WorldWideScience

Sample records for ancient dna authenticity

  1. Authenticity in ancient DNA studies

    DEFF Research Database (Denmark)

    Gilbert, M Thomas P; Willerslev, Eske

    2006-01-01

    Ancient DNA studies represent a powerful tool that can be used to obtain genetic insights into the past. However, despite the publication of large numbers of apparently successful ancient DNA studies, a number of problems exist with the field that are often ignored. Therefore, questions exist as ...

  2. Authenticity of Ancient-DNA Results: A Statistical Approach

    OpenAIRE

    Spencer, Matthew; Howe, Christopher J.

    2004-01-01

    Although there have been several papers recommending appropriate experimental designs for ancient-DNA studies, there have been few attempts at statistical analysis. We assume that we cannot decide whether a result is authentic simply by examining the sequence (e.g., when working with humans and domestic animals). We use a maximum-likelihood approach to estimate the probability that a positive result from a sample is (either partly or entirely) an amplification of DNA that was present in the s...

  3. More on contamination: the use of asymmetric molecular behavior to identify authentic ancient human DNA

    DEFF Research Database (Denmark)

    Malmström, Helena; Svensson, Emma M; Gilbert, M Thomas P;

    2007-01-01

    Authentication of ancient human DNA results is an exceedingly difficult challenge due to the presence of modern contaminant DNA sequences. Nevertheless, the field of ancient human genetics generates huge scientific and public interest, and thus researchers are rarely discouraged by problems conce....... This asymmetrical behavior of authentic and contaminant DNA can be used to identify authentic haplotypes in human aDNA studies. Udgivelsesdato: 2007-Apr......Authentication of ancient human DNA results is an exceedingly difficult challenge due to the presence of modern contaminant DNA sequences. Nevertheless, the field of ancient human genetics generates huge scientific and public interest, and thus researchers are rarely discouraged by problems...... concerning the authenticity of such data. Although several methods have been developed to the purpose of authenticating ancient DNA (aDNA) results, while they are useful in faunal research, most of the methods have proven complicated to apply to ancient human DNA. Here, we investigate in detail the...

  4. Ancient DNA

    DEFF Research Database (Denmark)

    Willerslev, Eske; Cooper, Alan

    2004-01-01

    ancient DNA, palaeontology, palaeoecology, archaeology, population genetics, DNA damage and repair......ancient DNA, palaeontology, palaeoecology, archaeology, population genetics, DNA damage and repair...

  5. Ancient DNA

    OpenAIRE

    Willerslev, Eske; Cooper, Alan

    2004-01-01

    In the past two decades, ancient DNA research has progressed from the retrieval of small fragments of mitochondrial DNA from a few late Holocene specimens, to large-scale studies of ancient populations, phenotypically important nuclear loci, and even whole mitochondrial genome sequences of extinct species. However, the field is still regularly marred by erroneous reports, which underestimate the extent of contamination within laboratories and samples themselves. An improved understanding of t...

  6. Geologically ancient DNA: fact or artefact?

    DEFF Research Database (Denmark)

    Hebsgaard, Martin Bay; Phillips, Matthew J.; Willerslev, Eske

    2005-01-01

    Studies continue to report ancient DNA sequences and viable microbial cells that are many millions of years old. In this paper we evaluate some of the most extravagant claims of geologically ancient DNA. We conclude that although exciting, the reports suffer from inadequate experimental setup and...... insufficient authentication of results. Consequently, it remains doubtful whether amplifiable DNA sequences and viable bacteria can survive over geological timescales. To enhance the credibility of future studies and assist in discarding false-positive results, we propose a rigorous set of authentication...... criteria for work with geologically ancient DNA....

  7. Re-inventing ancient human DNA

    OpenAIRE

    Knapp, Michael; Lalueza-Fox, Carles; Hofreiter, M.

    2015-01-01

    For a long time, the analysis of ancient human DNA represented one of the most controversial disciplines in an already controversial field of research. Scepticism in this field was only matched by the long-lasting controversy over the authenticity of ancient pathogen DNA. This ambiguous view on ancient human DNA had a dichotomous root. On the one hand, the interest in ancient human DNA is great because such studies touch on the history and evolution of our own species. On the other hand, beca...

  8. Ancient bacteria show evidence of DNA repair

    DEFF Research Database (Denmark)

    Johnson, Sarah Stewart; Hebsgaard, Martin B; Christensen, Torben R;

    2007-01-01

    geological timescales. There has been no direct evidence in ancient microbes for the most likely mechanism, active DNA repair, or for the metabolic activity necessary to sustain it. In this paper, we couple PCR and enzymatic treatment of DNA with direct respiration measurements to investigate long...... this long-term survival is closely tied to cellular metabolic activity and DNA repair that over time proves to be superior to dormancy as a mechanism in sustaining bacteria viability.......-term survival of bacteria sealed in frozen conditions for up to one million years. Our results show evidence of bacterial survival in samples up to half a million years in age, making this the oldest independently authenticated DNA to date obtained from viable cells. Additionally, we find strong evidence that...

  9. Pitfalls in the analysis of ancient human mtDNA

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The retrieval of DNA from ancient human specimens is not always successful owing to DNA deterioration and contamination although it is vital to provide new insights into the genetic structure of ancient people and to reconstruct the past history. Normally, only short DNA fragments can be retrieved from the ancient specimens. How to identify the authenticity of DNA obtained and to uncover the information it contained are difficult. We employed the ancient mtDNAs reported from Central Asia (including Xinjiang, China) as an example to discern potentially extraneous DNA contamination based on the updated mtDNA phylogeny derived from mtDNA control region, coding region, as well as complete sequence information. Our results demonstrated that many mtDNAs reported are more or less problematic. Starting from a reliable mtDNA phylogeney and combining the available modern data into analysis, one can ascertain the authenticity of the ancient DNA, distinguish the potential errors in a data set, and efficiently decipher the meager information it harbored. The reappraisal of the mtDNAs with the age of more than 2000 years from Central Asia gave support to the suggestion of extensively (pre)historical gene admixture in this region.

  10. Ancient DNA in Greece. Problems and prospects

    International Nuclear Information System (INIS)

    The promise associated with early 'ancient DNA' results has not been translated into routine techniques of value to archaeologists. The reasons for this are partly technical - ancient DNA analysis is an extremely difficult technique - and partly practical - ancient DNA analysis is often an 'after thought' to an archaeological project. In this paper ancient human DNA analysis is briefly reviewed paying particular attention to specimens originating from Greek archaeological contexts. Problems commonly encountered during ancient DNA research are summarised and recommendations for future strategies in the application of ancient DNA in archaeology are proposed. (author)

  11. Ancient DNA from marine mammals

    DEFF Research Database (Denmark)

    Foote, Andrew David; Hofreiter, Michael; Morin, Philip A

    2012-01-01

    such as bone, tooth, baleen, skin, fur, whiskers and scrimshaw using ancient DNA (aDNA) approaches provide an oppor- tunity for investigating such changes over evolutionary and ecological timescales. Here, we review the application of aDNA techniques to the study of marine mammals. Most of the studies have...... focused on detecting changes in genetic diversity following periods of exploitation and environmental change. To date, these studies have shown that even small sample sizes can provide useful information on historical genetic diversity. Ancient DNA has also been used in investigations of changes...... in distribution and range of marine mammal species; we review these studies and discuss the limitations of such ‘presence only’ studies. Combining aDNA data with stable isotopes can provide further insights into changes in ecology and we review past studies and suggest future potential applications. We also...

  12. Ancient and modern environmental DNA

    DEFF Research Database (Denmark)

    Pedersen, Mikkel Winther; Overballe-Petersen, Søren; Ermini, Luca;

    2015-01-01

    DNA obtained from environmental samples such as sediments, ice or water (environmental DNA, eDNA), represents an important source of information on past and present biodiversity. It has revealed an ancient forest in Greenland, extended by several thousand years the survival dates for mainland...... woolly mammoth in Alaska, and pushed back the dates for spruce survival in Scandinavian ice-free refugia during the last glaciation. More recently, eDNA was used to uncover the past 50 000 years of vegetation history in the Arctic, revealing massive vegetation turnover at the Pleistocene....../Holocene transition, with implications for the extinction of megafauna. Furthermore, eDNA can reflect the biodiversity of extant flora and fauna, both qualitatively and quantitatively, allowing detection of rare species. As such, trace studies of plant and vertebrate DNA in the environment have revolutionized our...

  13. Analysis of Ancient DNA in Microbial Ecology.

    Science.gov (United States)

    Gorgé, Olivier; Bennett, E Andrew; Massilani, Diyendo; Daligault, Julien; Pruvost, Melanie; Geigl, Eva-Maria; Grange, Thierry

    2016-01-01

    The development of next-generation sequencing has led to a breakthrough in the analysis of ancient genomes, and the subsequent genomic analyses of the skeletal remains of ancient humans have revolutionized the knowledge of the evolution of our species, including the discovery of a new hominin, and demonstrated admixtures with more distantly related archaic populations such as Neandertals and Denisovans. Moreover, it has also yielded novel insights into the evolution of ancient pathogens. The analysis of ancient microbial genomes allows the study of their recent evolution, presently over the last several millennia. These spectacular results have been attained despite the degradation of DNA after the death of the host, which results in very short DNA molecules that become increasingly damaged, only low quantities of which remain. The low quantity of ancient DNA molecules renders their analysis difficult and prone to contamination with modern DNA molecules, in particular via contamination from the reagents used in DNA purification and downstream analysis steps. Finally, the rare ancient molecules are diluted in environmental DNA originating from the soil microorganisms that colonize bones and teeth. Thus, ancient skeletal remains can share DNA profiles with environmental samples and identifying ancient microbial genomes among the more recent, presently poorly characterized, environmental microbiome is particularly challenging. Here, we describe the methods developed and/or in use in our laboratory to produce reliable and reproducible paleogenomic results from ancient skeletal remains that can be used to identify the presence of ancient microbiota. PMID:26791510

  14. Damage and repair of ancient DNA

    DEFF Research Database (Denmark)

    Mitchell, David; Willerslev, Eske; Hansen, Anders

    2005-01-01

    Under certain conditions small amounts of DNA can survive for long periods of time and can be used as polymerase chain reaction (PCR) substrates for the study of phylogenetic relationships and population genetics of extinct plants and animals, including hominids. Because of extensive DNA...... degradation, these studies are limited to species that lived within the past 10(4)-10(5) years (Late Pleistocene), although DNA sequences from 10(6) years have been reported. Ancient DNA (aDNA) has been used to study phylogenetic relationships of protists, fungi, algae, plants, and higher eukaryotes such as...... early native Americans. Hence, ancient DNA contains information pertinent to numerous fields of study including evolution, population genetics, ecology, climatology, medicine, archeology, and behavior. The major obstacles to the study of aDNA are its extremely low yield, contamination with modern DNA...

  15. Fossil avian eggshell preserves ancient DNA

    DEFF Research Database (Denmark)

    Oskam, Charlotte L; Haile, James; McLay, Emma;

    2010-01-01

    Owing to exceptional biomolecule preservation, fossil avian eggshell has been used extensively in geochronology and palaeodietary studies. Here, we show, to our knowledge, for the first time that fossil eggshell is a previously unrecognized source of ancient DNA (aDNA). We describe the successful......, evidenced by retrieval of both mitochondrial and nuclear DNA from many of the samples. Using confocal microscopy and quantitative PCR, this study critically evaluates approaches to maximize DNA recovery from powdered eggshell. Our quantitative PCR experiments also demonstrate that moa eggshell has...

  16. Improving access to endogenous DNA in ancient bones and teeth

    OpenAIRE

    Damgaard, Peter B.; Ashot Margaryan; Hannes Schroeder; Ludovic Orlando; Eske Willerslev; Allentoft, Morten E.

    2015-01-01

    Poor DNA preservation is the most limiting factor in ancient genomic research. In the majority of ancient bones and teeth, endogenous DNA molecules represent a minor fraction of the whole DNA extract, rendering shot-gun sequencing inefficient for obtaining genomic data. Based on ancient human bone samples from temperate and tropical environments, we show that an EDTA-based enzymatic ‘pre-digestion’ of powdered bone increases the proportion of endogenous DNA several fold. By performing the pre...

  17. Mitochondrial DNA analysis of ancient Peruvian highlanders.

    Science.gov (United States)

    Shinoda, Ken-ichi; Adachi, Noboru; Guillen, Sonia; Shimada, Izumi

    2006-09-01

    Ancient DNA recovered from 57 individuals excavated by Hiram Bingham at the rural communities of Paucarcancha, Patallacta, and Huata near the famed Inca royal estate and ritual site of Machu Picchu was analyzed by polymerase chain reaction, and the results were compared with ancient and modern DNA from various Central Andean areas to test their hypothesized indigenous highland origins. The control and coding regions of the mitochondrial DNA (mtDNA) of 35 individuals in this group were sequenced, and the haplogroups of each individual were determined. The frequency data for the haplogroups of these samples show clear proximity to those of modern Quechua and Aymara populations in the Peruvian and Bolivian highlands, and contrast with those of pre-Hispanic individuals of the north coast of Peru that we defined previously. Our study suggests a strong genetic affinity between sampled late pre-Hispanic individuals and modern Andean highlanders. A previous analysis of the Machu Picchu osteological collection suggests that the residents there were a mixed group of natives from various coastal and highland regions relocated by the Inca state for varied purposes. Overall, our study indicates that the sampled individuals from Paucarcancha and Patallacta were indigenous highlanders who provided supportive roles for nearby Machu Picchu. PMID:16485299

  18. Characterization of ancient DNA supports long-term survival of Haloarchaea.

    Science.gov (United States)

    Sankaranarayanan, Krithivasan; Lowenstein, Tim K; Timofeeff, Michael N; Schubert, Brian A; Lum, J Koji

    2014-07-01

    Bacteria and archaea isolated from crystals of halite 10(4) to 10(8) years old suggest long-term survival of halophilic microorganisms, but the results are controversial. Independent verification of the authenticity of reputed living prokaryotes in ancient salt is required because of the high potential for environmental and laboratory contamination. Low success rates of prokaryote cultivation from ancient halite, however, hamper direct replication experiments. In such cases, culture-independent approaches that use the polymerase chain reaction (PCR) and sequencing of 16S ribosomal DNA are a robust alternative. Here, we use amplification, cloning, and sequencing of 16S ribosomal DNA to investigate the authenticity of halophilic archaea cultured from subsurface halite, Death Valley, California, 22,000 to 34,000 years old. We recovered 16S ribosomal DNA sequences that are identical, or nearly so (>99%), to two strains, Natronomonas DV462A and Halorubrum DV427, which were previously isolated from the same halite interval. These results provide the best independent support to date for the long-term survival of halophilic archaea in ancient halite. PCR-based approaches are sensitive to small amounts of DNA and could allow investigation of even older halites, 10(6) to 10(8) years old, from which microbial cultures have been reported. Such studies of microbial life in ancient salt are particularly important as we search for microbial signatures in similar deposits on Mars and elsewhere in the Solar System. PMID:24977469

  19. Using Ancient DNA to Understand Evolutionary and Ecological Processes

    DEFF Research Database (Denmark)

    Orlando, Ludovic Antoine Alexandre; Cooper, Alan

    2014-01-01

    Ancient DNA provides a unique means to record genetic change through time and directly observe evolutionary and ecological processes. Although mostly based on mitochondrial DNA, the increasing availability of genomic sequences is leading to unprecedented levels of resolution. Temporal studies of...... modern populations. Importantly, the complex series of events revealed by ancient DNA data is seldom reflected in current biogeographic patterns. DNA preserved in ancient sediments and coprolites has been used to characterize a range of paleoenvironments and reconstruct functional relationships in...... paleoecological systems. In the near future, genome-level surveys of ancient populations will play an increasingly important role in revealing, calibrating, and testing evolutionary processes....

  20. Mitochondrial DNA analysis of ancient Sampula population in Xinjiang

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The archaeological site of Sampula cemetery was located about 14 km to the southwest of the Luo County in Xinjiang Khotan, China, belonging to the ancient Yutian kingdom. 14C analysis showed that this cemetery was used from 217 B.C. to 283 A.D.Ancient DNA was analyzed by 364 bp of the mitochondrial DNA hypervariable region Ⅰ (mtDNA HVR-Ⅰ), and by six restriction fragment length polymorphism (RFLP) sites of mtDNA coding region. We successfully extracted and sequenced intact stretches of maternally inherited mtDNA from 13 out of 16 ancient Sampula samples. The analysis of mtDNA haplogroup distribution showed that the ancient Sampula was a complex population with both European and Asian characteristics. Median joining network of U3 sub-haplogroup and multi-dimensional scaling analysis all showed that the ancient Sampula had maternal relationship with Ossetian and Iranian.

  1. ACHIEVEMENTS AND PECULIARITIES IN STUDIES OF ANCIENT DNA AND DNA FROM COMPLICATED FORENSIC SPECIMENS

    OpenAIRE

    Grigorenko, A.; Borinskaya, S.; Yankovsky, N.; E. Rogaev

    2009-01-01

    Studies of ancient DNA specimens started 25 years ago. At that time short mitochondrial DNA (mtDNA) fragments were the main targets in ancient DNA studies. The last three years were especially productive in the development of new methods of DNA purification and analysis. Complete mtDNA molecules and relatively large fragments of nuclear DNA are the targets of ancient DNA studies today. Ancient DNA studies allowed us to study organisms that went extinct more than ten thousand years ago, to rec...

  2. Ancient bacteria in permafrost soils fact or artefact? Considerations in recovering microbial DNA from geological ancient settings

    Science.gov (United States)

    Willerslev, E.

    2003-04-01

    Several recent reports claim that prokaryotic genetic sequences or viable cultures can survive for millions of years in geological settings. If substantiated, these findings could fundamentally alter views about bacterial physiology, ecology and evolution. However, both the culturing of microbes and the amplification of ancient DNA molecules from fossil remains are beset with difficulties. First, theoretical and empirical studies have shown that small DNA fragments (100 200 bp) do not survive in the geosphere for more than 104 years in temperate environments and 105 years in colder ones due to hydrolytic and oxidative damage. Therefore, the revivals of dormant bacteria with no active DNA repair from remains hundreds of thousands to millions of years old is, from a theoretical point, expected to be difficult, if not impossible. Second, the no specificity of the media used to culture micro organisms, as well as the great sensitivity of PCR, makes the risk of contamination with contemporary ubiquitous microbial cells and exogenous DNA molecules extremely high. Contamination poses risks at all stages of sample processing (e.g.) within the samples themselves, in the chemical reagents, on laboratory disposables or through the air. The high risk of contamination strongly suggests the need for standardized procedures within the field such as independent replication of results. This criterion of authenticity has not yet been full field in any of the studies claiming million year old microbial cultures or DNA. In order to tests the long-term survival of ancient bacteria DNA a study on permafrost was conducted using ancient DNA precautions, controls and criteria. Permafrost must be considered among the most promising environments for long term DNA survival due to its constant low temperatures (-10C to 12C Siberian or 20C Antarctica) and high cell numbers (107). We found that bacteria DNA could reproducibly be obtained from samples dated up to 300-400,000 years B.P. but not

  3. Forensics: Food Authentication Using MtDNA

    OpenAIRE

    Chandrika Murugaiah

    2015-01-01

    There is a clear trend in the food international market towards labelling products with information about their composition and quality. Due to the increase in international trade in seafood and seafood products, authentication has become a necessity. There is a need for suitable methods of identification to ensure compliance with the labelling regulations and thereby to prevent the substitution of fish species.

  4. Forensics: Food Authentication Using MtDNA

    Directory of Open Access Journals (Sweden)

    Chandrika Murugaiah

    2015-10-01

    Full Text Available There is a clear trend in the food international market towards labelling products with information about their composition and quality. Due to the increase in international trade in seafood and seafood products, authentication has become a necessity. There is a need for suitable methods of identification to ensure compliance with the labelling regulations and thereby to prevent the substitution of fish species.

  5. Role of radiation physics in the study and authentication of ancient gold work

    International Nuclear Information System (INIS)

    Ancient gold items are important expressions of different aspects of past civilisations. By using non-destructive techniques of analysis and exam it is possible to obtain data kept within the objects morphology and within the materials employed, providing information, among others, on the manufacturing technologies, on the functions attributed to the objects, and on the sources of raw material exploited. This paper aims to give an overview of the questions raised by cultural heritage objects made with gold, and the role of science-based techniques applied to their study and authentication. Two examples serve to illustrate this: one concerns 19th century restorations of Etruscan objects and the other the provenance of Merovingian gold. - Highlights: ► An overview of the application of radiation techniques for the analysis of ancient gold work is given. ► We focused on non-destructive SEM-EDS, IBA techniques, X-radiography, and optical microscopy. ► Exam is illustrated by the authentication of Etruscan gold jewellery kept in museum collections. ► Fingerprinting gold is illustrated by the elemental analysis of Merovingian items from tombs in Gaul

  6. Ancestry of modern Europeans: contributions of ancient DNA.

    Science.gov (United States)

    Lacan, Marie; Keyser, Christine; Crubézy, Eric; Ludes, Bertrand

    2013-07-01

    Understanding the peopling history of Europe is crucial to comprehend the origins of modern populations. Of course, the analysis of current genetic data offers several explanations about human migration patterns which occurred on this continent, but it fails to explain precisely the impact of each demographic event. In this context, direct access to the DNA of ancient specimens allows the overcoming of recent demographic phenomena, which probably highly modified the constitution of the current European gene pool. In recent years, several DNA studies have been successfully conducted from ancient human remains thanks to the improvement of molecular techniques. They have brought new fundamental information on the peopling of Europe and allowed us to refine our understanding of European prehistory. In this review, we will detail all the ancient DNA studies performed to date on ancient European DNA from the Middle Paleolithic to the beginning of the protohistoric period. PMID:23052219

  7. Non-destructive sampling of ancient insect DNA

    DEFF Research Database (Denmark)

    Thomsen, Philip Francis; Elias, Scott; Gilbert, Tom;

    2009-01-01

    damage. We test the applicability of this protocol on historic museum beetle specimens dating back to AD 1820 and on ancient beetle chitin remains from permafrost (permanently frozen soil) dating back more than 47,000 years. Finally, we test the possibility of obtaining ancient insect DNA directly from...... non-frozen sediments deposited 3280-1800 years ago -- an alternative approach that also does not involve destruction of valuable material. METHODOLOGY/PRINCIPAL FINDINGS: The success of the methodological approaches are tested by PCR and sequencing of COI and 16S mitochondrial DNA (mtDNA) fragments of......-preserved insect fossil remains tested, where DNA was obtained from samples up to ca. 26,000 years old. The non-frozen sediment DNA approach appears to have great potential for recording the former presence of insect taxa not normally preserved as macrofossils and opens new frontiers in research on ancient...

  8. New insights on single-stranded versus double-stranded DNA library preparation for ancient DNA

    DEFF Research Database (Denmark)

    Wales, Nathan; Carøe, Christian; Sandoval-Velasco, Marcela;

    2015-01-01

    An innovative single-stranded DNA (ssDNA) library preparation method has sparked great interest among ancient DNA (aDNA) researchers, especially after reports of endogenous DNA content increases >20-fold in some samples. To investigate the behavior of this method, we generated ssDNA and...... conventional double-stranded DNA (dsDNA) libraries from 23 ancient and historic plant and animal specimens. We found ssDNA library preparation substantially increased endogenous content when dsDNA libraries contained...

