1,338 research outputs found

    Just as Good

    Get PDF
    Fiction by Frederick Robinso

    The University of Queensland, St. Lucia, Brisbane.

    Get PDF
    No abstract availabl

    Letter regarding National Recovery Act Parade

    Full text link
    Letter from the President of CCNY regarding the National Recovery Act Parade in which Brooklyn College participate

    Grouping and Classifying Electrophysiologically-Defined Classes of Neocortical Neurons by Single Cell, Whole-Genome Expression Profiling

    Get PDF
    The diversity of neuronal cell types and how to classify them are perennial questions in neuroscience. The advent of global gene expression analysis raised the possibility that comprehensive transcription profiling will resolve neuronal cell types into groups that reflect some or all aspects of their phenotype. This approach has been successfully used to compare gene expression between groups of neurons defined by a common property. Here we extend this approach to ask whether single neuron gene expression profiling can prospectively resolve neuronal subtypes into groups, independent of any phenotypic information, and whether those groups reflect meaningful biological properties of those neurons. We applied methods we have developed to compare gene expression among single neural stem cells to study global gene expression in 18 randomly picked neurons from layer II/III of the early postnatal mouse neocortex. Cells were selected by morphology and by firing characteristics and electrical properties, enabling the definition of each cell as either fast- or regular-spiking, corresponding to a class of inhibitory interneurons or excitatory pyramidal cells. Unsupervised clustering of young neurons by global gene expression resolved the cells into two groups and those broadly corresponded with the two groups of fast- and regular-spiking neurons. Clustering of the entire, diverse group of 18 neurons of different developmental stages also successfully grouped neurons in accordance with the electrophysiological phenotypes, but with more cells misassigned among groups. Genes specifically enriched in regular spiking neurons were identified from the young neuron expression dataset. These results provide a proof of principle that single-cell gene expression profiling may be used to group and classify neurons in a manner reflecting their known biological properties and may be used to identify cell-specific transcripts

    Reverberation Chamber Immunity Testing : A novel methodology to avoid accidental DUT damage

    Get PDF
    Abstractā€”This paper shows a novel method of measuring the immunity of electronic devices inside reverberation chambers. Rather than using mode stirring or mode tuning with a constant power input into the chamber, we will present a method based on variable power that protects the DUT against accidental damage and also gives more information about the hardness of the DUT than the traditional methods

    CASTLEGUARD : anonymised data streams with guaranteed differential privacy

    Get PDF
    Data streams are commonly used by data controllers to outsource the processing of real-time data to third-party data processors. Data protection legislation and best practice in data management support the view that data controllers are responsible for providing a guarantee of privacy for user data contained within published data streams. Continuously Anonymising STreaming data via adaptive cLustEring (CASTLE) is an established method for anonymising data streams with a guarantee of k-anonymity. However, k-anonymity has been shown to be a weak privacy guarantee that has vulnerabilities in practical applications. In this paper we propose Continuously Anonymising STreaming data via adaptive cLustEring with GUAR-anteed Differential privacy (CASTLEGUARD), a data stream anonymisation algorithm that provides a reliable guarantee of k-anonymity, l-diversity and differential privacy to data subjects. We analyse CASTLEGUARD to show that, through safe k-anonymisation and Ī²-sampling, the proposed approach satisfies differentially private k-anonymity. Further, we demonstrate the efficacy of the approach in the context of machine learning, presenting experimental analysis to demonstrate that it can be used to protect the individual privacy of users whilst maintaining the utility of a data stream
    • ā€¦
    corecore