4,489 research outputs found

    Secondary water pore formation for proton transport in a ClC exchanger revealed by an atomistic molecular dynamics simulation

    Get PDF
    Several prokaryotic ClC proteins have been demonstrated to function as exchangers that transport both chloride ions and protons simultaneously in opposite directions. However, the path of the proton through the ClC exchanger and how the protein brings about the coupled movement of both ions are still unknown. In the present work, we demonstrate that a previously unknown secondary water pore is formed inside a ClC exchanger by using an atomistic molecular dynamics (MD) simulation. From the systematic simulations, it was determined that the glutamate residue exposed to the intracellular solution, E203, plays an important role as a trigger for the formation of the secondary water pore. Based on our simulation results, we conclude that protons in the ClC exchanger are conducted via a water network through the secondary water pore and we propose a new mechanism for the coupled transport of chloride ions and protons

    Structure analysis of single- and multi-frequency subspace migrations in inverse scattering problems

    Full text link
    In this literature, we carefully investigate the structure of single- and multi-frequency imaging functions, that are usually employed in inverse scattering problems. Based on patterns of the singular vectors of the Multi-Static Response (MSR) matrix, we establish a relationship between imaging functions and the Bessel function. This relationship indicates certain properties of imaging functions and the reason behind enhancement in the imaging performance by multiple frequencies. Several numerical simulations with a large amount of noisy data are performed in order to support our investigation.Comment: 11 pages, 10 figure

    Evolution of endogenous non-retroviral genes integrated into plant genomes

    Get PDF
    AbstractNumerous comparative genome analyses have revealed the wide extent of horizontal gene transfer (HGT) in living organisms, which contributes to their evolution and genetic diversity. Viruses play important roles in HGT. Endogenous viral elements (EVEs) are defined as viral DNA sequences present within the genomes of non-viral organisms. In eukaryotic cells, the majority of EVEs are derived from RNA viruses using reverse transcription. In contrast, endogenous non-retroviral elements (ENREs) are poorly studied. However, the increasing availability of genomic data and the rapid development of bioinformatics tools have enabled the identification of several ENREs in various eukaryotic organisms. To date, a small number of ENREs integrated into plant genomes have been identified. Of the known non-retroviruses, most identified ENREs are derived from double-strand (ds) RNA viruses, followed by single-strand (ss) DNA and ssRNA viruses. At least eight virus families have been identified. Of these, viruses in the family Partitiviridae are dominant, followed by viruses of the families Chrysoviridae and Geminiviridae. The identified ENREs have been primarily identified in eudicots, followed by monocots. In this review, we briefly discuss the current view on non-retroviral sequences integrated into plant genomes that are associated with plant-virus evolution and their possible roles in antiviral resistance

    Overcoming Overconfidence for Active Learning

    Full text link
    It is not an exaggeration to say that the recent progress in artificial intelligence technology depends on large-scale and high-quality data. Simultaneously, a prevalent issue exists everywhere: the budget for data labeling is constrained. Active learning is a prominent approach for addressing this issue, where valuable data for labeling is selected through a model and utilized to iteratively adjust the model. However, due to the limited amount of data in each iteration, the model is vulnerable to bias; thus, it is more likely to yield overconfident predictions. In this paper, we present two novel methods to address the problem of overconfidence that arises in the active learning scenario. The first is an augmentation strategy named Cross-Mix-and-Mix (CMaM), which aims to calibrate the model by expanding the limited training distribution. The second is a selection strategy named Ranked Margin Sampling (RankedMS), which prevents choosing data that leads to overly confident predictions. Through various experiments and analyses, we are able to demonstrate that our proposals facilitate efficient data selection by alleviating overconfidence, even though they are readily applicable

    A CAN Transceiver for a Smart Output ASIC of Automotive Electronic Control Units: Design, Implementation, and Measurement

    Get PDF
    Department of Electrical EngineeringIn this thesis, the design, implementation, and measurement of a CAN transceiver are presented as a part of an architecture of Multi-domain Electronic Control Unit (MECU) and Smart Output ASIC for better mileage, wire length reduction and flexible system configuration. The proposed Smart Output ASIC is a dedicated terminal system for actuation feature. The main component includes MCU core, four types of actuator drivers, CAN/LIN transceiver, temperature sensor, and BGR/LDO regulator. The Smart Output ASIC communicates with a central ECU by using CAN or LIN protocols. Therefore, the first step for the Smart Output ASIC is to implement the CAN transceiver meeting ISO 11898-2/-5. In this work, two types of CAN transceiver were implementedone is a stand-alone version CAN transceiver (Type I), and another is an MCU integrated version (Type II). Both support high-speed CAN which has the maximum data rate of 1Mbps. They are thermally protected, and robust against high voltage hazard. An 8-bit MCU is used for Type II. Type II is the first prototype of Smart Output ASIC, and it would be extended to the complete Smart Output ASIC by embedding the actuator drivers. The designed CAN transceivers were fabricated by using automotive 0.18????????, 52V BCDMOS technology. The chip size of the Type I is 1,275???????? (W) ?? 1,125???????? (H) except I/O pads. Also, Type II was implemented with the size of 2,680???????? (W) ?? 3,280???????? (H) except I/O pads. The fabricated CAN transceivers were tested for verifying the interoperability with commercial products.ope

    Design of Web-based Security Management for Intrusion Detection

    Get PDF
    Electronic business is rapidly popularized and extended through Internet. Internet has many security weaknesses, so we need the security solution such Intrusion Detection System that minimizes the damage of hacking and responds the intrusion dynamically. It is difficult for legacy management system to process the security environments and electronic business, because legacy system lacks of security policies and integrated security methods. In order to resolve these problems, we need security management system that has standard security policy, consulting, diagnosis, maintenance, and repair function. In this paper, we design and implement Web-based security management for intrusion detection. Our security system consists of network nodes, general hosts and a management node. A management node manages a network node, that is a secure router, and general hosts by security policies. We design the channel between the management node and the network node using IPsec (IP Security). We have applied java and Web to implementing user interface of security system. As the proposed system makes use of Web, security management system is easily accessed through the Web
    corecore