80 research outputs found
Experimental Evaluation of Empirical NB-IoT Propagation Modelling in a Deep-Indoor Scenario
Path-loss modelling in deep-indoor scenarios is a difficult task. On one
hand, the theoretical formulae solely dependent on transmitter-receiver
distance are too simple; on the other hand, discovering all significant factors
affecting the loss of signal power in a given situation may often be
infeasible. In this paper, we experimentally investigate the influence of
deep-indoor features such as indoor depth, indoor distance and distance to the
closest tunnel corridor and the effect on received power using NB-IoT. We
describe a measurement campaign performed in a system of long underground
tunnels, and we analyse linear regression models involving the engineered
features. We show that the current empirical models for NB-IoT signal
attenuation are inaccurate in a deep-indoor scenario. We observe that 1) indoor
distance and penetration depth do not explain the signal attenuation well and
increase the error of the prediction by 2-12 dB using existing models, and 2) a
promising feature of average distance to the nearest corridor is identified.Comment: 6 pages, 6 figures, submitted to Globecom2020 conference, Selected
Areas in Communications Symposium, Track on Internet of Things and Smart
Connected Communitie
The Privacy Dependency Thesis and Self-Defense
If I decide to disclose information about myself, this act can undermine other people’s ability to effectively conceal information about themselves. One case in point involves genetic information: if I share ‘my’ genetic information with others, I thereby also reveal genetic information about my biological relatives. Such dependencies are well-known in the privacy literature and are often referred to as ‘privacy dependencies’. Some take the existence of privacy dependencies to generate a moral duty to sometimes avoid sharing information about oneself. If true, we argue, then it is sometimes justified for others to impose harm on the person sharing the information to prevent them from doing so. This is a highly revisionary implication. Hence, one must either endorse a highly revisionary view on what one may do to protect one’s privacy, or one must reject the view that privacy dependencies can be used to justify a moral duty that constrains choices about sharing information about oneself
Genes Linked to Production of Secondary Metabolites in Talaromyces atroroseus Revealed Using CRISPR-Cas9
The full potential of fungal secondary metabolism has until recently been impeded by the lack of universal genetic tools for most species. However, the emergence of several CRISPR-Cas9-based genome editing systems adapted for several genera of filamentous fungi have now opened the doors for future efforts in discovery of novel natural products and elucidation and engineering of their biosynthetic pathways in fungi where no genetic tools are in place. So far, most studies have focused on demonstrating the performance of CRISPR-Cas9 in various fungal model species, and recently we presented a versatile CRISPR-Cas9 system that can be successfully applied in several diverse Aspergillus species. Here we take it one step further and show that our system can be used also in a phylogenetically distinct and largely unexplored species from the genus of Talaromyces. Specifically, we exploit CRISPR-Cas9-based genome editing to identify a new gene in T. atroroseus responsible for production of polyketide-nonribosomal peptide hybrid products, hence, linking fungal secondary metabolites to their genetic origin in a species where no genetic engineering has previously been performed
- …