  9. Using ancient DNA to study the origins and dispersal of ancestral Polynesian chickens across the Pacific.

    Science.gov (United States)

    Thomson, Vicki A; Lebrasseur, Ophélie; Austin, Jeremy J; Hunt, Terry L; Burney, David A; Denham, Tim; Rawlence, Nicolas J; Wood, Jamie R; Gongora, Jaime; Girdland Flink, Linus; Linderholm, Anna; Dobney, Keith; Larson, Greger; Cooper, Alan

    2014-04-01

    The human colonization of Remote Oceania remains one of the great feats of exploration in history, proceeding east from Asia across the vast expanse of the Pacific Ocean. Human commensal and domesticated species were widely transported as part of this diaspora, possibly as far as South America. We sequenced mitochondrial control region DNA from 122 modern and 22 ancient chicken specimens from Polynesia and Island Southeast Asia and used these together with Bayesian modeling methods to examine the human dispersal of chickens across this area. We show that specific techniques are essential to remove contaminating modern DNA from experiments, which appear to have impacted previous studies of Pacific chickens. In contrast to previous reports, we find that all ancient specimens and a high proportion of the modern chickens possess a group of unique, closely related haplotypes found only in the Pacific. This group of haplotypes appears to represent the authentic founding mitochondrial DNA chicken lineages transported across the Pacific, and allows the early dispersal of chickens across Micronesia and Polynesia to be modeled. Importantly, chickens carrying this genetic signature persist on several Pacific islands at high frequencies, suggesting that the original Polynesian chicken lineages may still survive. No early South American chicken samples have been detected with the diagnostic Polynesian mtDNA haplotypes, arguing against reports that chickens provide evidence of Polynesian contact with pre-European South America. Two modern specimens from the Philippines carry haplotypes similar to the ancient Pacific samples, providing clues about a potential homeland for the Polynesian chicken. PMID:24639505

  10. Evidence of authentic DNA from Danish Viking Age skeletons untouched by humans for 1,000 years.

    Directory of Open Access Journals (Sweden)

    Linea Melchior

    Full Text Available BACKGROUND: Given the relative abundance of modern human DNA and the inherent impossibility for incontestable proof of authenticity, results obtained on ancient human DNA have often been questioned. The widely accepted rules regarding ancient DNA work mainly affect laboratory procedures, however, pre-laboratory contamination occurring during excavation and archaeological-/anthropological handling of human remains as well as rapid degradation of authentic DNA after excavation are major obstacles. METHODOLOGY/PRINCIPAL FINDINGS: We avoided some of these obstacles by analyzing DNA from ten Viking Age subjects that at the time of sampling were untouched by humans for 1,000 years. We removed teeth from the subjects prior to handling by archaeologists and anthropologists using protective equipment. An additional tooth was removed after standard archaeological and anthropological handling. All pre-PCR work was carried out in a "clean- laboratory" dedicated solely to ancient DNA work. Mitochondrial DNA was extracted and overlapping fragments spanning the HVR-1 region as well as diagnostic sites in the coding region were PCR amplified, cloned and sequenced. Consistent results were obtained with the "unhandled" teeth and there was no indication of contamination, while the latter was the case with half of the "handled" teeth. The results allowed the unequivocal assignment of a specific haplotype to each of the subjects, all haplotypes being compatible in their character states with a phylogenetic tree drawn from present day European populations. Several of the haplotypes are either infrequent or have not been observed in modern Scandinavians. The observation of haplogroup I in the present study (<2% in modern Scandinavians supports our previous findings of a pronounced frequency of this haplogroup in Viking and Iron Age Danes. CONCLUSION: The present work provides further evidence that retrieval of ancient human DNA is a possible task provided adequate

  11. Pathogenic microbial ancient DNA: a problem or an opportunity?

    DEFF Research Database (Denmark)

    Willerslev, Eske; Cooper, Alan

    2006-01-01

    & Marota (1999) report that direct sequencing of ancient microbial DNA produced a sequence resembling (for example) Treponerma pallidum (the causative agent of venereal syphilis) even in the absence of real T. pallidum, simply due to the presence of diverse bacterial DNA in the experiment. In addition, the...

  12. Characterising the potential of sheep wool for ancient DNA analyses

    DEFF Research Database (Denmark)

    Brandt, Luise Ørsted; Tranekjer, Lena D.; Mannering, Ulla;

    2011-01-01

    content of DNA in hair shafts are known to vary, and it is possible that common treatments of wool such as dyeing may negatively impact the DNA. Using quantitative real-time polymerase chain reaction (PCR), we demonstrate that in general, short fragments of both mitochondrial and single-copy nuclear DNA......The use of wool derived from sheep (Ovis aries) hair shafts is widespread in ancient and historic textiles. Given that hair can represent a valuable source of ancient DNA, wool may represent a valuable genetic archive for studies on the domestication of the sheep. However, both the quality and...... can be PCR-amplified from wool derived from a variety of breeds, regardless of the body location or natural pigmentation. Furthermore, although DNA can be PCR-amplified from wool dyed with one of four common plant dyes (tansy, woad, madder, weld), the use of mordants such as alum or iron leads to...

  13. Statistical guidelines for detecting past population shifts using ancient DNA

    DEFF Research Database (Denmark)

    Mourier, Tobias; Ho, Simon; Gilbert, M Thomas P;

    2012-01-01

    Populations carry a genetic signal of their demographic past, providing an opportunity for investigating the processes that shaped their evolution. Our ability to infer population histories can be enhanced by including ancient DNA data. Using serial-coalescent simulations and a range of both...... quantitative and temporal sampling schemes, we test the power of ancient mitochondrial sequences and nuclear single-nucleotide polymorphisms (SNPs) to detect past population bottlenecks. Within our simulated framework, mitochondrial sequences have only limited power to detect subtle bottlenecks and/or fast...... results provide useful guidelines for scaling sampling schemes and for optimizing our ability to infer past population dynamics. In addition, our results suggest that many ancient DNA studies may face power issues in detecting moderate demographic collapses and/or highly dynamic demographic shifts when...

  14. Preamplification Procedure for the Analysis of Ancient DNA Samples

    OpenAIRE

    Stefania Del Gaudio; Alessandra Cirillo; Giovanni Di Bernardo; Umberto Galderisi; Theodoros Thanassoulas; Theodoros Pitsios; Marilena Cipollaro

    2013-01-01

    In ancient DNA studies the low amount of endogenous DNA represents a limiting factor that often hampers the result achievement. In this study we extracted the DNA from nine human skeletal remains of different ages found in the Byzantine cemetery of Abdera Halkidiki and in the medieval cemetery of St. Spiridion in Rhodes (Greece). Real-time quantitative polymerase chain reaction (qPCR) was used to detect in the extracts the presence of PCR inhibitors and to estimate the DNA content. As mitocho...

  15. Ancient DNA in historical parchments - identifying a procedure for extraction and amplification of genetic material.

    Science.gov (United States)

    Lech, T

    2016-01-01

    Historical parchments in the form of documents, manuscripts, books, or letters, make up a large portion of cultural heritage collections. Their priceless historical value is associated with not only their content, but also the information hidden in the DNA deposited on them. Analyses of ancient DNA (aDNA) retrieved from parchments can be used in various investigations, including, but not limited to, studying their authentication, tracing the development of the culture, diplomacy, and technology, as well as obtaining information on the usage and domestication of animals. This article proposes and verifies a procedure for aDNA recovery from historical parchments and its appropriate preparation for further analyses. This study involved experimental selection of an aDNA extraction method with the highest efficiency and quality of extracted genetic material, from among the multi-stage phenol-chloroform extraction methods, and the modern, column-based techniques that use selective DNA-binding membranes. Moreover, current techniques to amplify entire genetic material were questioned, and the possibility of using mitochondrial DNA for species identification was analyzed. The usefulness of the proposed procedure was successfully confirmed in identification tests of historical parchments dating back to the 13-16th century AD. PMID:27173330

  16. The first attested extraction of ancient DNA in legumes (Fabaceae

    Directory of Open Access Journals (Sweden)

    Aleksandar M. Mikić

    2015-11-01

    Full Text Available Ancient DNA (aDNA is any DNA extracted from ancient specimens, important for diverse evolutionary researches. The major obstacles in aDNA studies are mutations, contamination and fragmentation. Its studies may be crucial for crop history if integrated with human aDNA research and historical linguistics, both general and relating to agriculture. Legumes (Fabaceae are one of the richest end economically most important plant families, not only from Neolithic onwards, since they were used as food by Neanderthals and Paleolithic modern man. The idea of extracting and analysing legume aDNA was considered beneficial for both basic science and applied research, with an emphasis on genetic resources and plant breeding. The first reported successful and attested extraction of the legume aDNA was done from the sample of charred seeds of pea (Pisum sativum and bitter vetch (Vicia ervilia from Hissar, southeast Serbia, dated to 1,350 - 1,000 Before Christ. A modified version of cetyltrimethylammonium bromide (CTAB method and the commercial kit for DNA extraction QIAGEN DNAesy yielded several ng μl-1 of aDNA of both species and, after the whole genome amplification and with a fragment of nuclear ribosomal DNA gene 26S rDNA, resulted in the detection of the aDNA among the PCR products. A comparative analysis of four informative chloroplast DNA regions (trnSG, trnK, matK and rbcL among the modern wild and cultivated pea taxa demonstrated not only that the extracted aDNA was genuine, on the basis of mutation rate, but also that the ancient Hissar pea was most likely an early domesticated crop, related to the modern wild pea of a neighbouring region. It is anticipated that this premier extraction of legume aDNA may provide taxonomists with the answers to diverse questions, such as leaf development in legumes, as well as with novel data on the single steps in domesticating legume crops worldwide.

  17. Partial uracil–DNA–glycosylase treatment for screening of ancient DNA

    OpenAIRE

    Rohland, Nadin; Harney, Eadaoin; Mallick, Swapan; Nordenfelt, Susanne; Reich, David

    2015-01-01

    The challenge of sequencing ancient DNA has led to the development of specialized laboratory protocols that have focused on reducing contamination and maximizing the number of molecules that are extracted from ancient remains. Despite the fact that success in ancient DNA studies is typically obtained by screening many samples to identify a promising subset, ancient DNA protocols have not, in general, focused on reducing the time required to screen samples. We present an adaptation of a popula...

  18. Patterns of nucleotide misincorporations during enzymatic amplification and direct large-scale sequencing of ancient DNA

    OpenAIRE

    Stiller, M.; Green, R. E.; Ronan, M.; Simons, J F; Du, L; He, W.; Egholm, M; Rothberg, J. M.; Keates, S.G.; Ovodov, N. D.; Antipina, E. E.; Baryshnikov, G. F.; Kuzmin, Y.V.; Vasilevski, A. A.; Wuenschell, G. E.

    2006-01-01

    Whereas evolutionary inferences derived from present-day DNA sequences are by necessity indirect, ancient DNA sequences provide a direct view of past genetic variants. However, base lesions that accumulate in DNA over time may cause nucleotide misincorporations when ancient DNA sequences are replicated. By repeated amplifications of mitochondrial DNA sequences from a large number of ancient wolf remains, we show that C/G-to-T/A transitions are the predominant type of such misincorporations. U...

  19. Comparative study of ancient DNA extraction methods for archaeological plant remains

    OpenAIRE

    Moore, Jason Nicholas

    2011-01-01

    Despite the potential for plant ancient DNA (aDNA) to address important archaeological questions, there are significantly fewer studies of plant aDNA compared to human and animal aDNA, partially due to a lack of research on DNA extraction methods for ancient plant remains. The current study uses heat to degrade modern corn, pea, and squash seeds to simulate degraded DNA associated with archaeological macro-botanical remains. I then compare DNA recovery efficiencies of three common DNA extract...

  20. Ancient mtDNA sequences from the First Australians revisited.

    Science.gov (United States)

    Heupink, Tim H; Subramanian, Sankar; Wright, Joanne L; Endicott, Phillip; Westaway, Michael Carrington; Huynen, Leon; Parson, Walther; Millar, Craig D; Willerslev, Eske; Lambert, David M

    2016-06-21

    The publication in 2001 by Adcock et al. [Adcock GJ, et al. (2001) Proc Natl Acad Sci USA 98(2):537-542] in PNAS reported the recovery of short mtDNA sequences from ancient Australians, including the 42,000-y-old Mungo Man [Willandra Lakes Hominid (WLH3)]. This landmark study in human ancient DNA suggested that an early modern human mitochondrial lineage emerged in Asia and that the theory of modern human origins could no longer be considered solely through the lens of the "Out of Africa" model. To evaluate these claims, we used second generation DNA sequencing and capture methods as well as PCR-based and single-primer extension (SPEX) approaches to reexamine the same four Willandra Lakes and Kow Swamp 8 (KS8) remains studied in the work by Adcock et al. Two of the remains sampled contained no identifiable human DNA (WLH15 and WLH55), whereas the Mungo Man (WLH3) sample contained no Aboriginal Australian DNA. KS8 reveals human mitochondrial sequences that differ from the previously inferred sequence. Instead, we recover a total of five modern European contaminants from Mungo Man (WLH3). We show that the remaining sample (WLH4) contains ∼1.4% human DNA, from which we assembled two complete mitochondrial genomes. One of these was a previously unidentified Aboriginal Australian haplotype belonging to haplogroup S2 that we sequenced to a high coverage. The other was a contaminating modern European mitochondrial haplotype. Although none of the sequences that we recovered matched those reported by Adcock et al., except a contaminant, these findings show the feasibility of obtaining important information from ancient Aboriginal Australian remains. PMID:27274055

  1. New ancient DNA sequences suggest high genetic diversity for the woolly mammoth (Mammuthus primigenius )

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Partial DNA sequences of cytochrome b gene (mtDNA) were successfully retrieved from Late Pleistocene fossil bone of Mammuthus primigenius collected from the Xiguitu County (Yakeshi), Inner Mongolia Autonomous Region and from Zhaodong, Harbin of Heilongjiang Province in northern China. Two ancient DNA fragments ( 109 bp and 124 bp) were authenticated by reproducible experiments in two different laboratories and by phylogenetic analysis with other Elephantidae taxa. Phylogenetic analysis using these sequences and published data in either separate or combined datasets indicate unstable relationship among the woolly mammoth and the two living elephants, Elephas and Loxodonta. In addition to the short sequences used to attempt the long independent evolution of Elephantidae terminal taxa, we suggest that a high intra-specific diversity existed in Mammuthus primigenius crossing both spatial and temporal ranges, resulting in a complex and divergent genetic background for DNA sequences so far recovered. The high genetic diversity in the extinct woolly mammoth can explain the apparent instability of Elephantidae taxa on the molecular phylogenetic trees and can reconcile the apparent paradox regarding the unresolved Elephantidae trichotomy.

  2. Application and comparison of large-scale solution-based DNA capture-enrichment methods on ancient DNA

    OpenAIRE

    Ávila-Arcos, María C.; Enrico Cappellini; J. Alberto Romero-Navarro; Nathan Wales; J. Víctor Moreno-Mayar; Morten Rasmussen; Fordyce, Sarah L.; Rafael Montiel; Jean-Philippe Vielle-Calzada; Eske Willerslev; Gilbert, M. Thomas P.

    2011-01-01

    The development of second-generation sequencing technologies has greatly benefitted the field of ancient DNA (aDNA). Its application can be further exploited by the use of targeted capture-enrichment methods to overcome restrictions posed by low endogenous and contaminating DNA in ancient samples. We tested the performance of Agilent's SureSelect and Mycroarray's MySelect in-solution capture systems on Illumina sequencing libraries built from ancient maize to identify key factors influencing ...

  3. Ethanol re-precipitation removes PCR inhibitors from Ancient DNA extract

    OpenAIRE

    Godi Sudhakar; Deepankar Pratap Singh; Rajeev Kumar Pandey; Vadlamudi Raghavendra Rao

    2011-01-01

    One of the major problems in ancient DNA work is the presence of inhibitory substances, which hampers Taq polymerase activity. Therefore analysis of ancient DNA sample is very challenging. Here we describe a simple and competent ethanol re-precipitation based protocol for the purification of DNA from ancient bones and tissues. The efficiency of this procedure has been demonstrated on 600 years old biological samples provided by Anthropological Survey of India (Himalaya region). This suggests ...

  4. Blocking human contaminant DNA during PCR allows amplification of rare mammal species from sedimentary ancient DNA

    DEFF Research Database (Denmark)

    Boessenkool, Sanne; Epp, Laura S.; Haile, James Seymour;

    2012-01-01

    bias, during the PCR. In this study, we test the utility of human-specific blocking primers in mammal diversity analyses of ancient permafrost samples from Siberia. Using quantitative PCR (qPCR) on human and mammoth DNA, we first optimized the design and concentration of blocking primer in the PCR......Analyses of degraded DNA are typically hampered by contamination, especially when employing universal primers such as commonly used in environmental DNA studies. In addition to false-positive results, the amplification of contaminant DNA may cause false-negative results because of competition, or....... Subsequently, 454 pyrosequencing of ancient permafrost samples amplified with and without the addition of blocking primer revealed that DNA sequences from a diversity of mammalian representatives of the Beringian megafauna were retrieved only when the blocking primer was added to the PCR. Notably, we observe...

  5. Ethanol re-precipitation removes PCR inhibitors from Ancient DNA extract

    Directory of Open Access Journals (Sweden)

    Godi Sudhakar

    2011-12-01

    Full Text Available One of the major problems in ancient DNA work is the presence of inhibitory substances, which hampers Taq polymerase activity. Therefore analysis of ancient DNA sample is very challenging. Here we describe a simple and competent ethanol re-precipitation based protocol for the purification of DNA from ancient bones and tissues. The efficiency of this procedure has been demonstrated on 600 years old biological samples provided by Anthropological Survey of India (Himalaya region. This suggests that re-precipitation of ancient DNA extracts removes PCR inhibitors and increases the success rate of amplification.

  6. Assessing the fidelity of ancient DNA sequences amplified from nuclear genes

    DEFF Research Database (Denmark)

    Binladen, Jonas; Wiuf, Carsten Henrik; Gilbert, M. Thomas P.;

    2006-01-01

    To date, the field of ancient DNA has relied almost exclusively on mitochondrial DNA (mtDNA) sequences. However, a number of recent studies have reported the successful recovery of ancient nuclear DNA (nuDNA) sequences, thereby allowing the characterization of genetic loci directly involved in...... phenotypic traits of extinct taxa. It is well documented that postmortem damage in ancient mtDNA can lead to the generation of artifactual sequences. However, as yet no one has thoroughly investigated the damage spectrum in ancient nuDNA. By comparing clone sequences from 23 fossil specimens, recovered from...... environments ranging from permafrost to desert, we demonstrate the presence of miscoding lesion damage in both the mtDNA and nuDNA, resulting in insertion of erroneous bases during amplification. Interestingly, no significant differences in the frequency of miscoding lesion damage are recorded between mtDNA...

  7. Characterization of Ancient DNA Supports Long-Term Survival of Haloarchaea

    OpenAIRE

    Sankaranarayanan, Krithivasan; Lowenstein, Tim K.; Timofeeff, Michael N.; Schubert, Brian A.; Lum, J. Koji

    2014-01-01

    Bacteria and archaea isolated from crystals of halite 104 to 108 years old suggest long-term survival of halophilic microorganisms, but the results are controversial. Independent verification of the authenticity of reputed living prokaryotes in ancient salt is required because of the high potential for environmental and laboratory contamination. Low success rates of prokaryote cultivation from ancient halite, however, hamper direct replication experiments. In such cases, culture-independent a...

  8. Removal of deaminated cytosines and detection of in vivo methylation in ancient DNA

    OpenAIRE

    Briggs, A; Stenzel, U.; Meyer, M; Krause, J.; Kircher, M. (Manfred); Pääbo, S

    2010-01-01

    DNA sequences determined from ancient organisms have high error rates, primarily due to uracil bases created by cytosine deamination. We use synthetic oligonucleotides, as well as DNA extracted from mammoth and Neandertal remains, to show that treatment with uracil–DNA–glycosylase and endonuclease VIII removes uracil residues from ancient DNA and repairs most of the resulting abasic sites, leaving undamaged parts of the DNA fragments intact. Neandertal DNA sequences determined with this proto...

  9. Conservation archaeogenomics: ancient DNA and biodiversity in the Anthropocene.

    Science.gov (United States)

    Hofman, Courtney A; Rick, Torben C; Fleischer, Robert C; Maldonado, Jesús E

    2015-09-01

    There is growing consensus that we have entered the Anthropocene, a geologic epoch characterized by human domination of the ecosystems of the Earth. With the future uncertain, we are faced with understanding how global biodiversity will respond to anthropogenic perturbations. The archaeological record provides perspective on human-environment relations through time and across space. Ancient DNA (aDNA) analyses of plant and animal remains from archaeological sites are particularly useful for understanding past human-environment interactions, which can help guide conservation decisions during the environmental changes of the Anthropocene. Here, we define the emerging field of conservation archaeogenomics, which integrates archaeological and genomic data to generate baselines or benchmarks for scientists, managers, and policy-makers by evaluating climatic and human impacts on past, present, and future biodiversity. PMID:26169594

  10. Mitochondrial DNA sequences in ancient Australians: Implications for modern human origins

    OpenAIRE

    Adcock, Gregory J; Dennis, Elizabeth S; Easteal, Simon; Huttley, Gavin A; Jermiin, Lars S.; Peacock, W. James; Thorne, Alan

    2001-01-01

    DNA from ancient human remains provides perspectives on the origin of our species and the relationship between molecular and morphological variation. We report analysis of mtDNA from the remains of 10 ancient Australians. These include the morphologically gracile Lake Mungo 3 [≈60 thousand years (ka) before present] and three other gracile individuals from Holocene deposits at Willandra Lakes (

  11. Genotyping human ancient mtDNA control and coding region polymorphisms with a multiplexed Single-Base-Extension assay: the singular maternal history of the Tyrolean Iceman

    Directory of Open Access Journals (Sweden)

    Egarter-Vigl Eduard

    2009-06-01

    Full Text Available Abstract Background Progress in the field of human ancient DNA studies has been severely restricted due to the myriad sources of potential contamination, and because of the pronounced difficulty in identifying authentic results. Improving the robustness of human aDNA results is a necessary pre-requisite to vigorously testing hypotheses about human evolution in Europe, including possible admixture with Neanderthals. This study approaches the problem of distinguishing between authentic and contaminating sequences from common European mtDNA haplogroups by applying a multiplexed Single-Base-Extension assay, containing both control and coding region sites, to DNA extracted from the Tyrolean Iceman. Results The multiplex assay developed for this study was able to confirm that the Iceman's mtDNA belongs to a new European mtDNA clade with a very limited distribution amongst modern data sets. Controlled contamination experiments show that the correct results are returned by the multiplex assay even in the presence of substantial amounts of exogenous DNA. The overall level of discrimination achieved by targeting both control and coding region polymorphisms in a single reaction provides a methodology capable of dealing with most cases of homoplasy prevalent in European haplogroups. Conclusion The new genotyping results for the Iceman confirm the extreme fallibility of human aDNA studies in general, even when authenticated by independent replication. The sensitivity and accuracy of the multiplex Single-Base-Extension methodology forms part of an emerging suite of alternative techniques for the accurate retrieval of ancient DNA sequences from both anatomically modern humans and Neanderthals. The contamination of laboratories remains a pressing concern in aDNA studies, both in the pre and post-PCR environments, and the adoption of a forensic style assessment of a priori risks would significantly improve the credibility of results.

