks. The system aims to improve security measures by ensuring only authorized personnel have access to critical areas of the network. Researching authentication mechanisms and protocols, examining network authentication system features and application environments, and developing an online-based, real-time monitoring authentication system are the goals of this article. The system will utilize sensors and cameras installed in strategic locations to detect and track personnel movement within the network. When a person approaches a secured area, their identity will be verified using proximity-based authentication using RFID technology. The system will also monitor and record any suspicious activity, providing real-time alerts to security personnel. To detect malicious behavior on short-range, low-rate, and low-power networks, such as those found in the Internet of Things (IoT), we advise utilizing SVM models. The proposed system is expected to increase security and reduce the risk of unauthorized access to industrial networks, ultimately enhancing overall network reliability and safety. The results are compared with various parameters
    corecore