2,038 research outputs found

    Population genomic analysis of base composition evolution in Drosophila melanogaster.

    Get PDF
    The relative importance of mutation, selection, and biased gene conversion to patterns of base composition variation in Drosophila melanogaster, and to a lesser extent, D. simulans, has been investigated for many years. However, genomic data from sufficiently large samples to thoroughly characterize patterns of base composition polymorphism within species have been lacking. Here, we report a genome-wide analysis of coding and noncoding polymorphism in a large sample of inbred D. melanogaster strains from Raleigh, North Carolina. Consistent with previous results, we observed that AT mutations fix more frequently than GC mutations in D. melanogaster. Contrary to predictions of previous models of codon usage in D. melanogaster, we found that synonymous sites segregating for derived AT polymorphisms were less skewed toward low frequencies compared with sites segregating a derived GC polymorphism. However, no such pattern was observed for comparable base composition polymorphisms in noncoding DNA. These results suggest that AT-ending codons could currently be favored by natural selection in the D. melanogaster lineage

    PrivHome: Privacy-preserving authenticated communication in smart home environment

    Get PDF
    A smart home enables users to access devices such as lighting, HVAC, temperature sensors, and surveillance camera. It provides a more convenient and safe living environment for users. Security and privacy, however, is a key concern since information collected from these devices are normally communicated to the user through an open network (i. e. Internet) or system provided by the service provider. The service provider may store and have access to these information. Emerging smart home hubs such as Samsung SmartThings and Google Home are also capable of collecting and storing these information. Leakage and unauthorized access to the information can have serious consequences. For example, the mere timing of switching on/off of an HVAC unit may reveal the presence or absence of the home owner. Similarly, leakage or tampering of critical medical information collected from wearable body sensors can have serious consequences. Encrypting these information will address the issues, but it also reduces utility since queries is no longer straightforward. Therefore, we propose a privacy-preserving scheme, PrivHome. It supports authentication, secure data storage and query for smart home systems. PrivHome provides data confidentiality as well as entity and data authentication to prevent an outsider from learning or modifying the data communicated between the devices, service provider, gateway, and the user. It further provides privacy-preserving queries in such a way that the service provider, and the gateway does not learn content of the data. To the best of our knowledge, privacy-preserving queries for smart home systems has not been considered before. Under our scheme is a new, lightweight entity and key-exchange protocol, and an efficient searchable encryption protocol. Our scheme is practical as both protocols are based solely on symmetric cryptographic techniques. We demonstrate efficiency and effectiveness of our scheme based on experimental and simulation results, as well as comparisons to existing smart home security protocols

    A multistep continuous flow synthesis machine for the preparation of pyrazoles via a metal-free amine-redox process

    Get PDF
    A versatile multistep continuous flow setup is reported for the four-step conversion of anilines into pyrazole products. The synthesis machine incorporates the use of amine-redox chemistry through diazotization and a metal-free vitamin C mediated reduction. The machine can be used for the synthesis of an array of analogues or the scale up of an individual target

    Dependence of Adhesion Properties on Blend Ratio of Ethylene-Propylene-Diene Rubber/Standard Malaysian Rubber Blend Adhesive

    Get PDF
    Viscosity, tack and, peel and shear strengths of ethylene-propylene-diene rubber (EPDM)/standard Malaysian rubber (SMR L) blend adhesive were studied using various blend ratios of the two rubbers, ranging from 0 to 100% EPDM. Coumarone-indene resin, toluene, and poly(ethylene terephthalate) (PET) were used as the tackifier, solvent, and coating substrate, respectively. The tackifier content was fixed at 40 parts per hundred parts of rubber (phr). A SHEEN hand coater was used to coat the adhesive on PET film at four coating thicknesses, that is, 30, 60, 90, and 12

    Adhesion Properties of Acrylonitrile-Butadiene Rubber/Standard Malaysian Rubber Blend Based Pressure-Sensitive Adhesive

    Get PDF
    Viscosity and adhesion properties of NBR/SMR L blend based pressure-sensitive adhesive were investigated using coumaroneindene resin, toluene, and poly(ethylene terephthalate) (PET) as tackifier, solvent, and coating substrate, respectively. Coumaroneindene resin content was fixed at 40 parts per hundred parts of rubber (phr) in the adhesive formulation.The ratio of NBR/SMR L blend used was 0, 20, 40, 60, 80, and 100% of NBR content. Four different thicknesses, that is, 30, 60, 90, and 12

    A Modified Neutral Point Method for Kernel-Based Fusion of Pattern-Recognition Modalities with Incomplete Data Sets

    Get PDF
    It is commonly the case in multi-modal pattern recognition that certain modality-specific object features are missing in the training set. We address here the missing data problem for kernel-based Support Vector Machines, in which each modality is represented by the respective kernel matrix over the set of training objects, such that the omission of a modality for some object manifests itself as a blank in the modality-specific kernel matrix at the relevant position. We propose to fill the blank positions in the collection of training kernel matrices via a variant of the Neutral Point Substitution (NPS) method, where the term ”neutral point” stands for the locus of points defined by the ”neutral hyperplane” in the hypothetical linear space produced by the respective kernel. The current method crucially differs from the previously developed neutral point approach in that it is capable of treating missing data in the training set on the same basis as missing data in the test set. It is therefore of potentially much wider applicability. We evaluate the method on the Biosecure DS2 data set

    The design of a knowledge-based guidance system for an intelligent multiple objective decision support system (IMODSS)

    Get PDF
    This paper describes a project that extends the multiple objective decision support system (MODSS) by offering knowledge-based guidance to an intelligent multiple objective decision support system (IMODSS). This IMODSS integrates expert system (ES), multiple objective decision-making (MODM) methodologies, graphical user interface (GUI) and decision support systems (DSS) technologies. This IMODSS uses an expert system shell CLIPS to build a knowledge base to guide the decision-makers (DMs) to select the most suitable MODM method(s) from the MODM methodology base in order to solve their particular decision problems. This IMODSS has been implemented and tested. This paper mainly discusses the design and implementation of the knowledge-based intelligent guidance subsystem in IMODSS
    corecore