  12. Ancient DNA reveals male diffusion through the Neolithic Mediterranean route.

    Science.gov (United States)

    Lacan, Marie; Keyser, Christine; Ricaut, François-Xavier; Brucato, Nicolas; Duranthon, Francis; Guilaine, Jean; Crubézy, Eric; Ludes, Bertrand

    2011-06-14

    The Neolithic is a key period in the history of the European settlement. Although archaeological and present-day genetic data suggest several hypotheses regarding the human migration patterns at this period, validation of these hypotheses with the use of ancient genetic data has been limited. In this context, we studied DNA extracted from 53 individuals buried in a necropolis used by a French local community 5,000 y ago. The relatively good DNA preservation of the samples allowed us to obtain autosomal, Y-chromosomal, and/or mtDNA data for 29 of the 53 samples studied. From these datasets, we established close parental relationships within the necropolis and determined maternal and paternal lineages as well as the absence of an allele associated with lactase persistence, probably carried by Neolithic cultures of central Europe. Our study provides an integrative view of the genetic past in southern France at the end of the Neolithic period. Furthermore, the Y-haplotype lineages characterized and the study of their current repartition in European populations confirm a greater influence of the Mediterranean than the Central European route in the peopling of southern Europe during the Neolithic transition. PMID:21628562

  13. Application and comparison of large-scale solution-based DNA capture-enrichment methods on ancient DNA

    DEFF Research Database (Denmark)

    Avila Arcos, Maria del Carmen; Cappellini, Enrico; Romero-Navarro, J Alberto;

    2011-01-01

    . We tested the performance of Agilent's SureSelect and Mycroarray's MySelect in-solution capture systems on Illumina sequencing libraries built from ancient maize to identify key factors influencing aDNA capture experiments. High levels of clonality as well as the presence of multiple-copy sequences......The development of second-generation sequencing technologies has greatly benefitted the field of ancient DNA (aDNA). Its application can be further exploited by the use of targeted capture-enrichment methods to overcome restrictions posed by low endogenous and contaminating DNA in ancient samples...... plausibility of capturing aDNA from ancient plant material, our results also enable us to provide useful recommendations for those planning targeted-sequencing on aDNA....

  14. Is amino acid racemization a useful tool for screening for ancient DNA in bone?

    OpenAIRE

    Collins, Matthew J.; Penkman, Kirsty E. H.; Rohland, Nadin; Shapiro, Beth; Dobberstein, Reimer C.; Ritz-Timme, Stefanie; Hofreiter, Michael

    2009-01-01

    Many rare and valuable ancient specimens now carry the scars of ancient DNA research, as questions of population genetics and phylogeography require larger sample sets. This fuels the demand for reliable techniques to screen for DNA preservation prior to destructive sampling. Only one such technique has been widely adopted: the extent of aspartic acid racemization (AAR). The kinetics of AAR are believed to be similar to the rate of DNA depurination and therefore a good measure of the likeliho...

  15. Patent applications for using DNA technologies to authenticate medicinal herbal material

    Directory of Open Access Journals (Sweden)

    Chan Albert

    2009-11-01

    Full Text Available Abstract Herbal medicines are used in many countries for maintaining health and treating diseases. Their efficacy depends on the use of the correct materials, and life-threatening poisoning may occur if toxic adulterants or substitutes are administered instead. Identification of a medicinal material at the DNA level provides an objective and powerful tool for quality control. Extraction of high-quality DNA is the first crucial step in DNA authentication, followed by a battery of DNA techniques including whole genome fingerprinting, DNA sequencing and DNA microarray to establish the identity of the material. New or improved technologies have been developed and valuable data have been collected and compiled for DNA authentication. Some of these technologies and data are patentable. This article provides an overview of some recent patents that cover the extraction of DNA from medicinal materials, the amplification of DNA using improved reaction conditions, the generation of DNA sequences and fingerprints, and the development of high-throughput authentication methods. It also briefly explains why these patents have been granted.

  16. Human evolution in Siberia: from frozen bodies to ancient DNA

    Directory of Open Access Journals (Sweden)

    Bouakaze Caroline

    2010-01-01

    Full Text Available Abstract Background The Yakuts contrast strikingly with other populations from Siberia due to their cattle- and horse-breeding economy as well as their Turkic language. On the basis of ethnological and linguistic criteria as well as population genetic studies, it has been assumed that they originated from South Siberian populations. However, many questions regarding the origins of this intriguing population still need to be clarified (e.g. the precise origin of paternal lineages and the admixture rate with indigenous populations. This study attempts to better understand the origins of the Yakuts by performing genetic analyses on 58 mummified frozen bodies dated from the 15th to the 19th century, excavated from Yakutia (Eastern Siberia. Results High quality data were obtained for the autosomal STRs, Y-chromosomal STRs and SNPs and mtDNA due to exceptional sample preservation. A comparison with the same markers on seven museum specimens excavated 3 to 15 years ago showed significant differences in DNA quantity and quality. Direct access to ancient genetic data from these molecular markers combined with the archaeological evidence, demographical studies and comparisons with 166 contemporary individuals from the same location as the frozen bodies helped us to clarify the microevolution of this intriguing population. Conclusion We were able to trace the origins of the male lineages to a small group of horse-riders from the Cis-Baïkal area. Furthermore, mtDNA data showed that intermarriages between the first settlers with Evenks women led to the establishment of genetic characteristics during the 15th century that are still observed today.

  17. Usefulness of microchip electrophoresis for the analysis of mitochondrial DNA in forensic and ancient DNA studies.

    Science.gov (United States)

    Alonso, Antonio; Albarran, Cristina; Martín, Pablo; García, Pilar; Capilla, Javier; García, Oscar; de la Rua, Concepción; Izaguirre, Neskuts; Pereira, Filipe; Pereira, Luisa; Amorim, António; Sancho, Manuel

    2006-12-01

    We evaluate the usefulness of a commercially available microchip CE (MCE) device in different genetic identification studies performed with mitochondrial DNA (mtDNA) targets, including the haplotype analysis of HVR1 and HVR2 and the study of interspecies diversity of cytochrome b (Cyt b) and 16S ribosomal RNA (16S rRNA) mitochondrial genes in forensic and ancient DNA samples. The MCE commercial system tested in this study proved to be a fast and sensitive detection method of length heteroplasmy in cytosine stretches produced by 16 189T>C transitions in HVR1 and by 309.1 and 309.2 C-insertions in HVR2. Moreover, the quantitative analysis of PCR amplicons performed by LIF allowed normalizing the amplicon input in the sequencing reactions, improving the overall quality of sequence data. These quantitative data in combination with the quantification of genomic mtDNA by real-time PCR has been successfully used to evaluate the PCR efficiency and detection limit of full sequencing methods of different mtDNA targets. The quantification of amplicons also provided a method for the rapid evaluation of PCR efficiency of multiplex-PCR versus singleplex-PCR to amplify short HV1 amplicons (around 100 bp) from severely degraded ancient DNA samples. The combination of human-specific (Cyt b) and universal (16S rRNA) mtDNA primer sets in a single PCR reaction followed by MCE detection offers a very rapid and simple screening test to differentiate between human and nonhuman hair forensic samples. This method was also very efficient with degraded DNA templates from forensic hair and bone samples, because of its applicability to detect small amplicon sizes. Future possibilities of MCE in forensic DNA typing, including nuclear STRs and SNP profiling are suggested. PMID:17120261

  18. mapDamage: testing for damage patterns in ancient DNA sequences

    DEFF Research Database (Denmark)

    Ginolhac, Aurelien; Rasmussen, Morten; Gilbert, M Thomas P;

    2011-01-01

    Ancient DNA extracts consist of a mixture of contaminant DNA molecules, most often originating from environmental microbes, and endogenous fragments exhibiting substantial levels of DNA damage. The latter introduce specific nucleotide misincorporations and DNA fragmentation signatures in sequencing...... embedded R script in order to detect typical patterns of genuine ancient DNA sequences. Availability and implementation: The Perl script mapDamage is freely available with documentation and example files at http://geogenetics.ku.dk/all_literature/mapdamage/. The script requires prior installation of the...

  19. Crosslinks rather than strand breaks determine access to ancient DNA sequences from frozen sediments

    DEFF Research Database (Denmark)

    Hansen, Anders Johannes; Mitchell, D.L.; Wiuf, C.; Panikert, L.; Brand, Tina Blumensaadt; Binladen, Jonas Khalid Mohamed Awad; Gilichensky, D.A.; Rønn, Regin; Willerslev, Eske

    2006-01-01

    freely exposed sugar, phosphate, and hydroxyl groups. Intriguingly, interstrand crosslinks were found to accumulate about hundred times faster than single stranded breaks, suggesting that crosslinking rather than depurination is the primary limiting factor for ancient DNA amplification under frozen...

  20. DNA FROM ANCIENT STONE TOOLS AND BONES EXCAVATED AT BUGAS-HOLDING, WYOMING

    Science.gov (United States)

    Traces of DNA may preserve on ancient stone tools. We examined 24 chipped stone artifacts recovered from the Bugas-Holding site in northwestern Wyoming for the presence of DNA residues, and we compared DNA preservation in bones and stone tools from the same stratigraphic context...

  1. Recharacterization of ancient DNA miscoding lesions: insights in the era of sequencing-by-synthesis

    DEFF Research Database (Denmark)

    Gilbert, M Thomas P; Binladen, Jonas; Miller, Webb; Wiuf, Carsten; Willerslev, Eske; Poinar, Hendrik; Carlson, John E; Leebens-Mack, James H; Schuster, Stephan C

    2007-01-01

    Although ancient DNA (aDNA) miscoding lesions have been studied since the earliest days of the field, their nature remains a source of debate. A variety of conflicting hypotheses exist about which miscoding lesions constitute true aDNA damage as opposed to PCR polymerase amplification error. Furt...

  2. Ancient DNA analysis of human neolithic remains found in northeastern Siberia.

    Science.gov (United States)

    Ricaut, François-Xavier; Fedoseeva, A; Keyser-Tracqui, Christine; Crubézy, Eric; Ludes, Bertrand

    2005-04-01

    We successfully extracted DNA from a bone sample of a Neolithic skeleton (dated 3,600 +/- 60 years BP) excavated in northeastern Yakutia (east Siberia). Ancient DNA was analyzed by autosomal STRs (short tandem repeats) and by sequencing of the hypervariable region I (HV1) of the mitochondrial DNA (mtDNA) control region. The STR profile, the mitochondrial haplotype, and the haplogroup determined were compared with those of modern Eurasian and Native American populations. The results showed the affinity of this ancient skeleton with both east Siberian/Asian and Native American populations. PMID:15756672

  3. Comparing the performance of three ancient DNA extraction methods for high-throughput sequencing

    DEFF Research Database (Denmark)

    Gamba, Cristina; Hanghøj, Kristian Ebbesen; Gaunitz, Charleen;

    2016-01-01

    The DNA molecules that can be extracted from archaeological and palaeontological remains are often degraded and massively contaminated with environmental microbial material. This reduces the efficacy of shotgun approaches for sequencing ancient genomes, despite the decreasing sequencing costs of...... high-throughput sequencing (HTS). Improving the recovery of endogenous molecules from the DNA extraction and purification steps could, thus, help advance the characterization of ancient genomes. Here, we apply the three most commonly used DNA extraction methods to five ancient bone samples spanning a...... ~30 thousand year temporal range and originating from a diversity of environments, from South America to Alaska. We show that methods based on the purification of DNA fragments using silica columns are more advantageous than in solution methods and increase not only the total amount of DNA molecules...

  4. Paleoparasitological report on Ascaris aDNA from an ancient East Asian sample

    Directory of Open Access Journals (Sweden)

    Chang Seok Oh

    2010-03-01

    Full Text Available In this study, Ascaris DNA was extracted and sequenced from a medieval archaeological sample in Korea. While Ascaris eggs were confirmed to be of human origin by archaeological evidence, it was not possible to pinpoint the exact species due to close genetic relationships among them. Despite this shortcoming, this is the first Ascaris ancient DNA (aDNA report from a medieval Asian country and thus will expand the scope of Ascaris aDNA research.

  5. Paleoparasitological report on Ascaris aDNA from an ancient East Asian sample

    OpenAIRE

    Chang Seok Oh; Min Seo; Nam Jin Lim; Sang Jun Lee; Eun-Joo Lee; Soong Deok Lee; Dong Hoon Shin

    2010-01-01

    In this study, Ascaris DNA was extracted and sequenced from a medieval archaeological sample in Korea. While Ascaris eggs were confirmed to be of human origin by archaeological evidence, it was not possible to pinpoint the exact species due to close genetic relationships among them. Despite this shortcoming, this is the first Ascaris ancient DNA (aDNA) report from a medieval Asian country and thus will expand the scope of Ascaris aDNA research.

  6. Temporal patterns of nucleotide misincorporations and DNA fragmentation in ancient DNA.

    Directory of Open Access Journals (Sweden)

    Susanna Sawyer

    Full Text Available DNA that survives in museum specimens, bones and other tissues recovered by archaeologists is invariably fragmented and chemically modified. The extent to which such modifications accumulate over time is largely unknown but could potentially be used to differentiate between endogenous old DNA and present-day DNA contaminating specimens and experiments. Here we examine mitochondrial DNA sequences from tissue remains that vary in age between 18 and 60,000 years with respect to three molecular features: fragment length, base composition at strand breaks, and apparent C to T substitutions. We find that fragment length does not decrease consistently over time and that strand breaks occur preferentially before purine residues by what may be at least two different molecular mechanisms that are not yet understood. In contrast, the frequency of apparent C to T substitutions towards the 5'-ends of molecules tends to increase over time. These nucleotide misincorporations are thus a useful tool to distinguish recent from ancient DNA sources in specimens that have not been subjected to unusual or harsh treatments.

  7. Ancient mitochondrial DNA and morphology elucidate an extinct island radiation of Indian Ocean giant tortoises (Cylindraspis).

    OpenAIRE

    Austin, J. J.; Arnold, E. N.

    2001-01-01

    Ancient mitochondrial DNA sequences were used for investigating the evolution of an entire clade of extinct vertebrates, the endemic tortoises (Cylindraspis) of the Mascarene Islands in the Indian Ocean. Mitochondrial DNA corroborates morphological evidence that there were five species of tortoise with the following relationships: Cylindraspis triserrata ((Cylindraspis vosmaeri and Cylindraspis peltastes) (Cylindraspis inepta and Cylindraspis indica)). Phylogeny indicates that the ancestor of...

  8. Optimization of the Phenol -Chloroform Silica DNA Extraction Method in Ancient Bones DNA Extraction

    Directory of Open Access Journals (Sweden)

    Morteza Sadeghi

    2014-04-01

    Full Text Available Introduction: DNA extraction from the ancient bones tissues is currently very difficult. Phenol chloroform silica method is one of the methods currently used for this aim. The purpose of this study was to optimize the assessment method. Methods: DNA of 62 bone tissues (average 3-11 years was first extracted with phenol chloroform silica methods and then with changing of some parameters of the methods the extracted DNA was amplified in eight polymorphisms area including FES, F13, D13S317, D16, D5S818, vWA and CD4. Results from samples gained by two methods were compared in acrylamide gel. Results: The average of PCR yield for new method and common method in eight polymorphism regions was 75%, 78%, 81%, 76%, 85%, 71%, 89%, 86% and 64%, 39%, 70%, 49%, 68%, 76%, 71% and 28% respectively. The average of DNA in optimized (in 35l silica density and common method were 267.5 µg/ml with 1.12 purity and 192.76 g/ml with 0.84 purity respectively. Conclusions: According to the findings of this study, it is estimated that longer EDTA attendance is an efficient agent in removing calcium and also adequate density of silica particles can be efficient in removal of PCR inhibitors.

  9. DNA Barcode Authentication of Saw Palmetto Herbal Dietary Supplements

    OpenAIRE

    Little, Damon P.; Jeanson, Marc L.

    2013-01-01

    Herbal dietary supplements made from saw palmetto (Serenoa repens; Arecaceae) fruit are commonly consumed to ameliorate benign prostate hyperplasia. A novel DNA mini–barcode assay to accurately identify [specificity = 1.00 (95% confidence interval = 0.74–1.00); sensitivity = 1.00 (95% confidence interval = 0.66–1.00); n = 31] saw palmetto dietary supplements was designed from a DNA barcode reference library created for this purpose. The mini–barcodes were used to estimate the frequency of mis...

  10. Analysis of ancient DNA from coprolites: a perspective with random amplified polymorphic DNA-polymerase chain reaction approach

    OpenAIRE

    Iñiguez Alena M; Araújo Adauto; Ferreira Luiz Fernando; Vicente Ana Carolina P

    2003-01-01

    The aim of this work was to determine approaches that would improve the quality of ancient DNA (aDNA) present in coprolites to enhance the possibility of success in retrieving specific sequence targets. We worked with coprolites from South American archaeological sites in Brazil and Chile dating up to 7,000 years ago. Using established protocols for aDNA extraction we obtained samples showing high degradation as usually happens with this kind of material. The reconstructive polymerization pre...

  11. Analysis of ancient DNA from a prehistoric Amerindian cemetery.

    OpenAIRE

    Stone, A C; Stoneking, M.

    1999-01-01

    The Norris Farms No. 36 cemetery in central Illinois has been the subject of considerable archaeological and genetic research. Both mitochondrial DNA (mtDNA) and nuclear DNA have been examined in this 700-year-old population. DNA preservation at the site was good, with about 70% of the samples producing mtDNA results and approximately 15% yielding nuclear DNA data. All four of the major Amerindian mtDNA haplogroups were found, in addition to a fifth haplogroup. Sequences of the first hypervar...

  12. Application of Ancient DNA Methods to the Study of the Transatlantic Slave Trade

    DEFF Research Database (Denmark)

    Sandoval Velasco, Marcela

    preservation, degradation and contamination, ancient DNA research presents significant limitations and challenges. Until recently, it was thought that DNA did not survive more than few hundred thousand years, and that it was impossible to retrieve whole genome data from ancient samples preserved under...... extractions, sequencing library preparations, and whole-genome capture enrichment methods, with the goal of retrieving ancient genome wide data from poorly preserved archaeological remains. Such data contributes to the study of the transatlantic slave trade, in particular helping shed light upon the origins...... and diversity of enslaved Africans. Ultimately this will help answer long-standing historical questions and broaden our understanding of the dynamics of this contested part of human history.English summary As one of a limited number of biomolecules recording evolutionary events, DNA provides an...

  13. DNA Barcoding of Catfish: Species Authentication and Phylogenetic Assessment

    OpenAIRE

    Wong, Li Lian; Peatman, Eric; Lu, Jianguo; Kucuktas, Huseyin; He, Shunping; Zhou, Chuanjiang; Na-Nakorn, Uthairat; Liu, Zhanjiang

    2011-01-01

    As the global market for fisheries and aquaculture products expands, mislabeling of these products has become a growing concern in the food safety arena. Molecular species identification techniques hold the potential for rapid, accurate assessment of proper labeling. Here we developed and evaluated DNA barcodes for use in differentiating United States domestic and imported catfish species. First, we sequenced 651 base-pair barcodes from the cytochrome oxidase I (COI) gene from individuals of ...

  14. DNA Barcode Authentication of Saw Palmetto Herbal Dietary Supplements

    Science.gov (United States)

    Little, Damon P.; Jeanson, Marc L.

    2013-01-01

    Herbal dietary supplements made from saw palmetto (Serenoa repens; Arecaceae) fruit are commonly consumed to ameliorate benign prostate hyperplasia. A novel DNA mini–barcode assay to accurately identify [specificity = 1.00 (95% confidence interval = 0.74–1.00); sensitivity = 1.00 (95% confidence interval = 0.66–1.00); n = 31] saw palmetto dietary supplements was designed from a DNA barcode reference library created for this purpose. The mini–barcodes were used to estimate the frequency of mislabeled saw palmetto herbal dietary supplements on the market in the United States of America. Of the 37 supplements examined, amplifiable DNA could be extracted from 34 (92%). Mini–barcode analysis of these supplements demonstrated that 29 (85%) contain saw palmetto and that 2 (6%) supplements contain related species that cannot be legally sold as herbal dietary supplements in the United States of America. The identity of 3 (9%) supplements could not be conclusively determined. PMID:24343362

  15. Enterobius vermicularis: ancient DNA from north and south American human coprolites

    Directory of Open Access Journals (Sweden)

    Iñiguez Alena M

    2003-01-01

    Full Text Available A molecular paleoparasitological diagnostic approach was developed for Enterobius vermicularis. Ancient DNA was extracted from 27 coprolites from archaeological sites in Chile and USA. Enzymatic amplification of human mtDNA sequences confirmed the human origin. We designed primers specific to the E. vermicularis 5S ribosomal RNA spacer region and they allowed reproducible polymerase chain reaction identification of ancient material. We suggested that the paleoparasitological microscopic identification could accompany molecular diagnosis, which also opens the possibility of sequence analysis to understand parasite-host evolution.

  16. Studies on the authentication of DNA evidence%论DNA证据的鉴真

    Institute of Scientific and Technical Information of China (English)

    王志刚

    2015-01-01

    DNA证据不具有独特的自然特征与标记,其从物证形态被提取到以鉴定意见形态应用于法庭要经历多环节的流转过程,这使得DNA证据易于被替换且性状也容易发生变化。从实践情况来看,DNA证据被赋予较强证明力,而准确运用DNA证据认定案件事实的前提在于DNA证据的真实性,因此,有必要对其进行鉴真。通过鉴真,可保障DNA证据在诉讼中的合法准入、确保事实认定的准确性以及防止证据替换或毁损。DNA证据鉴真的重点应放在提取过程的可回溯性、证据保管链的完整性和鉴定过程的可靠性三个方面。%DNA evidence has no natural features and unique marks, from the form of material evidence to be extracted and applied in courtroom as part of forensic examination opinion, it would experience multiple parts of a transfer process, which makes the DNA evidence easy to be replaced and its characters subject to change. From a practical point of view, DNA evidence has been given relatively strong probative value, and accurately using DNA evidence to identify the premise of facts of the case lies in the authenticity of DNA evidence, so it is necessary to do DNA evidence authentication. Through authentication, it can guarantee legitimate admissibility of DNA evidence in litigation while ensure the accuracy of fact-ifnding and prevent replacement or destroying evidence. The focus of DNA evidence authentication should be allocated in three aspects: a traceable extraction process, integrity in the chain of custody and a reliable identiifcation process.

  17. Pros and cons of methylation-based enrichment methods for ancient DNA

    DEFF Research Database (Denmark)

    Seguin-Orlando, Andaine; Gamba, Cristina; Der Sarkissian, Clio; Ermini, Luca; Louvel, Guillaume; Boulygina, Eugenia; Sokolov, Alexey; Nedoluzhko, Artem; Lorenzen, Eline; Lopez, Patricio; McDonald, H. Gregory; Scott, Eric; Tikhonov, Alexei; Stafford jr., Thomas; Alfarhan, Ahmed H.; Alquraishi, Saleh A.; Al-Rasheid, Khaled A. S.; Shapiro, Beth; Willerslev, Eske; Prokhortchouk, Egor; Orlando, Ludovic Antoine Alexandre

    2015-01-01

    The recent discovery that DNA methylation survives in fossil material provides an opportunity for novel molecular approaches in palaeogenomics. Here, we apply to ancient DNA extracts the probe-independent Methylated Binding Domains (MBD)-based enrichment method, which targets DNA molecules...... containing methylated CpGs. Using remains of a Palaeo-Eskimo Saqqaq individual, woolly mammoths, polar bears and two equine species, we confirm that DNA methylation survives in a variety of tissues, environmental contexts and over a large temporal range (4,000 to over 45,000 years before present). MBD...... enrichment, however, appears principally biased towards the recovery of CpG-rich and long DNA templates and is limited by the fast post-mortem cytosine deamination rates of methylated epialleles. This method, thus, appears only appropriate for the analysis of ancient methylomes from very well preserved...

  18. DNA in ancient bone - where is it located and how should we extract it?

    Science.gov (United States)

    Campos, Paula F; Craig, Oliver E; Turner-Walker, Gordon; Peacock, Elizabeth; Willerslev, Eske; Gilbert, M Thomas P

    2012-01-20

    Despite the widespread use of bones in ancient DNA (aDNA) studies, relatively little concrete information exists in regard to how the DNA in mineralised collagen degrades, or where it survives in the material's architecture. While, at the macrostructural level, physical exclusion of microbes and other external contaminants may be an important feature, and, at the ultrastructural level, the adsorption of DNA to hydroxyapatite and/or binding of DNA to Type I collagen may stabilise the DNA, the relative contribution of each, and what other factors may be relevant, are unclear. There is considerable variation in the quality of DNA retrieved from bones and teeth. This is in part due to various environmental factors such as temperature, proximity to free water or oxygen, pH, salt content, and exposure to radiation, all of which increase the rate of DNA decay. For example, bone specimens from sites at high latitudes usually yield better quality DNA than samples from temperate regions, which in turn yield better results than samples from tropical regions. However, this is not always the case, and rates of success of DNA recovery from apparently similar sites are often strikingly different. The question arises as to whether this may be due to post-collection preservation or just an artefact of the extraction methods used in these different studies? In an attempt to resolve these questions, we examine the efficacy of DNA extraction methods, and the quality and quantity of DNA recovered from both artificially degraded, and genuinely ancient, but well preserved, bones. In doing so we offer hypotheses relevant to the DNA degradation process itself, and to where and how the DNA is actually preserved in ancient bone. PMID:21855309

  19. Identification of ancient Olea europaea L. and Cornus mas L. seeds by DNA barcoding.

    Science.gov (United States)

    Gismondi, Angelo; Rolfo, Mario Federico; Leonardi, Donatella; Rickards, Olga; Canini, Antonella

    2012-07-01

    The analysis of ancient DNA (aDNA) provides archaeologists and anthropologists with innovative, scientific and accurate data to study and understand the past. In this work, ancient seeds, found in the "Mora Cavorso" archaeological site (Latium, Central Italy), were analyzed to increase information about Italian Neolithic populations (plant use, agriculture, diet, trades, customs and ecology). We performed morphological and genetic techniques to identify fossil botanical species. In particular, this study also suggests and emphasizes the use of DNA barcode method for ancient plant sample analysis. Scanning electron microscope (SEM) observations showed seed compact structure and irregular surface but they did not permit a precise nor empirical classification: so, a molecular approach was necessary. DNA was extracted from ancient seeds and then it was used, as template, for PCR amplifications of standardized barcode genes. Although aDNA could be highly degraded by the time, successful PCR products were obtained, sequenced and compared to nucleotide sequence databases. Positive outcomes (supported by morphological comparison with modern seeds, geographical distribution and historical data) indicated that seeds could be identified as belonging to two plant species: Olea europaea L. and Cornus mas L. PMID:22847014

  20. Natural transformation of bacteria by fragmented, damaged and ancient DNA

    DEFF Research Database (Denmark)

    Overballe-Petersen, Søren

    Organisms release DNA both when they live and die. Eventually the DNA disintegrates entirely or it is re-metabolized. There is a constant deposition and decomposition that maintains an environmental pool with large quantities of extracellular DNA, some of which can be thousands of years old. The...... which cells can acquire functional genetic signatures of the deeper past. Moreover, not only can old DNA revert microbes to past genotypes, but damaged DNA can also produce new variants of already functional sequences. Besides, DNA fragments carry potential to combine functional domains in new ways. The...... identified novel pathway of natural transformation represents a basal evolutionary process that only requires growing cells that feed on oligonucleotides; a process that possibly is a primeval type of horizontal gene transfer. In extension, our results also provide mechanistic support to hypotheses of...

  1. DNA in ancient bone - Where is it located and how should we extract it?

    DEFF Research Database (Denmark)

    Campos, Paula; Craig, Oliver E.; Turner-Walker, Gordon;

    2011-01-01

    . The question arises as to whether this may be due to post-collection preservation or just an artefact of the extraction methods used in these different studies? In an attempt to resolve these questions, we examine the efficacy of DNA extraction methods, and the quality and quantity of DNA recovered......Despite the widespread use of bones in ancient DNA (aDNA) studies, relatively little concrete information exists in regard to how the DNA in mineralised collagen degrades, or where it survives in the material's architecture. While, at the macrostructural level, physical exclusion of microbes and...... other external contaminants may be an important feature, and, at the ultrastructural level, the adsorption of DNA to hydroxyapatite and/or binding of DNA to Type I collagen may stabilise the DNA, the relative contribution of each, and what other factors may be relevant, are unclear. There is...

  2. The effect of ancient DNA damage on inferences of demographic histories

    DEFF Research Database (Denmark)

    Axelsson, Erik; Willerslev, Eske; Gilbert, Marcus Thomas Pius; Nielsen, Rasmus

    2008-01-01

    The field of ancient DNA (aDNA) is casting new light on many evolutionary questions. However, problems associated with the postmortem instability of DNA may complicate the interpretation of aDNA data. For example, in population genetic studies, the inclusion of damaged DNA may inflate estimates of...... diversity. In this paper, we examine the effect of DNA damage on population genetic estimates of ancestral population size. We simulate data using standard coalescent simulations that include postmortem damage and show that estimates of effective population sizes are inflated around, or right after, the...... sampling time of the ancestral DNA sequences. This bias leads to estimates of increasing, and then decreasing, population sizes, as observed in several recently published studies. We reanalyze a recently published data set of DNA sequences from the Bison (Bison bison/Bison priscus) and show that the signal...

  3. Roche genome sequencer FLX based high-throughput sequencing of ancient DNA

    DEFF Research Database (Denmark)

    Alquezar-Planas, David E; Fordyce, Sarah Louise

    2012-01-01

    Since the development of so-called "next generation" high-throughput sequencing in 2005, this technology has been applied to a variety of fields. Such applications include disease studies, evolutionary investigations, and ancient DNA. Each application requires a specialized protocol to ensure tha...

  4. Computational analyses of ancient pathogen DNA from herbarium samples: challenges and prospects

    OpenAIRE

    Yoshida, Kentaro; Sasaki, Eriko; Kamoun, Sophien

    2015-01-01

    The application of DNA sequencing technology to the study of ancient DNA has enabled the reconstruction of past epidemics from genomes of historically important plant-associated microbes. Recently, the genome sequences of the potato late blight pathogen Phytophthora infestans were analyzed from 19th century herbarium specimens. These herbarium samples originated from infected potatoes collected during and after the Irish potato famine. Herbaria have therefore great potential to help elucidate...

  5. Early history of European domestic cattle as revealed by ancient DNA

    OpenAIRE

    Bollongino, R.; Edwards, C.J.; Alt, K.W; Burger, J.; Bradley, D. G.

    2005-01-01

    We present an extensive ancient DNA analysis of mainly Neolithic cattle bones sampled from archaeological sites along the route of Neolithic expansion, from Turkey to North-Central Europe and Britain. We place this first reasonable population sample of Neolithic cattle mitochondrial DNA sequence diversity in context to illustrate the continuity of haplotype variation patterns from the first European domestic cattle to the present. Interestingly, the dominant Central European pattern, a starbu...

  6. Ancient whole genome enrichment using baits built from modern DNA.

    Science.gov (United States)

    Enk, Jacob M; Devault, Alison M; Kuch, Melanie; Murgha, Yusuf E; Rouillard, Jean-Marie; Poinar, Hendrik N

    2014-05-01

    We report metrics from complete genome capture of nuclear DNA from extinct mammoths using biotinylated RNAs transcribed from an Asian elephant DNA extract. Enrichment of the nuclear genome ranged from 1.06- to 18.65-fold, to an apparent maximum threshold of ∼80% on-target. This projects an order of magnitude less costly complete genome sequencing from long-dead organisms, even when a reference genome is unavailable for bait design. PMID:24531081

  7. Analysis of ancient DNA from coprolites: a perspective with random amplified polymorphic DNA-polymerase chain reaction approach

    Directory of Open Access Journals (Sweden)

    Iñiguez Alena M

    2003-01-01

    Full Text Available The aim of this work was to determine approaches that would improve the quality of ancient DNA (aDNA present in coprolites to enhance the possibility of success in retrieving specific sequence targets. We worked with coprolites from South American archaeological sites in Brazil and Chile dating up to 7,000 years ago. Using established protocols for aDNA extraction we obtained samples showing high degradation as usually happens with this kind of material. The reconstructive polymerization pretreatment was essential to overcome the DNA degradation and the serial dilutions helped with to prevent polymerase chain reaction (PCR inhibitors. Moreover, the random amplified polymorphic DNA-PCR has been shown to be a reliable technique for further experiments to recover specific aDNA sequences.

  8. Analyses of DNA from ancient bones of a pre-Columbian Cuban woman and a child

    Directory of Open Access Journals (Sweden)

    Ricardo Lleonart

    1999-09-01

    Full Text Available Molecular anthropology has brought new possibilities into the study of ancient human populations. Amplification of chromosomal short tandem repeat (STR loci and mitochondrial DNA (mtDNA has been successfully employed in analyses of ancient bone material. Although several studies have reported on continental Amerindian populations, none have addressed the ancient populations inhabiting the Caribbean islands. We used STR and mtDNA analyses to study the skeletal remains of a Cuban Ciboney female adult holding an infant. Results showed that for the STR analyzed the skeletal remains shared common alleles, suggesting a relationship. Mitochondrial DNA analysis showed sequence identity, thus corroborating a possible mother-child relationship. The mtDNA sequence grouped these remains into haplogroup A, commonly found in Amerindian populations. Based on these results, we speculated on a South American origin of pre-Columbian Antilles populations and possible infanticide practices in these populations. This constitutes the first report on DNA analysis of ancient pre-Columbian Cuban populations.A antropologia molecular trouxe novas possibilidades para o estudo de populações humanas antigas. A amplificação de loci em pequenos segmentos cromossômicos repetidos (short tandem repeat, STR e de DNA mitocondrial (mtDNA tem sido empregada com sucesso em análises de material ósseo antigo. Embora vários estudos tenham sido publicados a respeito de populações ameríndias continentais, nenhum estudou as populações antigas que habitavam as ilhas do Caribe. Nós usamos análise de STR e mtDNA para estudar os restos de ossos de uma mulher adulta da tribo Ciboney cubana carregando uma criança. Os resultados mostraram que para o STR analisado os restos ósseos compartilhavam alelos comuns, sugerindo um parentesco. A análise de mtDNA mostrou identidade de seqüência, corroborando assim uma possível relação mãe-filho. A seqüência de mtDNA alocou esses

  9. Ancient Mitochondrial DNA Analyses of Ascaris Eggs Discovered in Coprolites from Joseon Tomb

    OpenAIRE

    Oh, Chang Seok; Seo, Min; Hong, Jong Ha; Chai, Jong-Yil; Oh, Seung Whan; Park, Jun Bum; Shin, Dong Hoon

    2015-01-01

    Analysis of ancient DNA (aDNA) extracted from Ascaris is very important for understanding the phylogenetic lineage of the parasite species. When aDNAs obtained from a Joseon tomb (SN2-19-1) coprolite in which Ascaris eggs were identified were amplified with primers for cytochrome b (cyt b) and 18S small subunit ribosomal RNA (18S rRNA) gene, the outcome exhibited Ascaris specific amplicon bands. By cloning, sequencing, and analysis of the amplified DNA, we obtained information valuable for co...

  10. Ancient DNA: Would the Real Neandertal Please Stand up?

    DEFF Research Database (Denmark)

    Cooper, Alan; Drummond, Alexei J.; Willerslev, Eske

    2004-01-01

    Mitochondrial DNA sequences recovered from eight Neandertal specimens cannot be detected in either early fossil Europeans or in modern populations. This indicates that, if Neandertals made any genetic contribution at all to modern humans, it must have been limited, though the extent of the...

  11. High potential for using DNA from ancient herring bones to inform modern fisheries management and conservation.

    Directory of Open Access Journals (Sweden)

    Camilla F Speller

    Full Text Available Pacific herring (Clupea pallasi are an abundant and important component of the coastal ecosystems for the west coast of North America. Current Canadian federal herring management assumes five regional herring populations in British Columbia with a high degree of exchange between units, and few distinct local populations within them. Indigenous traditional knowledge and historic sources, however, suggest that locally adapted, distinct regional herring populations may have been more prevalent in the past. Within the last century, the combined effects of commercial fishing and other anthropogenic factors have resulted in severe declines of herring populations, with contemporary populations potentially reflecting only the remnants of a previously more abundant and genetically diverse metapopulation. Through the analysis of 85 archaeological herring bones, this study attempted to reconstruct the genetic diversity and population structure of ancient herring populations using three different marker systems (mitochondrial DNA (mtDNA, microsatellites and SNPs. A high success rate (91% of DNA recovery was obtained from the extremely small herring bone samples (often <10 mg. The ancient herring mtDNA revealed high haplotype diversity comparable to modern populations, although population discrimination was not possible due to the limited power of the mtDNA marker. Ancient microsatellite diversity was also similar to modern samples, but the data quality was compromised by large allele drop-out and stuttering. In contrast, SNPs were found to have low error rates with no evidence for deviations from Hardy-Weinberg equilibrium, and simulations indicated high power to detect genetic differentiation if loci under selection are used. This study demonstrates that SNPs may be the most effective and feasible approach to survey genetic population structure in ancient remains, and further efforts should be made to screen for high differentiation markers.This study

  12. Application of cytochrome b DNA sequences for the authentication of endangered snake species.

    Science.gov (United States)

    Wong, Ka-Lok; Wang, Jun; But, Paul Pui-Hay; Shaw, Pang-Chui

    2004-01-01

    In order to enforce the conservation program and curbing the illegal trading and consumption of endangered snake species, the value of cytochrome b sequence in the authentication of snake species was evaluated. As an illustration, DNA was extracted, selected cytochrome b DNA sequences amplified and sequenced from six snakes commonly consumed in Hong Kong. Cataloging with sequences available in public, a cytochrome b database containing 90 species of snakes was constructed. In this database, sequence homology between snakes ranged from 70.68 to 95.11%. On the other hand, intraspecific variation of three tested snakes was 0-0.98%. Using the database, we were able to determine the identity of six meat samples confiscated by the Agriculture, Fisheries and Conservation Department, HKSAR. PMID:14687773

  13. Ancient diversification of eukaryotic MCM DNA replication proteins

    Directory of Open Access Journals (Sweden)

    Aves Stephen J

    2009-03-01

    Full Text Available Abstract Background Yeast and animal cells require six mini-chromosome maintenance proteins (Mcm2-7 for pre-replication complex formation, DNA replication initiation and DNA synthesis. These six individual MCM proteins form distinct heterogeneous subunits within a hexamer which is believed to form the replicative helicase and which associates with the essential but non-homologous Mcm10 protein during DNA replication. In contrast Archaea generally only possess one MCM homologue which forms a homohexameric MCM helicase. In some eukaryotes Mcm8 and Mcm9 paralogues also appear to be involved in DNA replication although their exact roles are unclear. Results We used comparative genomics and phylogenetics to reconstruct the diversification of the eukaryotic Mcm2-9 gene family, demonstrating that Mcm2-9 were formed by seven gene duplication events before the last common ancestor of the eukaryotes. Mcm2-7 protein paralogues were present in all eukaryote genomes studied suggesting that no gene loss or functional replacements have been tolerated during the evolutionary diversification of eukaryotes. Mcm8 and 9 are widely distributed in eukaryotes and group together on the MCM phylogenetic tree to the exclusion of all other MCM paralogues suggesting co-ancestry. Mcm8 and Mcm9 are absent in some taxa, including Trichomonas and Giardia, and appear to have been secondarily lost in some fungi and some animals. The presence and absence of Mcm8 and 9 is concordant in all taxa sampled with the exception of Drosophila species. Mcm10 is present in most eukaryotes sampled but shows no concordant pattern of presence or absence with Mcm8 or 9. Conclusion A multifaceted and heterogeneous Mcm2-7 hexamer evolved during the early evolution of the eukaryote cell in parallel with numerous other acquisitions in cell complexity and prior to the diversification of extant eukaryotes. The conservation of all six paralogues throughout the eukaryotes suggests that each Mcm2

  14. [The origins of dogs: archaeozoology, genetics, and ancient DNA].

    Science.gov (United States)

    Verginelli, Fabio; Capelli, Cristian; Coia, Valentina; Musiani, Marco; Falchetti, Mario; Ottini, Laura; Palmirotta, Raffaele; Tagliacozzo, Antonio; Mazzorin, Iacopo de Grossi; Mariani-Costantini, Renato

    2006-01-01

    The domestication of the dog from the wolf was a key step in the pathway that led to the Neolithic revolution. The earliest fossil dogs, dated to the end of the last glacial period (17,000 to 12,000 years ago), have been found in Russia, Germany and the Middle East. No dogs are represented in the naturalistic art of the European Upper Palaeolithic, suggesting that dogs were introduced at a later date. Genetic studies of extant dog and wolf mitochondrial DNA sequences were interpreted in favour of multiple dog founding events as early as 135-76,000 years ago, or of a single origin in East Asia, 40,000 or 15,000 years ago. Our study included mitochondrial DNA sequences from Italian fossil bones attributed to three Late Pleistocene-Early Holocene wolves (dated from a15,000 to a10,000 14C years ago) and two dogs, dated to a4000 and a3000 14C years ago respectively. Taking paleogeography into account, our phylogenetic data point to a contribution of European wolves to the three major dog clades, in agreement with archaeozoological data. Our phylogeographic studies also suggest genetic differentiation of dogs and wolves related to isolation by geographic distance, supporting multicentric origins of dogs from wolves throughout their vast range of sympatry. PMID:18175620

  15. A simple and efficient method for PCR amplifiable DNA extraction from ancient bones

    OpenAIRE

    Kalmár, Tibor; Bachrati, Csanád Z.; Marcsik, Antónia; Raskó, István

    2000-01-01

    A simple and effective modified ethanol precipitation-based protocol is described for the preparation of DNA from ancient human bones. This method is fast and requires neither hazardous chemicals nor special devices. After the powdering and incubating of the bone samples Dextran Blue was added as a carrier for removing the PCR inhibitors with selective ethanol precipitation. This method could eliminate the time-consuming separate decalcification step, dialysis, application of centrifugation-d...

  16. Recent advances in ancient DNA research and their implications for archaeobotany

    DEFF Research Database (Denmark)

    Brown, Terence A.; Cappellini, Enrico; Kistler, Logan;

    2015-01-01

    The scope and ambition of biomolecular archaeology is undergoing rapid change due to the development of new ‘next generation’ sequencing (NGS) methods for analysis of ancient DNA in archaeological specimens. These methods have not yet been applied extensively to archaeobotanical material but their...... utility has been demonstrated with desiccated, waterlogged and charred remains. The future use of NGS is likely to open up new areas of investigation that have been difficult or impossible with the traditional approach to aDNA sequencing. Species identification should become more routine with...

  17. Biomolecular identification of ancient mycobacterium tuberculosis complex DNA in human remains from Britain and continental Europe.

    OpenAIRE

    Müller, R.; Roberts, C A; Brown, T. A.

    2014-01-01

    Tuberculosis is known to have afflicted humans throughout history and re-emerged towards the end of the 20th century, to an extent that it was declared a global emergency in 1993. The aim of this study was to apply a rigorous analytical regime to the detection of Mycobacterium tuberculosis complex (MTBC) DNA in 77 bone and tooth samples from 70 individuals from Britain and continental Europe, spanning the 1st–19th centuries AD. We performed the work in dedicated ancient DNA facilities designe...

  18. Using ancient DNA and coalescent-based methods to infer extinction.

    Science.gov (United States)

    Chang, Dan; Shapiro, Beth

    2016-02-01

    DNA sequences extracted from preserved remains can add considerable resolution to inference of past population dynamics. For example, coalescent-based methods have been used to correlate declines in some arctic megafauna populations with habitat fragmentation during the last ice age. These methods, however, often fail to detect population declines preceding extinction, most likely owing to a combination of sparse sampling, uninformative genetic markers, and models that cannot account for the increasingly structured nature of populations as habitats decline. As ancient DNA research expands to include full-genome analyses, these data will provide greater resolution of the genomic consequences of environmental change and the genetic signatures of extinction. PMID:26864783

  19. DNA barcoding: an efficient tool to overcome authentication challenges in the herbal market.

    Science.gov (United States)

    Mishra, Priyanka; Kumar, Amit; Nagireddy, Akshitha; Mani, Daya N; Shukla, Ashutosh K; Tiwari, Rakesh; Sundaresan, Velusamy

    2016-01-01

    The past couple of decades have witnessed global resurgence of herbal-based health care. As a result, the trade of raw drugs has surged globally. Accurate and fast scientific identification of the plant(s) is the key to success for the herbal drug industry. The conventional approach is to engage an expert taxonomist, who uses a mix of traditional and modern techniques for precise plant identification. However, for bulk identification at industrial scale, the process is protracted and time-consuming. DNA barcoding, on the other hand, offers an alternative and feasible taxonomic tool box for rapid and robust species identification. For the success of DNA barcode, the barcode loci must have sufficient information to differentiate unambiguously between closely related plant species and discover new cryptic species. For herbal plant identification, matK, rbcL, trnH-psbA, ITS, trnL-F, 5S-rRNA and 18S-rRNA have been used as successful DNA barcodes. Emerging advances in DNA barcoding coupled with next-generation sequencing and high-resolution melting curve analysis have paved the way for successful species-level resolution recovered from finished herbal products. Further, development of multilocus strategy and its application has provided new vistas to the DNA barcode-based plant identification for herbal drug industry. For successful and acceptable identification of herbal ingredients and a holistic quality control of the drug, DNA barcoding needs to work harmoniously with other components of the systems biology approach. We suggest that for effectively resolving authentication challenges associated with the herbal market, DNA barcoding must be used in conjunction with metabolomics along with need-based transcriptomics and proteomics. PMID:26079154

  20. A DNA microarray for the authentication of toxic traditional Chinese medicinal plants.

    Science.gov (United States)

    Carles, Maria; Cheung, Matthew Kin; Moganti, Shanti; Dong, Tina T; Tsim, Karl W; Ip, Nancy Y; Sucher, Nikolaus J

    2005-06-01

    A silicon-based DNA microarray was designed and fabricated for the identification of toxic traditional Chinese medicinal plants. Species-specific oligonucleotide probes were derived from the 5S ribosomal RNA gene of Aconitum carmichaeli, A. kusnezoffi, Alocasia macrorrhiza, Croton tiglium, Datura inoxia, D. metel, D. tatula, Dysosma pleiantha, Dy. versipellis, Euphorbia kansui, Hyoscyamus niger, Pinellia cordata, P. pedatisecta, P. ternata, Rhododendron molle, Strychnos nux-vomica, Typhonium divaricatum and T. giganteum and the leucine transfer RNA gene of Aconitum pendulum and Stellera chamaejasme. The probes were immobilized via dithiol linkage on a silicon chip. Genomic target sequences were amplified and fluorescently labeled by asymmetric polymerase chain reaction. Multiple toxic plant species were identified by parallel genotyping. Chip-based authentication of medicinal plants may be useful as inexpensive and rapid tool for quality control and safety monitoring of herbal pharmaceuticals and neutraceuticals. PMID:15971136

  1. Ancient and modern DNA reveal dynamics of domestication and cross-continental dispersal of the dromedary

    Science.gov (United States)

    Almathen, Faisal; Charruau, Pauline; Mohandesan, Elmira; Mwacharo, Joram M.; Orozco-terWengel, Pablo; Pitt, Daniel; Abdussamad, Abdussamad M.; Uerpmann, Margarethe; Uerpmann, Hans-Peter; De Cupere, Bea; Magee, Peter; Alnaqeeb, Majed A.; Salim, Bashir; Raziq, Abdul; Dessie, Tadelle; Abdelhadi, Omer M.; Banabazi, Mohammad H.; Al-Eknah, Marzook; Walzer, Chris; Faye, Bernard; Hofreiter, Michael; Peters, Joris; Hanotte, Olivier

    2016-01-01

    Dromedaries have been fundamental to the development of human societies in arid landscapes and for long-distance trade across hostile hot terrains for 3,000 y. Today they continue to be an important livestock resource in marginal agro-ecological zones. However, the history of dromedary domestication and the influence of ancient trading networks on their genetic structure have remained elusive. We combined ancient DNA sequences of wild and early-domesticated dromedary samples from arid regions with nuclear microsatellite and mitochondrial genotype information from 1,083 extant animals collected across the species’ range. We observe little phylogeographic signal in the modern population, indicative of extensive gene flow and virtually affecting all regions except East Africa, where dromedary populations have remained relatively isolated. In agreement with archaeological findings, we identify wild dromedaries from the southeast Arabian Peninsula among the founders of the domestic dromedary gene pool. Approximate Bayesian computations further support the “restocking from the wild” hypothesis, with an initial domestication followed by introgression from individuals from wild, now-extinct populations. Compared with other livestock, which show a long history of gene flow with their wild ancestors, we find a high initial diversity relative to the native distribution of the wild ancestor on the Arabian Peninsula and to the brief coexistence of early-domesticated and wild individuals. This study also demonstrates the potential to retrieve ancient DNA sequences from osseous remains excavated in hot and dry desert environments. PMID:27162355

  2. Ancient and modern DNA reveal dynamics of domestication and cross-continental dispersal of the dromedary.

    Science.gov (United States)

    Almathen, Faisal; Charruau, Pauline; Mohandesan, Elmira; Mwacharo, Joram M; Orozco-terWengel, Pablo; Pitt, Daniel; Abdussamad, Abdussamad M; Uerpmann, Margarethe; Uerpmann, Hans-Peter; De Cupere, Bea; Magee, Peter; Alnaqeeb, Majed A; Salim, Bashir; Raziq, Abdul; Dessie, Tadelle; Abdelhadi, Omer M; Banabazi, Mohammad H; Al-Eknah, Marzook; Walzer, Chris; Faye, Bernard; Hofreiter, Michael; Peters, Joris; Hanotte, Olivier; Burger, Pamela A

    2016-06-14

    Dromedaries have been fundamental to the development of human societies in arid landscapes and for long-distance trade across hostile hot terrains for 3,000 y. Today they continue to be an important livestock resource in marginal agro-ecological zones. However, the history of dromedary domestication and the influence of ancient trading networks on their genetic structure have remained elusive. We combined ancient DNA sequences of wild and early-domesticated dromedary samples from arid regions with nuclear microsatellite and mitochondrial genotype information from 1,083 extant animals collected across the species' range. We observe little phylogeographic signal in the modern population, indicative of extensive gene flow and virtually affecting all regions except East Africa, where dromedary populations have remained relatively isolated. In agreement with archaeological findings, we identify wild dromedaries from the southeast Arabian Peninsula among the founders of the domestic dromedary gene pool. Approximate Bayesian computations further support the "restocking from the wild" hypothesis, with an initial domestication followed by introgression from individuals from wild, now-extinct populations. Compared with other livestock, which show a long history of gene flow with their wild ancestors, we find a high initial diversity relative to the native distribution of the wild ancestor on the Arabian Peninsula and to the brief coexistence of early-domesticated and wild individuals. This study also demonstrates the potential to retrieve ancient DNA sequences from osseous remains excavated in hot and dry desert environments. PMID:27162355

  3. The characterization of Helicobacter pylori DNA associated with ancient human remains recovered from a Canadian glacier.

    Directory of Open Access Journals (Sweden)

    Treena Swanston

    Full Text Available Helicobacter pylori is a gram-negative bacterium that colonizes the stomach of nearly half of the world's population. Genotypic characterization of H. pylori strains involves the analysis of virulence-associated genes, such as vacA, which has multiple alleles. Previous phylogenetic analyses have revealed a connection between modern H. pylori strains and the movement of ancient human populations. In this study, H. pylori DNA was amplified from the stomach tissue of the Kwäday Dän Ts'ìnchi individual. This ancient individual was recovered from the Samuel Glacier in Tatshenshini-Alsek Park, British Columbia, Canada on the traditional territory of the Champagne and Aishihik First Nations and radiocarbon dated to a timeframe of approximately AD 1670 to 1850. This is the first ancient H. pylori strain to be characterized with vacA sequence data. The Tatshenshini H. pylori strain has a potential hybrid vacA m2a/m1d middle (m region allele and a vacA s2 signal (s region allele. A vacA s2 allele is more commonly identified with Western strains, and this suggests that European strains were present in northwestern Canada during the ancient individual's time. Phylogenetic analysis indicated that the vacA m1d region of the ancient strain clusters with previously published novel Native American strains that are closely related to Asian strains. This indicates a past connection between the Kwäday Dän Ts'ìnchi individual and the ancestors who arrived in the New World thousands of years ago.

  4. SL1 RNA gene recovery from Enterobius vermicularis ancient DNA in pre-Columbian human coprolites.

    Science.gov (United States)

    Iñiguez, Alena Mayo; Reinhard, Karl; Carvalho Gonçalves, Marcelo Luiz; Ferreira, Luiz Fernando; Araújo, Adauto; Paulo Vicente, Ana Carolina

    2006-11-01

    Enterobius vermicularis, pinworm, is one of the most common helminths worldwide, infecting nearly a billion people at all socio-economic levels. In prehistoric populations the paleoparasitological findings show a pinworm homogeneous distribution among hunter-gatherers in North America, intensified with the advent of agriculture. This same increase also occurred in the transition from nomad hunter-gatherers to sedentary farmers in South America, although E. vermicularis infection encompasses only the ancient Andean peoples, with no record among the pre-Colombian populations in the South American lowlands. However, the outline of pinworm paleoepidemiology has been supported by microscopic finding of eggs recovered from coprolites. Since molecular techniques are precise and sensitive in detecting pathogen ancient DNA (aDNA), and also could provide insights into the parasite evolutionary history, in this work we have performed a molecular paleoparasitological study of E. vermicularis. aDNA was recovered and pinworm 5S rRNA spacer sequences were determined from pre-Columbian coprolites (4110 BC-AD 900) from four different North and South American archaeological sites. The sequence analysis confirmed E. vermicularis identity and revealed a similarity among ancient and modern sequences. Moreover, polymorphisms were identified at the relative positions 160, 173 and 180, in independent coprolite samples from Tulán, San Pedro de Atacama, Chile (1080-950 BC). We also verified the presence of peculiarities (Splicing leader (SL1) RNA sequence, spliced donor site, the Sm antigen biding site, and RNA secondary structure) which characterise the SL1 RNA gene. The analysis shows that the SL1 RNA gene of contemporary pinworms was present in pre-Columbian E. vermicularis by 6110 years ago. We were successful in detecting E. vermicularis aDNA even in coprolites without direct microscopic evidence of the eggs, improving the diagnosis of helminth infections in the past and further

  5. Phylogenetic Analysis of mtDNA from the Ancient Human of Yuan Dynasty in Inner Mongolia in China

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A study of the genetic structure of an ancient human excavated from the Yikeshu site of Yuanshangdu ancient city in Inner Mongolia and the relationships between the ancient population and the extant populations was carried out.Sequences of the control region and coding region of mtDNA from the ancient human were analyzed by using direct sequencing and restriction-fragment length polymorphism (RFLP) methods. Phylogenetic analysis and multidimensional scaling analysis were also performed on the mtDNA data of the ancient population and 12 extant populations. These results show that the ancient individuals of Yikeshu site can be assigned to D, G, B and Z haplogroups that are prevalent in Duars and Mongolians from Inner Mongolia. The ancient population is also closer to Duar and Mongolian populations in genetic distance than other compared populations. This study reveals that the ancient population from Yikeshu site in the Yuan Dynasty shares a common ancestor with Mongolic-speaking Daur and Mongolian tribes.

  6. Fungal palaeodiversity revealed using high-throughput metabarcoding of ancient DNA from arctic permafrost

    DEFF Research Database (Denmark)

    Bellemain, E.; Davey, M.L.; Kauserud, H.;

    2013-01-01

    The taxonomic and ecological diversity of ancient fungal communities was assessed by combining next generation sequencing and metabarcoding of DNA preserved in permafrost. Twenty-six sediment samples dated 16000-32000 radiocarbon years old from two localities in Siberia were analysed for fungal ITS....... We detected 75 fungal OTUs from 21 orders representing three phyla, although rarefaction analyses suggested that the full diversity was not recovered despite generating an average of 6677±3811 (mean±SD) sequences per sample and that preservation bias likely has considerable effect on the recovered...... DNA. Most OTUs (75.4%) represented ascomycetes. Due to insufficient sequencing depth, DNA degradation and putative preservation biases in our samples, the recovered taxa probably do not represent the complete historic fungal community, and it is difficult to determine whether the fungal communities...

  7. Absence of ancient DNA in sub-fossil insect inclusions preserved in 'Anthropocene' Colombian copal.

    Directory of Open Access Journals (Sweden)

    David Penney

    Full Text Available Insects preserved in copal, the sub-fossilized resin precursor of amber, have potential value in molecular ecological studies of recently-extinct species and of extant species that have never been collected as living specimens. The objective of the work reported in this paper was therefore to determine if ancient DNA is present in insects preserved in copal. We prepared DNA libraries from two stingless bees (Apidae: Meliponini: Trigonisca ameliae preserved in 'Anthropocene' Colombian copal, dated to 'post-Bomb' and 10,612±62 cal yr BP, respectively, and obtained sequence reads using the GS Junior 454 System. Read numbers were low, but were significantly higher for DNA extracts prepared from crushed insects compared with extracts obtained by a non-destructive method. The younger specimen yielded sequence reads up to 535 nucleotides in length, but searches of these sequences against the nucleotide database revealed very few significant matches. None of these hits was to stingless bees though one read of 97 nucleotides aligned with two non-contiguous segments of the mitochondrial cytochrome oxidase subunit I gene of the East Asia bumblebee Bombus hypocrita. The most significant hit was for 452 nucleotides of a 470-nucleotide read that aligned with part of the genome of the root-nodulating bacterium Bradyrhizobium japonicum. The other significant hits were to proteobacteria and an actinomycete. Searches directed specifically at Apidae nucleotide sequences only gave short and insignificant alignments. All of the reads from the older specimen appeared to be artefacts. We were therefore unable to obtain any convincing evidence for the preservation of ancient DNA in either of the two copal inclusions that we studied, and conclude that DNA is not preserved in this type of material. Our results raise further doubts about claims of DNA extraction from fossil insects in amber, many millions of years older than copal.

  8. Absence of ancient DNA in sub-fossil insect inclusions preserved in 'Anthropocene' Colombian copal.

    Science.gov (United States)

    Penney, David; Wadsworth, Caroline; Fox, Graeme; Kennedy, Sandra L; Preziosi, Richard F; Brown, Terence A

    2013-01-01

    Insects preserved in copal, the sub-fossilized resin precursor of amber, have potential value in molecular ecological studies of recently-extinct species and of extant species that have never been collected as living specimens. The objective of the work reported in this paper was therefore to determine if ancient DNA is present in insects preserved in copal. We prepared DNA libraries from two stingless bees (Apidae: Meliponini: Trigonisca ameliae) preserved in 'Anthropocene' Colombian copal, dated to 'post-Bomb' and 10,612±62 cal yr BP, respectively, and obtained sequence reads using the GS Junior 454 System. Read numbers were low, but were significantly higher for DNA extracts prepared from crushed insects compared with extracts obtained by a non-destructive method. The younger specimen yielded sequence reads up to 535 nucleotides in length, but searches of these sequences against the nucleotide database revealed very few significant matches. None of these hits was to stingless bees though one read of 97 nucleotides aligned with two non-contiguous segments of the mitochondrial cytochrome oxidase subunit I gene of the East Asia bumblebee Bombus hypocrita. The most significant hit was for 452 nucleotides of a 470-nucleotide read that aligned with part of the genome of the root-nodulating bacterium Bradyrhizobium japonicum. The other significant hits were to proteobacteria and an actinomycete. Searches directed specifically at Apidae nucleotide sequences only gave short and insignificant alignments. All of the reads from the older specimen appeared to be artefacts. We were therefore unable to obtain any convincing evidence for the preservation of ancient DNA in either of the two copal inclusions that we studied, and conclude that DNA is not preserved in this type of material. Our results raise further doubts about claims of DNA extraction from fossil insects in amber, many millions of years older than copal. PMID:24039876

  9. Investigating the global dispersal of chickens in prehistory using ancient mitochondrial DNA signatures.

    Directory of Open Access Journals (Sweden)

    Alice A Storey

    Full Text Available Data from morphology, linguistics, history, and archaeology have all been used to trace the dispersal of chickens from Asian domestication centers to their current global distribution. Each provides a unique perspective which can aid in the reconstruction of prehistory. This study expands on previous investigations by adding a temporal component from ancient DNA and, in some cases, direct dating of bones of individual chickens from a variety of sites in Europe, the Pacific, and the Americas. The results from the ancient DNA analyses of forty-eight archaeologically derived chicken bones provide support for archaeological hypotheses about the prehistoric human transport of chickens. Haplogroup E mtDNA signatures have been amplified from directly dated samples originating in Europe at 1000 B.P. and in the Pacific at 3000 B.P. indicating multiple prehistoric dispersals from a single Asian centre. These two dispersal pathways converged in the Americas where chickens were introduced both by Polynesians and later by Europeans. The results of this study also highlight the inappropriate application of the small stretch of D-loop, traditionally amplified for use in phylogenetic studies, to understanding discrete episodes of chicken translocation in the past. The results of this study lead to the proposal of four hypotheses which will require further scrutiny and rigorous future testing.

  10. Ancient DNA from giant extinct lemurs confirms single origin of Malagasy primates.

    Science.gov (United States)

    Karanth, K Praveen; Delefosse, Thomas; Rakotosamimanana, Berthe; Parsons, Thomas J; Yoder, Anne D

    2005-04-01

    The living Malagasy lemurs constitute a spectacular radiation of >50 species that are believed to have evolved from a common ancestor that colonized Madagascar in the early Tertiary period. Yet, at least 15 additional Malagasy primate species, some of which were relative giants, succumbed to extinction within the past 2,000 years. Their existence in Madagascar is recorded predominantly in its Holocene subfossil record. To rigorously test the hypothesis that all endemic Malagasy primates constitute a monophyletic group and to determine the evolutionary relationships among living and extinct taxa, we have conducted an ancient DNA analysis of subfossil species. A total of nine subfossil individuals from the extinct genera Palaeopropithecus and Megaladapis yielded amplifiable DNA. Phylogenetic analysis of cytochrome b sequences derived from these subfossils corroborates the monophyly of endemic Malagasy primates. Our results support the close relationship of sloth lemurs to living indriids, as has been hypothesized on morphological grounds. In contrast, Megaladapis does not show a sister-group relationship with the living genus Lepilemur. Thus, the classification of the latter in the family Megaladapidae is misleading. By correlating the geographic location of subfossil specimens with relative amplification success, we reconfirm the global trend of increased success rates of ancient DNA recovery from nontropical localities. PMID:15784742

  11. Bona fide colour: DNA prediction of human eye and hair colour from ancient and contemporary skeletal remains

    NARCIS (Netherlands)

    J. Draus-Barini (Jolanta); S. Walsh (Susan); E. Pośpiech (Ewelina); T. Kupiec (Tomasz); H. Głab (Henryk); W. Branicki (Wojciech); M.H. Kayser (Manfred)

    2013-01-01

    textabstractBackground: DNA analysis of ancient skeletal remains is invaluable in evolutionary biology for exploring the history of species, including humans. Contemporary human bones and teeth, however, are relevant in forensic DNA analyses that deal with the identification of perpetrators, missing

  12. The examination of ancient DNA: guidelines on precautions, controls, and sample processing

    Directory of Open Access Journals (Sweden)

    Scholz, M.

    2000-06-01

    Full Text Available The young discipline of palaeogenetics has developed into a successful and expectant field of archaeobiological research within the last decade. Palaeogenetic investigation (e.g. PCR, DNA sequencing of ancient specimens is, however, susceptible to falsification by the presence of contamination from more recent times. Contamination which can lead to amplification of non-authentic sequences is known to stem from several sources: (i human biomolecules derived from the persons performing the genetic experiments, perhaps also from the archeologists and other persons who have previously handled the specimens or (ii edaphic DNA sequences derived primarily from bacterial or fungal growth upon the specimen. A third source of contamination can arise from (iii substances used for conservation of specimens. Here we give advice on the correct processing of prehistoric bone samples when further molecular biological examination is required. Along with the demonstration of necessary precautions and working conditions, we further explain how an unequivocal DNA contamination monitoring is performed.

    La paleogenética se ha convertido en los últimos años en una disciplina coronada de éxito que ofrece grandes expectativas para el desarrollo de la investigación arqueobiológica. No obstante, la investigación paleogenética (p. ej: PCR, secuenciación del ADN de especímenes antiguos es susceptible de ser falsificada por la presencia de una contaminación más reciente. Actualmente sabemos que la contaminación que provoca la amplificación de secuencias ''no auténticas" procede de las siguientes fuentes: (i las biomoléculas humanas provienen de la persona que realiza el experimento genético o incluso también del arqueólogo u otras personas que previamente hayan tenido contacto con el espécimen; (ii de secuencias de ADN edáficas derivadas básicamente del crecimiento bacterial o fúngico en el seno del espécimen. La tercera fuente de contaminaci

  13. Ancient DNA from lake sediments: Bridging the gap between paleoecology and genetics

    Directory of Open Access Journals (Sweden)

    Lumibao Candice Y

    2011-01-01

    Full Text Available Abstract Background Quaternary plant ecology in much of the world has historically relied on morphological identification of macro- and microfossils from sediments of small freshwater lakes. Here, we report new protocols that reliably yield DNA sequence data from Holocene plant macrofossils and bulk lake sediment used to infer ecological change. This will allow changes in census populations, estimated from fossils and associated sediment, to be directly associated with population genetic changes. Results We successfully sequenced DNA from 64 samples (out of 126 comprised of bulk sediment and seeds, leaf fragments, budscales, and samaras extracted from Holocene lake sediments in the western Great Lakes region of North America. Overall, DNA yields were low. However, we were able to reliably amplify samples with as few as 10 copies of a short cpDNA fragment with little detectable PCR inhibition. Our success rate was highest for sediments Conclusions An ability to extract ancient DNA from Holocene sediments potentially allows exciting new insights into the genetic consequences of long-term environmental change. The low DNA copy numbers we found in fossil material and the discovery of multiple sequence variants from single macrofossil extractions highlight the need for careful experimental and laboratory protocols. Further application of these protocols should lead to better understanding of the ecological and evolutionary consequences of environmental change.

  14. Temporal patterns of nucleotide misincorporations and DNA fragmentation in ancient DNA

    OpenAIRE

    Susanna Sawyer; Johannes Krause; Katerina Guschanski; Vincent Savolainen; Svante Pääbo

    2012-01-01

    DNA that survives in museum specimens, bones and other tissues recovered by archaeologists is invariably fragmented and chemically modified. The extent to which such modifications accumulate over time is largely unknown but could potentially be used to differentiate between endogenous old DNA and present-day DNA contaminating specimens and experiments. Here we examine mitochondrial DNA sequences from tissue remains that vary in age between 18 and 60,000 years with respect to three molecular f...

  15. Optical dating of perennially frozen deposits associated with preserved ancient plant and animal DNA in north-central Siberia

    DEFF Research Database (Denmark)

    Arnold, L.J.; Roberts, R.G.; Macphee, R.D.E.;

    2008-01-01

    We present chronological constraints on a suite of permanently frozen fluvial deposits which contain ancient DNA (aDNA) from the Taimyr Peninsula of north-central Siberia. The luminescence phenomenology of these samples is first discussed, focusing on the optically stimulated luminescence (OSL) d...... of providing a reliable chronometric framework for sedimentary aDNA records in permafrost environments. (C) 2007 Elsevier Ltd. All rights reserved Udgivelsesdato: 2008...

  16. Ancient DNA from an Early Neolithic Iberian population supports a pioneer colonization by first farmers.

    Science.gov (United States)

    Gamba, C; Fernández, E; Tirado, M; Deguilloux, M F; Pemonge, M H; Utrilla, P; Edo, M; Molist, M; Rasteiro, R; Chikhi, L; Arroyo-Pardo, E

    2012-01-01

    The Neolithic transition has been widely debated particularly regarding the extent to which this revolution implied a demographic expansion from the Near East. We attempted to shed some light on this process in northeastern Iberia by combining ancient DNA (aDNA) data from Early Neolithic settlers and published DNA data from Middle Neolithic and modern samples from the same region. We successfully extracted and amplified mitochondrial DNA from 13 human specimens, found at three archaeological sites dated back to the Cardial culture in the Early Neolithic (Can Sadurní and Chaves) and to the Late Early Neolithic (Sant Pau del Camp). We found that haplogroups with a low frequency in modern populations-N* and X1-are found at higher frequencies in our Early Neolithic population (∼31%). Genetic differentiation between Early and Middle Neolithic populations was significant (F(ST) ∼0.13, PNeolithic demographic processes, we used a Bayesian coalescence-based simulation approach to identify the most likely of three demographic scenarios that might explain the genetic data. The three scenarios were chosen to reflect archaeological knowledge and previous genetic studies using similar inferential approaches. We found that models that ignore population structure, as previously used in aDNA studies, are unlikely to explain the data. Our results are compatible with a pioneer colonization of northeastern Iberia at the Early Neolithic characterized by the arrival of small genetically distinctive groups, showing cultural and genetic connections with the Near East. PMID:22117930

  17. High-throughput sequencing of ancient plant and mammal DNA preserved in herbivore middens

    Science.gov (United States)

    Murray, Dáithí C.; Pearson, Stuart G.; Fullagar, Richard; Chase, Brian M.; Houston, Jayne; Atchison, Jennifer; White, Nicole E.; Bellgard, Matthew I.; Clarke, Edward; Macphail, Mike; Gilbert, M. Thomas P.; Haile, James; Bunce, Michael

    2012-12-01

    The study of arid palaeoenvironments is often frustrated by the poor or non-existent preservation of plant and animal material, yet these environments are of considerable environmental importance. The analysis of pollen and macrofossils isolated from herbivore middens has been an invaluable source of information regarding past environments and the nature of ecological fluctuations within arid zones. The application of ancient DNA (aDNA) techniques to hot, arid zone middens remains unexplored. This paper attempts to retrieve and characterise aDNA from four Southern Hemisphere fossil middens; three located in hot, arid regions of Australia and one sample from South Africa's Western Cape province. The middens are dated to between 30,490 (±380) and 710 (±70) cal yr BP. The Brockman Ridge midden in this study is potentially the oldest sample from which aDNA has been successfully extracted in Australia. The application of high-throughput sequencing approaches to profile the biotic remains preserved in midden material has not been attempted to date and this study clearly demonstrates the potential of such a methodology. In addition to the taxa previously detected via macrofossil and palynological analyses, aDNA analysis identified unreported plant and animal taxa, some of which are locally extinct or endemic. The survival and preservation of DNA in hot, arid environments is a complex and poorly understood process that is both sporadic and rare, but the survival of DNA through desiccation may be important. Herbivore middens now present an important source of material for DNA metabarcoding studies of hot, arid palaeoenvironments and can potentially be used to analyse middens in these environments throughout Australia, Africa, the Americas and the Middle East.

  18. Ancient mtDNA Genetic Variants Modulate mtDNA Transcription and Replication

    OpenAIRE

    Suissa, Sarit; Wang, Zhibo; Poole, Jason; Wittkopp, Sharine; Feder, Jeanette; Shutt, Timothy E.; Wallace, Douglas C.; Shadel, Gerald S.; Mishmar, Dan

    2009-01-01

    Although the functional consequences of mitochondrial DNA ( mtDNA) genetic backgrounds (haplotypes, haplogroups) have been demonstrated by both disease association studies and cell culture experiments, it is not clear which of the mutations within the haplogroup carry functional implications and which are "evolutionary silent hitchhikers''. We set forth to study the functionality of haplogroup-defining mutations within the mtDNA transcription/replication regulatory region by in vitro transcri...

  19. Ancient mtDNA genetic variants modulate mtDNA transcription and replication.

    OpenAIRE

    Sarit Suissa; Zhibo Wang; Jason Poole; Sharine Wittkopp; Jeanette Feder; Shutt, Timothy E.; Wallace, Douglas C.; Shadel, Gerald S.; Dan Mishmar

    2009-01-01

    Although the functional consequences of mitochondrial DNA ( mtDNA) genetic backgrounds (haplotypes, haplogroups) have been demonstrated by both disease association studies and cell culture experiments, it is not clear which of the mutations within the haplogroup carry functional implications and which are "evolutionary silent hitchhikers''. We set forth to study the functionality of haplogroup-defining mutations within the mtDNA transcription/replication regulatory region by in vitro transcri...

  20. DNA Barcode Authentication of Wood Samples of Threatened and Commercial Timber Trees within the Tropical Dry Evergreen Forest of India

    OpenAIRE

    Nithaniyal, Stalin; Newmaster, Steven G; Ragupathy, Subramanyam; Krishnamoorthy, Devanathan; Vassou, Sophie Lorraine; Parani, Madasamy

    2014-01-01

    Background India is rich with biodiversity, which includes a large number of endemic, rare and threatened plant species. Previous studies have used DNA barcoding to inventory species for applications in biodiversity monitoring, conservation impact assessment, monitoring of illegal trading, authentication of traded medicinal plants etc. This is the first tropical dry evergreen forest (TDEF) barcode study in the World and the first attempt to assemble a reference barcode library for the trees o...

  1. An economic analysis of private incentives to adopt DNA barcoding technology for fish species authentication in Canada.

    Science.gov (United States)

    Ugochukwu, Albert I; Hobbs, Jill E; Phillips, Peter W B; Gray, Richard

    2015-12-01

    The increasing spate of species substitution and mislabelling in fish markets has become a concern to the public and a challenge to both the food industry and regulators. Species substitution and mislabelling within fish supply chains occurs because of price incentives to misrepresent products for economic gain. Emerging authenticity technologies, such as the DNA barcoding technology that has been used to identify plants and animal (particularly fish) species through DNA sequencing, offer a potential technological solution to this information problem. However, the adoption of these authenticity technologies depends also on economic factors. The present study uses economic welfare analysis to examine the effects of species substitution and mislabelling in fish markets, and examines the feasibility of the technology for a typical retail store in Canada. It is assumed that increased accuracy of the technology in detecting fraud and enforcement of legal penalties and other associated costs would be likely to discourage cheating. Empirical results suggest that DNA barcoding technology would be feasible presently for a typical retail store only if authentication is done in a third party laboratory, as it may not be feasible on an individual retail store level once fixed and other associated costs of the technology are considered. PMID:26577715

  2. Ancient microbes from halite fluid inclusions: optimized surface sterilization and DNA extraction.

    Directory of Open Access Journals (Sweden)

    Krithivasan Sankaranarayanan

    Full Text Available Fluid inclusions in evaporite minerals (halite, gypsum, etc. potentially preserve genetic records of microbial diversity and changing environmental conditions of Earth's hydrosphere for nearly one billion years. Here we describe a robust protocol for surface sterilization and retrieval of DNA from fluid inclusions in halite that, unlike previously published methods, guarantees removal of potentially contaminating surface-bound DNA. The protocol involves microscopic visualization of cell structures, deliberate surface contamination followed by surface sterilization with acid and bleach washes, and DNA extraction using Amicon centrifugal filters. Methods were verified on halite crystals of four different ages from Saline Valley, California (modern, 36 ka, 64 ka, and 150 ka, with retrieval of algal and archaeal DNA, and characterization of the algal community using ITS1 sequences. The protocol we developed opens up new avenues for study of ancient microbial ecosystems in fluid inclusions, understanding microbial evolution across geological time, and investigating the antiquity of life on earth and other parts of the solar system.

  3. Ancient mtDNA genetic variants modulate mtDNA transcription and replication.

    Directory of Open Access Journals (Sweden)

    Sarit Suissa

    2009-05-01

    Full Text Available Although the functional consequences of mitochondrial DNA (mtDNA genetic backgrounds (haplotypes, haplogroups have been demonstrated by both disease association studies and cell culture experiments, it is not clear which of the mutations within the haplogroup carry functional implications and which are "evolutionary silent hitchhikers". We set forth to study the functionality of haplogroup-defining mutations within the mtDNA transcription/replication regulatory region by in vitro transcription, hypothesizing that haplogroup-defining mutations occurring within regulatory motifs of mtDNA could affect these processes. We thus screened >2500 complete human mtDNAs representing all major populations worldwide for natural variation in experimentally established protein binding sites and regulatory regions comprising a total of 241 bp in each mtDNA. Our screen revealed 77/241 sites showing point mutations that could be divided into non-fixed (57/77, 74% and haplogroup/sub-haplogroup-defining changes (i.e., population fixed changes, 20/77, 26%. The variant defining Caucasian haplogroup J (C295T increased the binding of TFAM (Electro Mobility Shift Assay and the capacity of in vitro L-strand transcription, especially of a shorter transcript that maps immediately upstream of conserved sequence block 1 (CSB1, a region associated with RNA priming of mtDNA replication. Consistent with this finding, cybrids (i.e., cells sharing the same nuclear genetic background but differing in their mtDNA backgrounds harboring haplogroup J mtDNA had a >2 fold increase in mtDNA copy number, as compared to cybrids containing haplogroup H, with no apparent differences in steady state levels of mtDNA-encoded transcripts. Hence, a haplogroup J regulatory region mutation affects mtDNA replication or stability, which may partially account for the phenotypic impact of this haplogroup. Our analysis thus demonstrates, for the first time, the functional impact of particular mtDNA

  4. Comparison of Flow Injection MS, NMR, and DNA Sequencing: Methods for Identification and Authentication of Black Cohosh (Actaea racemosa).

    Science.gov (United States)

    Harnly, James; Chen, Pei; Sun, Jianghao; Huang, Huilian; Colson, Kimberly L; Yuk, Jimmy; McCoy, Joe-Ann H; Reynaud, Danica T Harbaugh; Harrington, Peter B; Fletcher, Edward J

    2016-02-01

    Flow injection mass spectrometry and proton nuclear magnetic resonance spectrometry, two metabolic fingerprinting methods, and DNA sequencing were used to identify and authenticate Actaea species. Initially, samples of Actaea racemosa from a single source were distinguished from other Actaea species based on principal component analysis and soft independent modeling of class analogies of flow injection mass spectrometry and proton nuclear magnetic resonance spectrometry metabolic fingerprints. The chemometric results for flow injection mass spectrometry and proton nuclear magnetic resonance spectrometry agreed well and showed similar agreement throughout the study. DNA sequencing using DNA sequence data from two independent gene regions confirmed the metabolic fingerprinting results. Differences were observed between A. racemosa samples from four different sources, although the variance within species was still significantly less than the variance between species. A model based on the combined A. racemosa samples from the four sources consistently permitted distinction between species. Additionally, the combined A. racemosa samples were distinguishable from commercial root samples and from commercial supplements in tablet, capsule, or liquid form. DNA sequencing verified the lack of authenticity of the commercial roots but was unsuccessful in characterizing many of the supplements due to the lack of available DNA. PMID:26692457

  5. A conditional likelihood is required to estimate the selection coefficient in ancient DNA

    CERN Document Server

    Valleriani, Angelo

    2016-01-01

    Time-series of allele frequencies are a useful and unique set of data to determine the strength of natural selection on the background of genetic drift. Technically, the selection coefficient is estimated by means of a likelihood function built under the hypothesis that the available trajectory spans a sufficiently large portion of the fitness landscape. Especially for ancient DNA, however, often only one single such trajectories is available and the coverage of the fitness landscape is very limited. In fact, one single trajectory is more representative of a process conditioned both in the initial and in the final condition than of a process free to end anywhere. Based on the Moran model of population genetics, here we show how to build a likelihood function for the selection coefficient that takes the statistical peculiarity of single trajectories into account. We show that this conditional likelihood delivers a precise estimate of the selection coefficient also when allele frequencies are close to fixation ...

  6. The Effects of Paleoclimatic Events on Mediterranean Trout: Preliminary Evidences from Ancient DNA

    Science.gov (United States)

    Giovannotti, Massimo; Negri, Alessandra; Ruggeri, Paolo; Olivieri, Luigi; Nisi Cerioni, Paola; Lorenzoni, Massimo; Caputo Barucchi, Vincenzo

    2016-01-01

    In this pilot study for the first time, ancient DNA has been extracted from bone remains of Salmo trutta. These samples were from a stratigraphic succession located in a coastal cave of Calabria (southern Italy) inhabited by humans from upper Palaeolithic to historical times. Seven pairs of primers were used to PCR-amplify and sequence from 128 to 410 bp of the mtDNA control region of eleven samples. Three haplotypes were observed: two (ADcs-1 and MEcs-1) already described in rivers from the Italian peninsula; one (ATcs-33) belonging to the southern Atlantic clade of the AT Salmo trutta mtDNA lineage (sensu Bernatchez). The prehistoric occurrence of this latter haplotype in the water courses of the Italian peninsula has been detected for the first time in this study. Finally, we observed a correspondence between frequency of trout remains and variation in haplotype diversity that we related with ecological and demographic changes resulting from a period of rapid cooling known as the Younger Dryas. PMID:27331397

  7. Palaeoceanographic changes in Hornsund Fjord (Spitsbergen, Svalbard) over the last millennium: new insights from ancient DNA

    Science.gov (United States)

    Pawłowska, Joanna; Zajączkowski, Marek; Łącka, Magdalena; Lejzerowicz, Franck; Esling, Philippe; Pawlowski, Jan

    2016-07-01

    This paper presents a reconstruction of climate-driven environmental changes over the last millennium in Hornsund Fjord (Svalbard), based on sedimentological and micropalaeontological records. Our palaeo-investigation was supported by an analysis of foraminiferal ancient DNA (aDNA), focusing on the non-fossilized monothalamous species. The main climatic fluctuations during the last millennium were the Medieval Warm Period (MWP, AD 1000-1600), the Little Ice Age (LIA, AD 1600-1900) and the modern warming (MW, AD 1900 to present). Our study indicates that the environmental conditions in Hornsund during the MWP and the early LIA (before ˜ AD 1800) were relatively stable. The beginning of the LIA (˜ AD 1600) was poorly evidenced by the micropalaeontological record but was well marked in the aDNA data by an increased proportion of monothalamous foraminifera, especially Bathysiphon sp. The early LIA (˜ 1600 to ˜ AD 1800) was marked by an increase in the abundance of sequences of Hippocrepinella hirudinea and Cedhagenia saltatus. In the late LIA (after ˜ AD 1800), the conditions in the fjord became glacier-proximal and were characterized by increased meltwater outflows, high sedimentation and a high calving rate. This coincided with an increase in the percentages of sequences of Micrometula sp. and Vellaria pellucidus. During the MW, the major glacier fronts retreated rapidly to the inner bays, which limited the iceberg discharge to the fjord's centre and caused a shift in the foraminiferal community that was reflected in both the fossil and aDNA records. The palaeoceanographic changes in the Hornsund fjord over the last millennium were driven mainly by the inflow of shelf-originated water masses and glacial activity. However, the environmental changes were poorly evidenced in the micropalaeontological record, but they were well documented in our aDNA data. We considerably increased the number of potential proxy species by including monothalamous foraminifera in the

  8. Ancient genomics

    DEFF Research Database (Denmark)

    Der Sarkissian, Clio; Allentoft, Morten Erik; Avila Arcos, Maria del Carmen;

    2015-01-01

    The past decade has witnessed a revolution in ancient DNA (aDNA) research. Although the field's focus was previously limited to mitochondrial DNA and a few nuclear markers, whole genome sequences from the deep past can now be retrieved. This breakthrough is tightly connected to the massive sequence...... increasing the number of sequence reads to billions effectively means that contamination issues that have haunted aDNA research for decades, particularly in human studies, can now be efficiently and confidently quantified. At present, whole genomes have been sequenced from ancient anatomically modern humans......, archaic hominins, ancient pathogens and megafaunal species. Those have revealed important functional and phenotypic information, as well as unexpected adaptation, migration and admixture patterns. As such, the field of aDNA has entered the new era of genomics and has provided valuable information when...

  9. Ancient human genomics: the methodology behind reconstructing evolutionary pathways.

    Science.gov (United States)

    Marciniak, Stephanie; Klunk, Jennifer; Devault, Alison; Enk, Jacob; Poinar, Hendrik N

    2015-02-01

    High-throughput sequencing (HTS) has radically altered approaches to human evolutionary research. Recent contributions highlight that HTS is able to reach depths of the human lineage previously thought to be impossible. In this paper, we outline the methodological advances afforded by recent developments in DNA recovery, data output, scalability, speed, and resolution of the current sequencing technology. We review and critically evaluate the 'DNA pipeline' for ancient samples: from DNA extraction, to constructing immortalized sequence libraries, to enrichment strategies (e.g., polymerase chain reaction [PCR] and hybridization capture), and finally, to bioinformatic analyses of sequence data. We argue that continued evaluations and improvements to this process are essential to ensure sequence data validity. Also, we highlight the role of contamination and authentication in ancient DNA-HTS, which is particularly relevant to ancient human genomics, since sequencing the genomes of hominins such as Homo erectus and Homo heidelbergensis may soon be within the realm of possibility. PMID:25601038

  10. The genetic impact of Aztec imperialism: ancient mitochondrial DNA evidence from Xaltocan, Mexico.

    Science.gov (United States)

    Mata-Míguez, Jaime; Overholtzer, Lisa; Rodríguez-Alegría, Enrique; Kemp, Brian M; Bolnick, Deborah A

    2012-12-01

    In AD 1428, the city-states of Tenochtitlan, Texcoco, and Tlacopan formed the Triple Alliance, laying the foundations of the Aztec empire. Although it is well documented that the Aztecs annexed numerous polities in the Basin of Mexico over the following years, the demographic consequences of this expansion remain unclear. At the city-state capital of Xaltocan, 16th century documents suggest that the site's conquest and subsequent incorporation into the Aztec empire led to a replacement of the original Otomí population, whereas archaeological evidence suggests that some of the original population may have remained at the town under Aztec rule. To help address questions about Xaltocan's demographic history during this period, we analyzed ancient DNA from 25 individuals recovered from three houses rebuilt over time and occupied between AD 1240 and 1521. These individuals were divided into two temporal groups that predate and postdate the site's conquest. We determined the mitochondrial DNA haplogroup of each individual and identified haplotypes based on 372 base pair sequences of first hypervariable region. Our results indicate that the residents of these houses before and after the Aztec conquest have distinct haplotypes that are not closely related, and the mitochondrial compositions of the temporal groups are statistically different. Altogether, these results suggest that the matrilines present in the households were replaced following the Aztec conquest. This study therefore indicates that the Aztec expansion may have been associated with significant demographic and genetic changes within Xaltocan. PMID:23076995

  11. Myth or relict: Does ancient DNA detect the enigmatic Upland seal?

    Science.gov (United States)

    Salis, Alexander T; Easton, Luke J; Robertson, Bruce C; Gemmell, Neil; Smith, Ian W G; Weisler, Marshall I; Waters, Jonathan M; Rawlence, Nicolas J

    2016-04-01

    The biological status of the so-called 'Upland seal' has remained contentious ever since historical records described a distinct seal from the uplands of New Zealand's (NZ) remote sub-Antarctic islands. Subsequent genetic surveys of the NZ fur seal (Arctocephalus forsteri) detected two highly-divergent mtDNA clades, hypothesized to represent a post-sealing hybrid swarm between 'mainland' (Australia-NZ; A. forsteri) and sub-Antarctic (putative 'Upland'; A. snaresensis) lineages. We present ancient-DNA analyses of prehistoric mainland NZ and sub-Antarctic fur seals, revealing that both of these genetic lineages were already widely distributed across the region at the time of human arrival. These findings indicate that anthropogenic factors did not contribute to the admixture of these lineages, and cast doubt on the validity of the Upland seal. Human-mediated impacts on Arctocephalus genetic diversity are instead highlighted by a dramatic temporal haplotype frequency-shift due to genetic drift in heavily bottlenecked populations following the cessation of industrial-scale harvesting. These extinction-recolonisation dynamics add to a growing picture of human-mediated change in NZ's coastal and marine ecosystems. PMID:26768113

  12. Authentication of Cordyceps sinensis by DNA Analyses: Comparison of ITS Sequence Analysis and RAPD-Derived Molecular Markers.

    Science.gov (United States)

    Lam, Kelly Y C; Chan, Gallant K L; Xin, Gui-Zhong; Xu, Hong; Ku, Chuen-Fai; Chen, Jian-Ping; Yao, Ping; Lin, Huang-Quan; Dong, Tina T X; Tsim, Karl W K

    2015-01-01

    Cordyceps sinensis is an endoparasitic fungus widely used as a tonic and medicinal food in the practice of traditional Chinese medicine (TCM). In historical usage, Cordyceps specifically is referring to the species of C. sinensis. However, a number of closely related species are named themselves as Cordyceps, and they are sold commonly as C. sinensis. The substitutes and adulterants of C. sinensis are often introduced either intentionally or accidentally in the herbal market, which seriously affects the therapeutic effects or even leads to life-threatening poisoning. Here, we aim to identify Cordyceps by DNA sequencing technology. Two different DNA-based approaches were compared. The internal transcribed spacer (ITS) sequences and the random amplified polymorphic DNA (RAPD)-sequence characterized amplified region (SCAR) were developed here to authenticate different species of Cordyceps. Both approaches generally enabled discrimination of C. sinensis from others. The application of the two methods, supporting each other, increases the security of identification. For better reproducibility and faster analysis, the SCAR markers derived from the RAPD results provide a new method for quick authentication of Cordyceps. PMID:26694332

  13. Authentication of Cordyceps sinensis by DNA Analyses: Comparison of ITS Sequence Analysis and RAPD-Derived Molecular Markers

    Directory of Open Access Journals (Sweden)

    Kelly Y. C. Lam

    2015-12-01

    Full Text Available Cordyceps sinensis is an endoparasitic fungus widely used as a tonic and medicinal food in the practice of traditional Chinese medicine (TCM. In historical usage, Cordyceps specifically is referring to the species of C. sinensis. However, a number of closely related species are named themselves as Cordyceps, and they are sold commonly as C. sinensis. The substitutes and adulterants of C. sinensis are often introduced either intentionally or accidentally in the herbal market, which seriously affects the therapeutic effects or even leads to life-threatening poisoning. Here, we aim to identify Cordyceps by DNA sequencing technology. Two different DNA-based approaches were compared. The internal transcribed spacer (ITS sequences and the random amplified polymorphic DNA (RAPD-sequence characterized amplified region (SCAR were developed here to authenticate different species of Cordyceps. Both approaches generally enabled discrimination of C. sinensis from others. The application of the two methods, supporting each other, increases the security of identification. For better reproducibility and faster analysis, the SCAR markers derived from the RAPD results provide a new method for quick authentication of Cordyceps.

  14. Use DNA to learn from the past: how modern and ancient DNA studies may help reveal the past and predict the future distribution of species

    Science.gov (United States)

    Edwards, M. E.; Alsos, I. G.; Sjögren, P.; Coissac, E.; Gielly, L.; Yoccoz, N.; Føreid, M. K.; Taberlet, P.

    2015-12-01

    Knowledge of how climate change affected species distribution in the past may help us predict the effect of ongoing environmental changes. We explore how the use of modern (AFLP fingerprinting techniques) and ancient DNA (metabarcoding P6 loop of chloroplast DNA) help to reveal past distribution of vascular plant species, dispersal processes, and effect of species traits. Based on studies of modern DNA combined with species distribution models, we show the dispersal routes and barriers to dispersal throughout the circumarctic/circumboreal region, likely dispersal vectors, the cost of dispersal in term of loss of genetic diversity, and how these relates to species traits, dispersal distance, and size of colonized region. We also estimate the expected future distribution and loss of genetic diversity and show how this relates to life form and adaptations to dispersal. To gain more knowledge on time lags in past range change events, we rely on palaeorecords. Current data on past distribution are limited by the taxonomic and time resolution of macrofossil and pollen records. We show how this may be improved by studying ancient DNA of lake sediments. DNA of lake sediments recorded about half of the flora surrounding the lake. Compared to macrofossil, the taxonomic resolution is similar but the detection rate is considerable improved. By taking into account main determinants of founder effect, dispersal vectors, and dispersal lags, we may improve our ability to forecast effects of climate change, whereas more studies on ancient DNA may provide us with knowledge on distribution time lags.

  15. Ancient DNA reveals kinship burial patterns of a pre-Columbian Andean community

    Directory of Open Access Journals (Sweden)

    Baca Mateusz

    2012-04-01

    Full Text Available Abstract Background A detailed genetic study of the pre-Columbian population inhabiting the Tompullo 2 archaeological site (department Arequipa, Peru was undertaken to resolve the kin relationships between individuals buried in six different chullpas. Kin relationships were an important factor shaping the social organization in the pre-Columbian Andean communities, centering on the ayllu, a group of relatives that shared a common land and responsibilities. The aim of this study was to evaluate whether this Andean model of a social organization had an influence on mortuary practices, in particular to determine whether chullpas served as family graves. Results The remains of forty-one individuals were analyzed with both uniparental (mtDNA, Y–chromosome and biparental (autosomal microsatellites markers. Reproducible HVRI sequences, autosomal and Y chromosomal STR profiles were obtained for 24, 16 and 11 individuals, respectively. Mitochondrial DNA diversity was comparable to that of ancient and contemporary Andean populations. The Tompullo 2 population exhibited the closest relationship with the modern population from the same region. A kinship analysis revealed complex pattern of relations within and between the graves. However mean relatedness coefficients regarding the pairs of individuals buried in the same grave were significantly higher than those regarding pairs buried in different graves. The Y chromosome profiles of 11 males suggest that only members of one male line were buried in the same grave. Conclusions Genetic investigation of the population that inhabited Tompullo 2 site shows continuity between pre-Columbian and modern Native Amerindian populations inhabiting the Arequipa region. This suggests that no major demographic processes have influenced the mitochondrial DNA diversity of these populations during the past five hundred years. The kinship analysis involving uni- and biparental markers suggests that the community that

  16. DNA typing of ancient parasite eggs from environmental samples identifies human and animal worm infections in viking-age settlement

    DEFF Research Database (Denmark)

    Søe, Martin Jensen; Nejsum, Peter; Fredensborg, Brian Lund;

    2015-01-01

    Ancient parasite eggs were recovered from environmental samples collected at a Viking-age settlement in Viborg, Denmark, dated 1018-1030 A.D. Morphological examination identified Ascaris sp., Trichuris sp., and Fasciola sp. eggs, but size and shape did not allow species identification. By carefully...... selecting genetic markers, PCR amplification and sequencing of ancient DNA (aDNA) isolates resulted in identification of: the human whipworm, Trichuris trichiura, using SSUrRNA sequence homology; Ascaris sp. with 100% homology to cox1 haplotype 07; and Fasciola hepatica using ITS1 sequence homology. The...... identification of T. trichiura eggs indicates that human fecal material is present and, hence, that the Ascaris sp. haplotype 07 was most likely a human variant in Viking-age Denmark. The location of the F. hepatica finding suggests that sheep or cattle are the most likely hosts. Further, we sequenced the...

  17. Ancient DNA, pig domestication, and the spread of the Neolithic into Europe.

    Science.gov (United States)

    Larson, Greger; Albarella, Umberto; Dobney, Keith; Rowley-Conwy, Peter; Schibler, Jörg; Tresset, Anne; Vigne, Jean-Denis; Edwards, Ceiridwen J; Schlumbaum, Angela; Dinu, Alexandru; Balaçsescu, Adrian; Dolman, Gaynor; Tagliacozzo, Antonio; Manaseryan, Ninna; Miracle, Preston; Van Wijngaarden-Bakker, Louise; Masseti, Marco; Bradley, Daniel G; Cooper, Alan

    2007-09-25

    The Neolithic Revolution began 11,000 years ago in the Near East and preceded a westward migration into Europe of distinctive cultural groups and their agricultural economies, including domesticated animals and plants. Despite decades of research, no consensus has emerged about the extent of admixture between the indigenous and exotic populations or the degree to which the appearance of specific components of the "Neolithic cultural package" in Europe reflects truly independent development. Here, through the use of mitochondrial DNA from 323 modern and 221 ancient pig specimens sampled across western Eurasia, we demonstrate that domestic pigs of Near Eastern ancestry were definitely introduced into Europe during the Neolithic (potentially along two separate routes), reaching the Paris Basin by at least the early 4th millennium B.C. Local European wild boar were also domesticated by this time, possibly as a direct consequence of the introduction of Near Eastern domestic pigs. Once domesticated, European pigs rapidly replaced the introduced domestic pigs of Near Eastern origin throughout Europe. Domestic pigs formed a key component of the Neolithic Revolution, and this detailed genetic record of their origins reveals a complex set of interactions and processes during the spread of early farmers into Europe. PMID:17855556

  18. TA 30 - Archaeological Science Under a Microscope : Studies in Residue and Ancient DNA Analysis in Honour of Thomas H. Loy

    OpenAIRE

    Haslam, Michael; Kirkwood, Luke; Robertson, Gail; Crowther, Alison; Nugent, Sue

    2009-01-01

    These highly varied studies, spanning the world, demonstrate how much modern analyses of microscopic traces on artifacts are altering our perceptions of the past. Ranging from early humans to modern kings, from ancient Australian spears or Mayan pots to recent Maori cloaks, the contributions demonstrate how starches, raphides, hair, blood, feathers, resin and DNA have become essential elements in archaeology’s modern arsenal for reconstructing the daily, spiritual, and challenging aspects of ...

  19. Geochemical Analyses of Macrophytes (Potamogeton sp.) and ancient DNA from Lake Karakul, Tajikistan

    Science.gov (United States)

    Heinecke, Liv; Epp, Laura S.; Mischke, Steffen; Reschke, Maria; Stoof-Leichsenring, Kathleen; Rajabov, Ilhomjon; Herzschuh, Ulrike

    2016-04-01

    Mountain ecosystems are very sensitive towards changes in moisture and temperature and therefore most likely to be affected by climate change. To be able to get a closer insight into the alpine system of the Pamir Mountains, a 11.25 m long core was retrieved from the eastern basin of Lake Karakul (3,929 m asl), Tajikistan, in 2012. In order to gain insights into changes in the paleo-productivity of Lake Karakul over the last 29 cal kyrs BP, we investigate temporal gradients of elemental content (TOC, TN) and stable isotopes (δ13C, δ15N) of macrophyte remains (Potamogeton sp.) and plant communities obtained from ancient sedimentary DNA along the core. For the geochemical analyses we make use of the ability of submerged macrophytes, such as Potamogeton, to use HCO3- for photosynthesis in times of CO2 shortage and implement our results in a transfer function for paleo-productivity inferences. No data are available from 20 to 7 cal kyrs BP as no macrophyte remains are preserved, indicating unfavourable conditions for plant growth at the coring site or poor preservation conditions during this time. Biogeochemical analyses show significant variations from core base until approx. 20 cal kyrs BP with TOCPotamogeton 25-45 %, TNPotamogeton 0.5 % - 1.5 %, δ13CPotamogeton below -9 ‰ and δ15NPotamogeton of below 3.5 ‰ suggesting a cooler climate and reflecting the last glacial maximum. Sediments in the upper 4.5 m (approx. 6.7 cal kyrs BP) are rich in macrophyte remains. TOCPotamogeton and TNPotamogeton values from this part of the core are higher, and an enrichment of heavier isotopes with δ13CPotamogeton up to -7 ‰ and δ15NPotamogeton up to 6 ‰ indicating a higher productivity within the lake due to more favourable conditions for macrophyte growths on the lake floor. We assume shifts towards a warmer climate and changes in lake level as the dominating causes. Ancient sedimentary DNA was extracted from selected sediment slices and a metabarcoding approach (using

  20. DNA Profiling in Authentication of Panax Plants and Drugs: A New Approach to Old Problems

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    @@INTRODUCTION Ginseng is one of the famous herbs of all used by mankind as it has been valued for its remarkable therapeutic benefits as an energy tonic by the oriental people since the dawn of their civilization and has a rich and extensive history. Now Ginseng is becoming widely known and used in the West, and like any other Chinese drugs, the authentication of Ginseng must be understood in order to use it widely and appropriately.

  1. Ancient DNA from European early neolithic farmers reveals their near eastern affinities.

    Directory of Open Access Journals (Sweden)

    Wolfgang Haak

    Full Text Available In Europe, the Neolithic transition (8,000-4,000 B.C. from hunting and gathering to agricultural communities was one of the most important demographic events since the initial peopling of Europe by anatomically modern humans in the Upper Paleolithic (40,000 B.C.. However, the nature and speed of this transition is a matter of continuing scientific debate in archaeology, anthropology, and human population genetics. To date, inferences about the genetic make up of past populations have mostly been drawn from studies of modern-day Eurasian populations, but increasingly ancient DNA studies offer a direct view of the genetic past. We genetically characterized a population of the earliest farming culture in Central Europe, the Linear Pottery Culture (LBK; 5,500-4,900 calibrated B.C. and used comprehensive phylogeographic and population genetic analyses to locate its origins within the broader Eurasian region, and to trace potential dispersal routes into Europe. We cloned and sequenced the mitochondrial hypervariable segment I and designed two powerful SNP multiplex PCR systems to generate new mitochondrial and Y-chromosomal data from 21 individuals from a complete LBK graveyard at Derenburg Meerenstieg II in Germany. These results considerably extend the available genetic dataset for the LBK (n = 42 and permit the first detailed genetic analysis of the earliest Neolithic culture in Central Europe (5,500-4,900 calibrated B.C.. We characterized the Neolithic mitochondrial DNA sequence diversity and geographical affinities of the early farmers using a large database of extant Western Eurasian populations (n = 23,394 and a wide range of population genetic analyses including shared haplotype analyses, principal component analyses, multidimensional scaling, geographic mapping of genetic distances, and Bayesian Serial Simcoal analyses. The results reveal that the LBK population shared an affinity with the modern-day Near East and Anatolia, supporting

  2. DNA Barcode Authentication of Wood Samples of Threatened and Commercial Timber Trees within the Tropical Dry Evergreen Forest of India

    Science.gov (United States)

    Nithaniyal, Stalin; Newmaster, Steven G.; Ragupathy, Subramanyam; Krishnamoorthy, Devanathan; Vassou, Sophie Lorraine; Parani, Madasamy

    2014-01-01

    Background India is rich with biodiversity, which includes a large number of endemic, rare and threatened plant species. Previous studies have used DNA barcoding to inventory species for applications in biodiversity monitoring, conservation impact assessment, monitoring of illegal trading, authentication of traded medicinal plants etc. This is the first tropical dry evergreen forest (TDEF) barcode study in the World and the first attempt to assemble a reference barcode library for the trees of India as part of a larger project initiated by this research group. Methodology/Principal Findings We sampled 429 trees representing 143 tropical dry evergreen forest (TDEF) species, which included 16 threatened species. DNA barcoding was completed using rbcL and matK markers. The tiered approach (1st tier rbcL; 2nd tier matK) correctly identified 136 out of 143 species (95%). This high level of species resolution was largely due to the fact that the tree species were taxonomically diverse in the TDEF. Ability to resolve taxonomically diverse tree species of TDEF was comparable among the best match method, the phylogenetic method, and the characteristic attribute organization system method. Conclusions We demonstrated the utility of the TDEF reference barcode library to authenticate wood samples from timber operations in the TDEF. This pilot research study will enable more comprehensive surveys of the illegal timber trade of threatened species in the TDEF. This TDEF reference barcode library also contains trees that have medicinal properties, which could be used to monitor unsustainable and indiscriminate collection of plants from the wild for their medicinal value. PMID:25259794

  3. DNA barcode authentication of wood samples of threatened and commercial timber trees within the tropical dry evergreen forest of India.

    Directory of Open Access Journals (Sweden)

    Stalin Nithaniyal

    Full Text Available BACKGROUND: India is rich with biodiversity, which includes a large number of endemic, rare and threatened plant species. Previous studies have used DNA barcoding to inventory species for applications in biodiversity monitoring, conservation impact assessment, monitoring of illegal trading, authentication of traded medicinal plants etc. This is the first tropical dry evergreen forest (TDEF barcode study in the World and the first attempt to assemble a reference barcode library for the trees of India as part of a larger project initiated by this research group. METHODOLOGY/PRINCIPAL FINDINGS: We sampled 429 trees representing 143 tropical dry evergreen forest (TDEF species, which included 16 threatened species. DNA barcoding was completed using rbcL and matK markers. The tiered approach (1st tier rbcL; 2nd tier matK correctly identified 136 out of 143 species (95%. This high level of species resolution was largely due to the fact that the tree species were taxonomically diverse in the TDEF. Ability to resolve taxonomically diverse tree species of TDEF was comparable among the best match method, the phylogenetic method, and the characteristic attribute organization system method. CONCLUSIONS: We demonstrated the utility of the TDEF reference barcode library to authenticate wood samples from timber operations in the TDEF. This pilot research study will enable more comprehensive surveys of the illegal timber trade of threatened species in the TDEF. This TDEF reference barcode library also contains trees that have medicinal properties, which could be used to monitor unsustainable and indiscriminate collection of plants from the wild for their medicinal value.

  4. Absence of Ancient DNA in Sub-Fossil Insect Inclusions Preserved in ‘Anthropocene’ Colombian Copal

    Science.gov (United States)

    Penney, David; Wadsworth, Caroline; Fox, Graeme; Kennedy, Sandra L.; Preziosi, Richard F.; Brown, Terence A.

    2013-01-01

    Insects preserved in copal, the sub-fossilized resin precursor of amber, have potential value in molecular ecological studies of recently-extinct species and of extant species that have never been collected as living specimens. The objective of the work reported in this paper was therefore to determine if ancient DNA is present in insects preserved in copal. We prepared DNA libraries from two stingless bees (Apidae: Meliponini: Trigonisca ameliae) preserved in ‘Anthropocene’ Colombian copal, dated to ‘post-Bomb’ and 10,612±62 cal yr BP, respectively, and obtained sequence reads using the GS Junior 454 System. Read numbers were low, but were significantly higher for DNA extracts prepared from crushed insects compared with extracts obtained by a non-destructive method. The younger specimen yielded sequence reads up to 535 nucleotides in length, but searches of these sequences against the nucleotide database revealed very few significant matches. None of these hits was to stingless bees though one read of 97 nucleotides aligned with two non-contiguous segments of the mitochondrial cytochrome oxidase subunit I gene of the East Asia bumblebee Bombus hypocrita. The most significant hit was for 452 nucleotides of a 470-nucleotide read that aligned with part of the genome of the root-nodulating bacterium Bradyrhizobium japonicum. The other significant hits were to proteobacteria and an actinomycete. Searches directed specifically at Apidae nucleotide sequences only gave short and insignificant alignments. All of the reads from the older specimen appeared to be artefacts. We were therefore unable to obtain any convincing evidence for the preservation of ancient DNA in either of the two copal inclusions that we studied, and conclude that DNA is not preserved in this type of material. Our results raise further doubts about claims of DNA extraction from fossil insects in amber, many millions of years older than copal. PMID:24039876

  5. A preliminary analysis of the DNA and diet of the extinct Beothuk: a systematic approach to ancient human DNA

    DEFF Research Database (Denmark)

    Kuch, Melanie; Gröcke, Darren R; Knyf, Martin C;

    2007-01-01

    , which fall within haplogroups X and C, consistent with Northeastern Native populations today. In addition we have sexed the male using a novel-sexing assay and confirmed the authenticity of his Y chromosome with the presence of the Native American specific Y-QM3 single nucleotide polymorphism (SNP...

  6. DNA Barcoding of the Endangered Aquilaria (Thymelaeaceae) and Its Application in Species Authentication of Agarwood Products Traded in the Market.

    Science.gov (United States)

    Lee, Shiou Yih; Ng, Wei Lun; Mahat, Mohd Noor; Nazre, Mohd; Mohamed, Rozi

    2016-01-01

    The identification of Aquilaria species from their resinous non-wood product, the agarwood, is challenging as conventional techniques alone are unable to ascertain the species origin. Aquilaria is a highly protected species due to the excessive exploitation of its precious agarwood. Here, we applied the DNA barcoding technique to generate barcode sequences for Aquilaria species and later applied the barcodes to identify the source species of agarwood found in the market. We developed a reference DNA barcode library using eight candidate barcode loci (matK, rbcL, rpoB, rpoC1, psbA-trnH, trnL-trnF, ITS, and ITS2) amplified from 24 leaf accessions of seven Aquilaria species obtained from living trees. Our results indicated that all single barcodes can be easily amplified and sequenced with the selected primers. The combination of trnL-trnF+ITS and trnL-trnF+ITS2 yielded the greatest species resolution using the least number of loci combination, while matK+trnL-trnF+ITS showed potential in detecting the geographical origins of Aquilaria species. We propose trnL-trnF+ITS2 as the best candidate barcode for Aquilaria as ITS2 has a shorter sequence length compared to ITS, which eases PCR amplification especially when using degraded DNA samples such as those extracted from processed agarwood products. A blind test conducted on eight agarwood samples in different forms using the proposed barcode combination proved successful in their identification up to the species level. Such potential of DNA barcoding in identifying the source species of agarwood will contribute to the international timber trade control, by providing an effective method for species identification and product authentication. PMID:27128309

  7. DNA Barcoding of the Endangered Aquilaria (Thymelaeaceae) and Its Application in Species Authentication of Agarwood Products Traded in the Market

    Science.gov (United States)

    Lee, Shiou Yih; Ng, Wei Lun; Mahat, Mohd Noor; Nazre, Mohd; Mohamed, Rozi

    2016-01-01

    The identification of Aquilaria species from their resinous non-wood product, the agarwood, is challenging as conventional techniques alone are unable to ascertain the species origin. Aquilaria is a highly protected species due to the excessive exploitation of its precious agarwood. Here, we applied the DNA barcoding technique to generate barcode sequences for Aquilaria species and later applied the barcodes to identify the source species of agarwood found in the market. We developed a reference DNA barcode library using eight candidate barcode loci (matK, rbcL, rpoB, rpoC1, psbA-trnH, trnL-trnF, ITS, and ITS2) amplified from 24 leaf accessions of seven Aquilaria species obtained from living trees. Our results indicated that all single barcodes can be easily amplified and sequenced with the selected primers. The combination of trnL-trnF+ITS and trnL-trnF+ITS2 yielded the greatest species resolution using the least number of loci combination, while matK+trnL-trnF+ITS showed potential in detecting the geographical origins of Aquilaria species. We propose trnL-trnF+ITS2 as the best candidate barcode for Aquilaria as ITS2 has a shorter sequence length compared to ITS, which eases PCR amplification especially when using degraded DNA samples such as those extracted from processed agarwood products. A blind test conducted on eight agarwood samples in different forms using the proposed barcode combination proved successful in their identification up to the species level. Such potential of DNA barcoding in identifying the source species of agarwood will contribute to the international timber trade control, by providing an effective method for species identification and product authentication. PMID:27128309

  8. Ancient Paleo-DNA of Pre-Copper Age North-Eastern Europe: Establishing the Migration Traces of R1a1 Y-DNA Haplogroup

    Directory of Open Access Journals (Sweden)

    Alexander S. Semenov

    2016-03-01

    Full Text Available The work considers the problems of paleogenetics and anthropology connected with problem of pre-Copper Age after-Glacial repopulation process of the North-Eastern Europe. The unified data, obtained in various laboratories in 2010-2016, collects a certain amount of the ancient mt-DNA and Y-DNA haplogroup samples of the considered period, what allows establishing the connection between some of them, comparing them with the data of neighboring regions, and attributing them to certain migration flows traceable in archeology. The paper makes an attempt to build a picture of the population of North-Eastern Europe in pre-Copper Age time and to systemize the paleo DNA genotyping results into clusters corresponding to different migration waves. The paper can be of use for biomedical purposes also, as some correlations between diseases and haplogroups were noticed in various medical works.

  9. Genetic diversity loss in a biodiversity hotspot: ancient DNA quantifies genetic decline and former connectivity in a critically endangered marsupial.

    Science.gov (United States)

    Pacioni, Carlo; Hunt, Helen; Allentoft, Morten E; Vaughan, Timothy G; Wayne, Adrian F; Baynes, Alexander; Haouchar, Dalal; Dortch, Joe; Bunce, Michael

    2015-12-01

    The extent of genetic diversity loss and former connectivity between fragmented populations are often unknown factors when studying endangered species. While genetic techniques are commonly applied in extant populations to assess temporal and spatial demographic changes, it is no substitute for directly measuring past diversity using ancient DNA (aDNA). We analysed both mitochondrial DNA (mtDNA) and nuclear microsatellite loci from 64 historical fossil and skin samples of the critically endangered Western Australian woylie (Bettongia penicillata ogilbyi), and compared them with 231 (n = 152 for mtDNA) modern samples. In modern woylie populations 15 mitochondrial control region (CR) haplotypes were identified. Interestingly, mtDNA CR data from only 29 historical samples demonstrated 15 previously unknown haplotypes and detected an extinct divergent clade. Through modelling, we estimated the loss of CR mtDNA diversity to be between 46% and 91% and estimated this to have occurred in the past 2000-4000 years in association with a dramatic population decline. In addition, we obtained near-complete 11-loci microsatellite profiles from 21 historical samples. In agreement with the mtDNA data, a number of 'new' microsatellite alleles was only detected in the historical populations despite extensive modern sampling, indicating a nuclear genetic diversity loss >20%. Calculations of genetic diversity (heterozygosity and allelic rarefaction) showed that these were significantly higher in the past and that there was a high degree of gene flow across the woylie's historical range. These findings have an immediate impact on how the extant populations are managed and we recommend the implementation of an assisted migration programme to prevent further loss of genetic diversity. Our study demonstrates the value of integrating aDNA data into current-day conservation strategies. PMID:26497007

  10. Genetic diversity among ancient Nordic populations.

    Directory of Open Access Journals (Sweden)

    Linea Melchior

    Full Text Available Using established criteria for work with fossil DNA we have analysed mitochondrial DNA from 92 individuals from 18 locations in Denmark ranging in time from the Mesolithic to the Medieval Age. Unequivocal assignment of mtDNA haplotypes was possible for 56 of the ancient individuals; however, the success rate varied substantially between sites; the highest rates were obtained with untouched, freshly excavated material, whereas heavy handling, archeological preservation and storage for many years influenced the ability to obtain authentic endogenic DNA. While the nucleotide diversity at two locations was similar to that among extant Danes, the diversity at four sites was considerably higher. This supports previous observations for ancient Britons. The overall occurrence of haplogroups did not deviate from extant Scandinavians, however, haplogroup I was significantly more frequent among the ancient Danes (average 13% than among extant Danes and Scandinavians (approximately 2.5% as well as among other ancient population samples reported. Haplogroup I could therefore have been an ancient Southern Scandinavian type "diluted" by later immigration events. Interestingly, the two Neolithic samples (4,200 YBP, Bell Beaker culture that were typed were haplogroup U4 and U5a, respectively, and the single Bronze Age sample (3,300-3,500 YBP was haplogroup U4. These two haplogroups have been associated with the Mesolithic populations of Central and Northern Europe. Therefore, at least for Southern Scandinavia, our findings do not support a possible replacement of a haplogroup U dominated hunter-gatherer population by a more haplogroup diverse Neolithic Culture.

  11. Ancient DNA analyses reveal contrasting phylogeographic patterns amongst kiwi (Apteryx spp. and a recently extinct lineage of spotted kiwi.

    Directory of Open Access Journals (Sweden)

    Lara D Shepherd

    Full Text Available The little spotted kiwi (Apteryx owenii is a flightless ratite formerly found throughout New Zealand but now greatly reduced in distribution. Previous phylogeographic studies of the related brown kiwi (A. mantelli, A. rowi and A. australis, with which little spotted kiwi was once sympatric, revealed extremely high levels of genetic structuring, with mitochondrial DNA haplotypes often restricted to populations. We surveyed genetic variation throughout the present and pre-human range of little spotted kiwi by obtaining mitochondrial DNA sequences from contemporary and ancient samples. Little spotted kiwi and great spotted kiwi (A. haastii formed a monophyletic clade sister to brown kiwi. Ancient samples of little spotted kiwi from the northern North Island, where it is now extinct, formed a lineage that was distinct from remaining little spotted kiwi and great spotted kiwi lineages, potentially indicating unrecognized taxonomic diversity. Overall, little spotted kiwi exhibited much lower levels of genetic diversity and structuring than brown kiwi, particularly through the South Island. Our results also indicate that little spotted kiwi (or at least hybrids involving this species survived on the South Island mainland until more recently than previously thought.

  12. Ancient DNA from South-East Europe Reveals Different Events during Early and Middle Neolithic Influencing the European Genetic Heritage.

    Science.gov (United States)

    Hervella, Montserrat; Rotea, Mihai; Izagirre, Neskuts; Constantinescu, Mihai; Alonso, Santos; Ioana, Mihai; Lazăr, Cătălin; Ridiche, Florin; Soficaru, Andrei Dorian; Netea, Mihai G; de-la-Rua, Concepcion

    2015-01-01

    The importance of the process of Neolithization for the genetic make-up of European populations has been hotly debated, with shifting hypotheses from a demic diffusion (DD) to a cultural diffusion (CD) model. In this regard, ancient DNA data from the Balkan Peninsula, which is an important source of information to assess the process of Neolithization in Europe, is however missing. In the present study we show genetic information on ancient populations of the South-East of Europe. We assessed mtDNA from ten sites from the current territory of Romania, spanning a time-period from the Early Neolithic to the Late Bronze Age. mtDNA data from Early Neolithic farmers of the Starčevo Criş culture in Romania (Cârcea, Gura Baciului and Negrileşti sites), confirm their genetic relationship with those of the LBK culture (Linienbandkeramik Kultur) in Central Europe, and they show little genetic continuity with modern European populations. On the other hand, populations of the Middle-Late Neolithic (Boian, Zau and Gumelniţa cultures), supposedly a second wave of Neolithic migration from Anatolia, had a much stronger effect on the genetic heritage of the European populations. In contrast, we find a smaller contribution of Late Bronze Age migrations to the genetic composition of Europeans. Based on these findings, we propose that permeation of mtDNA lineages from a second wave of Middle-Late Neolithic migration from North-West Anatolia into the Balkan Peninsula and Central Europe represent an important contribution to the genetic shift between Early and Late Neolithic populations in Europe, and consequently to the genetic make-up of modern European populations. PMID:26053041

  13. Dirt, dates and DNA: Single-grain OSL and radiocarbon chronologies of perennially-frozen sediments, and their implications for sedimentary ancient DNA studies

    Science.gov (United States)

    Arnold, Lee J.; Roberts, Richard G.; Demuro, Martina; Macphee, Ross D. E.; Froese, Duane G.; Brock, Fiona; Willerslev, Eske

    2010-05-01

    Recent studies using 'sedimentary' ancient DNA (sedaDNA) techniques have demonstrated that sequence-based taxonomic identifications can be reliably made from perennially-frozen bulk sediment samples that are up to several hundred thousand years old. Amongst other possible uses, this technique provides the opportunity to search for genetic traces of extinct fauna in contexts in which in situ macrofossils are exceedingly rare or absent. In well controlled circumstances, sedaDNA can provide a sensitive tool for investigating species evolution and extinction dynamics. The use of sedaDNA techniques for this purpose, however, is reliant on the provision of reliable numerical age control directly on the bulk sediments from which DNA is extracted for analysis. An implicit assumption of the sedaDNA approach is that the extracted DNA is autochthonous with the host deposit and that it has not been physically transported from older source deposits or reworked within the sedimentary profile by post-depositional mixing. In this paper we investigate whether these fundamental conditions are upheld for (i) a range of perennially-frozen wetland sites across the Taimyr Peninsula and adjacent coastal lowlands of north-central Siberia, and (ii) locally-derived, perennially-frozen, loess sediments exposed along a 14.5 m thick river bluff sequence at the Stevens Village site, interior Alaska. Single-grain optically stimulated luminescence (OSL) and radiocarbon (14C) dating are combined to constrain the ages of both the inorganic and organic fractions of perennially-frozen deposits from which sedaDNA of extinct and extant species have been recovered. In doing so, we aim to provide new insights into the physical processes that can affect perennially-frozen sedaDNA sequences in high-latitude regions. OSL and 14C age/depth profiles, as well as single-grain equivalent dose (De) distribution characteristics, are used to assess the stratigraphic integrity of these sedaDNA sequences by (i

  14. A comparative study of ancient sedimentary DNA, pollen and macrofossils from permafrost sediments of northern Siberia reveals long-term vegetational stability

    DEFF Research Database (Denmark)

    Jørgensen, Tina; Haile, James Seymour; Möller, Per; Andreev, Andrei; Boessenkool, Sanne; Rasmussen, Morten; Kienast, Frank; Coissac, Eric; Taberlet, Pierre; Brochmann, Christian; Bigelow, Nancy H; Andersen, Kenneth; Orlando, Ludovic Antoine Alexandre; Gilbert, M Thomas P; Willerslev, Eske

    2012-01-01

    Although ancient DNA from sediments (sedaDNA) has been used to investigate past ecosystems, the approach has never been directly compared with the traditional methods of pollen and macrofossil analysis. We conducted a comparative survey of 18 ancient permafrost samples spanning the Late Pleistocene...... (46-12.5 thousand years ago), from the Taymyr Peninsula in northern Siberia. The results show that pollen, macrofossils and sedaDNA are complementary rather than overlapping and, in combination, reveal more detailed information on plant palaeocommunities than can be achieved by each individual...... approach. SedaDNA and macrofossils share greater overlap in plant identifications than with pollen, suggesting that sedaDNA is local in origin. These two proxies also permit identification to lower taxonomic levels than pollen, enabling investigation into temporal changes in species composition and the...

  15. Ancient DNA Assessment of Tiger Salamander Population in Yellowstone National Park

    OpenAIRE

    McMenamin, Sarah K.; Hadly, Elizabeth A.

    2012-01-01

    Recent data indicates that blotched tiger salamanders (Ambystoma tigrinum melanostictum) in northern regions of Yellowstone National Park are declining due to climate-related habitat changes. In this study, we used ancient and modern mitochondrial haplotype diversity to model the effective size of this amphibian population through recent geological time and to assess past responses to climatic changes in the region. Using subfossils collected from a cave in northern Yellowstone, we analyzed >...

  16. DNA Barcode-Based PCR-RFLP and Diagnostic PCR for Authentication of Jinqian Baihua She (Bungarus Parvus).

    Science.gov (United States)

    Li, Xiaolei; Zeng, Weiping; Liao, Jing; Liang, Zhenbiao; Huang, Shuhua; Chao, Zhi

    2015-01-01

    We established polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) and diagnostic PCR based on cytochrome C oxidase subunit I (COI) barcodes of Bungarus multicinctus, genuine Jinqian Baihua She (JBS), and adulterant snake species. The PCR-RFLP system utilizes the specific restriction sites of SpeI and BstEII in the COI sequence of B. multicinctus to allow its cleavage into 3 fragments (120 bp, 230 bp, and 340 bp); the COI sequences of the adulterants do not contain these restriction sites and therefore remained intact after digestion with SpeI and BstEII (except for that of Zaocys dhumnades, which could be cleaved into a 120 bp and a 570 bp fragment). For diagnostic PCR, a pair of species-specific primers (COI37 and COI337) was designed to amplify a specific 300 bp amplicon from the genomic DNA of B. multicinctus; no such amplicons were found in other allied species. We tested the two methods using 11 commercial JBS samples, and the results demonstrated that barcode-based PCR-RFLP and diagnostic PCR both allowed effective and accurate authentication of JBS. PMID:26078770

  17. DNA Barcode-Based PCR-RFLP and Diagnostic PCR for Authentication of Jinqian Baihua She (Bungarus Parvus

    Directory of Open Access Journals (Sweden)

    Xiaolei Li

    2015-01-01

    Full Text Available We established polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP and diagnostic PCR based on cytochrome C oxidase subunit I (COI barcodes of Bungarus multicinctus, genuine Jinqian Baihua She (JBS, and adulterant snake species. The PCR-RFLP system utilizes the specific restriction sites of SpeI and BstEII in the COI sequence of B. multicinctus to allow its cleavage into 3 fragments (120 bp, 230 bp, and 340 bp; the COI sequences of the adulterants do not contain these restriction sites and therefore remained intact after digestion with SpeI and BstEII (except for that of Zaocys dhumnades, which could be cleaved into a 120 bp and a 570 bp fragment. For diagnostic PCR, a pair of species-specific primers (COI37 and COI337 was designed to amplify a specific 300 bp amplicon from the genomic DNA of B. multicinctus; no such amplicons were found in other allied species. We tested the two methods using 11 commercial JBS samples, and the results demonstrated that barcode-based PCR-RFLP and diagnostic PCR both allowed effective and accurate authentication of JBS.

  18. An authenticity survey of herbal medicines from markets in China using DNA barcoding.

    Science.gov (United States)

    Han, Jianping; Pang, Xiaohui; Liao, Baosheng; Yao, Hui; Song, Jingyuan; Chen, Shilin

    2016-01-01

    Adulterant herbal materials are a threat to consumer safety. In this study, we used DNA barcoding to investigate the proportions and varieties of adulterant species in traditional Chinese medicine (TCM) markets. We used a DNA barcode database of TCM (TCMD) that was established by our group to investigate 1436 samples representing 295 medicinal species from 7 primary TCM markets in China. The results indicate that ITS2 barcodes could be generated for most of the samples (87.7%) using a standard protocol. Of the 1260 samples, approximately 4.2% were identified as adulterants. The adulterant focused on medicinal species such as Ginseng Radix et Rhizoma (Renshen), Radix Rubi Parvifolii (Maomeigen), Dalbergiae odoriferae Lignum (Jiangxiang), Acori Tatarinowii Rhizoma (Shichangpu), Inulae Flos (Xuanfuhua), Lonicerae Japonicae Flos (Jinyinhua), Acanthopanacis Cortex (Wujiapi) and Bupleuri Radix (Chaihu). The survey revealed that adulterant species are present in the Chinese market, and these adulterants pose a risk to consumer health. Thus, regulatory measures should be adopted immediately. We suggest that a traceable platform based on DNA barcode sequences be established for TCM market supervision. PMID:26740340

  19. Authentication of ruta graveolens and its adulterant using internal transcribed spacer (its) sequences of nuclear ribosomal DNA

    International Nuclear Information System (INIS)

    Ruta graveolens L. (Rutaceae) is commonly known as 'Sudab' which is well known for hippocratic medicine and is commonly used in indigenous health-care system in India. Euphorbia dracunculoides Lam. (Euphorbiaceae) in raw drug trading has almost similar morphology to R. graveolens in dried state, is being sold locally or used clinically as an adulterant of R. graveolens (genuine) at a relatively low price under the same name 'Sudab' which has ultimately reduced the efficacy and quality of this herb. The internal transcribed spacer (ITS) sequence of nuclear ribosomal DNA gene of genuine and adulterant were sequenced and analyzed to assess species admixture in raw drug trading of genuine herbal drug. The BLAST search results of ITS sequence of genuine sample of 'Sudab' i.e., R. graveolens showed 99% similarity to the sequence of R. graveolens, however, E. dracunculoides showed 100% similarity to the species of Euphorbia and did not show any similarity with R. graveolens. The sequence alignment of both species was entirely different to each other. Phylogenetic analysis based on ITS sequence of adulterant sample i.e., E. dracunculoides together with sequences of Euphorbia species available in the GenBank has also clearly showed its nesting within the Euphorbia tree. The generated ITS sequences of both samples in the present study may be referred hereafter as species-specific DNA barcode signature, which can be used in authenticating and validating the exact species identities to discriminate the genuine sample of 'Sudab' from its adulterants if any available to guarantee the quality and purity of this drug in the herbal drug market. (author)

  20. Authentication of shankhpushpi by RAPD markers

    Directory of Open Access Journals (Sweden)

    Showkat Hussain Ganie

    2012-05-01

    Full Text Available Background: “Shankhpushpi”, an important indigenous drug of Ayurveda, an ancient system of Indian medicine, improves memory power and intellect. It is used in many Ayurvedic formulations, either singly or in combination with other herbs, meant for sleeplessness, epilepsy, hallucinations and anxiety. At least three different plant species viz., Clitoria ternatea, Convolvulus pluricaulis and Evolvulus alsinoides are as the source of this drug in the different parts of the country. Because of increased demand and high price, shankhpushpi is often adulterated in the trade by other related species. Therefore, a reliable authentication method is needed to facilitate differentiation/identification of the genuine material from its adulterants. The present study was aimed at developing RAPD-based markers for identification of C. pluricaulis, E. alsinoides and C. ternatea, and analyzing the market samples of the drug to ascertain their authenticity. Material and Methods: Fresh samples of source plants of shankhpushpi were collected from Ghaziabad and Delhi. The market samples were procured from the crude-drug markets of different geographical regions of India. The amplified polymorphic DNA (RAPD technique was employed for characterization of genuine and market samples. Twenty-five 11-mer oligonucleotide primers were used to amplify the DNA isolated. Results: Out of 25 primers, only four (OPN-03, OPN-04, OPN-05 and OPN-06 yielded amplification products that produced clear and reproducible bands, which were used to characterize the market samples. RAPD profile of some market samples did not match with the authentic samples, indicating that these samples were either adulterated or spurious. Conclusion: The RAPD markers developed in this study may provide guidance for the authentication of plant materials traded as shankhpushpi.

  1. Ancient DNA analysis of the oldest canid species from the Siberian Arctic and genetic contribution to the domestic dog.

    Directory of Open Access Journals (Sweden)

    Esther J Lee

    Full Text Available Modern Arctic Siberia provides a wealth of resources for archaeological, geological, and paleontological research to investigate the population dynamics of faunal communities from the Pleistocene, particularly as the faunal material coming from permafrost has proven suitable for genetic studies. In order to examine the history of the Canid species in the Siberian Arctic, we carried out genetic analysis of fourteen canid remains from various sites, including the well-documented Upper Paleolithic Yana RHS and Early Holocene Zhokhov Island sites. Estimated age of samples range from as recent as 1,700 years before present (YBP to at least 360,000 YBP for the remains of the extinct wolf, Canis cf. variabilis. In order to examine the genetic affinities of ancient Siberian canids species to the domestic dog and modern wolves, we obtained mitochondrial DNA control region sequences and compared them to published ancient and modern canid sequences. The older canid specimens illustrate affinities with pre-domestic dog/wolf lineages while others appear in the major phylogenetic clades of domestic dogs. Our results suggest a European origin of domestic dog may not be conclusive and illustrates an emerging complexity of genetic contribution of regional wolf breeds to the modern Canis gene pool.

  2. Ancient DNA Analysis Suggests Negligible Impact of the Wari Empire Expansion in Peru's Central Coast during the Middle Horizon.

    Directory of Open Access Journals (Sweden)

    Guido Valverde

    Full Text Available The analysis of ancient human DNA from South America allows the exploration of pre-Columbian population history through time and to directly test hypotheses about cultural and demographic evolution. The Middle Horizon (650-1100 AD represents a major transitional period in the Central Andes, which is associated with the development and expansion of ancient Andean empires such as Wari and Tiwanaku. These empires facilitated a series of interregional interactions and socio-political changes, which likely played an important role in shaping the region's demographic and cultural profiles. We analyzed individuals from three successive pre-Columbian cultures present at the Huaca Pucllana archaeological site in Lima, Peru: Lima (Early Intermediate Period, 500-700 AD, Wari (Middle Horizon, 800-1000 AD and Ychsma (Late Intermediate Period, 1000-1450 AD. We sequenced 34 complete mitochondrial genomes to investigate the potential genetic impact of the Wari Empire in the Central Coast of Peru. The results indicate that genetic diversity shifted only slightly through time, ruling out a complete population discontinuity or replacement driven by the Wari imperialist hegemony, at least in the region around present-day Lima. However, we caution that the very subtle genetic contribution of Wari imperialism at the particular Huaca Pucllana archaeological site might not be representative for the entire Wari territory in the Peruvian Central Coast.

  3. Transcriptional profiling in C. elegans suggests DNA damage dependent apoptosis as an ancient function of the p53 family

    Directory of Open Access Journals (Sweden)

    Rothblatt Jonathan

    2008-07-01

    transcriptional induction of BH3 domain proteins is likely to be an ancient DNA damage response function of the p53 family. Interestingly, although the apoptotic response to DNA damage is regulated through the transcriptional activity of CEP-1, other DNA damage responses do not appear to be regulated on the transcriptional level and do not require the p53 like gene cep-1.

  4. Authentic Creation of Imitative Ancient Town Tourism: A Case Study of Yi Ancient Town of Chuxiong Prefecture, Yunnan Province%模仿式古镇旅游的真实性创造——以云南省楚雄州彝人古镇为例

    Institute of Scientific and Technical Information of China (English)

    张文芬

    2012-01-01

    随着旅游多样化发展,传统旅游资源已难以满足现代旅游者的需求,以彝人古镇为例,模仿式旅游资源随之应运而生。对旅游古镇的研究,虽然已有的研究内容及视角等都具有多样性,但从真实性视角对新出现的模仿式古镇进行的研究却知之甚少。彝人古镇是模仿式的,它没有原生文化系统却以彝族文化为依托,不是真实的传统古镇却给游客真实的旅游体验,所以,模仿式古镇的开发是值得倡导的,只是在开发时必须遵循文化的本质,避免文化因旅游而变迁或遗失。%With the development of tourism diversification, traditional tourism resources are difficult to meet the demand of modem tourists. Imitative tourism resources such as Yi Ancient Town have been built. Although the content and the perspective of the current study on ancient tourism town are very diverse, the study on new emerging imitative ancient town in the view of authenticity is little known. Yi Ancient Town is a style of imitation without native cultural system, but based on the culture of Yi people, which is not a traditional town in the true sense, but visitors who can enjoy a real experience for themselves in the town. Therefore, it is worth advocating the development of the imitative ancient town, but its development should follow the cultural nature and avoid the' changes or the losses of its culture.

  5. The last Viking King: a royal maternity case solved by ancient DNA analysis

    DEFF Research Database (Denmark)

    Dissing, Jørgen; Binladen, Jonas; Hansen, Anders;

    2006-01-01

    Estridsen to haplogroup H; Estrid's sequence differed from that of Sven at two positions in HVR-1, 16093T-->C and 16304T-->C, indicating that she belongs to subgroup H5a. Given the maternal inheritance of mtDNA, offspring will have the same mtDNA sequence as their mother with the exception of rare cases...

  6. Ancient DNA reveals late survival of mammoth and horse in interior Alaska

    DEFF Research Database (Denmark)

    Haile, James; Froese, Duane G; Macphee, Ross D E; Roberts, Richard G; Arnold, Lee J; Reyes, Alberto V; Rasmussen, Morten; Nielsen, Rasmus; Brook, Barry W; Robinson, Simon; Demuro, Martina; Gilbert, M Thomas P; Munch, Kasper; Austin, Jeremy J; Cooper, Alan; Barnes, Ian; Möller, Per; Willerslev, Eske

    2009-01-01

    perennially frozen and securely dated sediments (sedaDNA). In such contexts, sedaDNA can reveal the molecular presence of species that appear absent in the macrofossil record. We show that woolly mammoth and horse persisted in interior Alaska until at least 10,500 yr BP, several thousands of years later than...

  7. Ancient DNA assessment of tiger salamander population in Yellowstone National Park.

    Directory of Open Access Journals (Sweden)

    Sarah K McMenamin

    Full Text Available Recent data indicates that blotched tiger salamanders (Ambystoma tigrinum melanostictum in northern regions of Yellowstone National Park are declining due to climate-related habitat changes. In this study, we used ancient and modern mitochondrial haplotype diversity to model the effective size of this amphibian population through recent geological time and to assess past responses to climatic changes in the region. Using subfossils collected from a cave in northern Yellowstone, we analyzed >700 base pairs of mitochondrial sequence from 16 samples ranging in age from 100 to 3300 years old and found that all shared an identical haplotype. Although mitochondrial diversity was extremely low within the living population, we still were able to detect geographic subdivision within the local area. Using serial coalescent modelling with Bayesian priors from both modern and ancient genetic data we simulated a range of probable population sizes and mutation rates through time. Our simulations suggest that regional mitochondrial diversity has remained relatively constant even through climatic fluctuations of recent millennia.

  8. High-throughput sequencing of ancient plant and mammal DNA preserved in herbivore middens

    DEFF Research Database (Denmark)

    Murray, D.C.; Pearson, S.G.; Fullagar, R.;

    2012-01-01

    analyses, aDNA analysis identified unreported plant and animal taxa, some of which are locally extinct or endemic. The survival and preservation of DNA in hot, arid environments is a complex and poorly understood process that is both sporadic and rare, but the survival of DNA through desiccation may be......The study of arid palaeoenvironments is often frustrated by the poor or non-existent preservation of plant and animal material, yet these environments are of considerable environmental importance. The analysis of pollen and macrofossils isolated from herbivore middens has been an invaluable source...

  9. mtDNA haplogroup X: An ancient link between Europe/Western Asia and North America?

    OpenAIRE

    Brown, M. D.; Hosseini, S H; Torroni, A.; Bandelt, H. J.; Allen, J C; Schurr, T. G.; Scozzari, R; Cruciani, F; Wallace, D C

    1998-01-01

    On the basis of comprehensive RFLP analysis, it has been inferred that approximately 97% of Native American mtDNAs belong to one of four major founding mtDNA lineages, designated haplogroups "A"-"D." It has been proposed that a fifth mtDNA haplogroup (haplogroup X) represents a minor founding lineage in Native Americans. Unlike haplogroups A-D, haplogroup X is also found at low frequencies in modern European populations. To investigate the origins, diversity, and continental relationships of ...

  10. An ancient icon reveals new mysteries: mummy DNA resurrects a cryptic species within the Nile crocodile.

    Science.gov (United States)

    Hekkala, Evon; Shirley, Matthew H; Amato, George; Austin, James D; Charter, Suellen; Thorbjarnarson, John; Vliet, Kent A; Houck, Marlys L; Desalle, Rob; Blum, Michael J

    2011-10-01

    The Nile crocodile (Crocodylus niloticus) is an ancient icon of both cultural and scientific interest. The species is emblematic of the great civilizations of the Nile River valley and serves as a model for international wildlife conservation. Despite its familiarity, a centuries-long dispute over the taxonomic status of the Nile crocodile remains unresolved. This dispute not only confounds our understanding of the origins and biogeography of the 'true crocodiles' of the crown genus Crocodylus, but also complicates conservation and management of this commercially valuable species. We have taken a total evidence approach involving phylogenetic analysis of mitochondrial and nuclear markers, as well as karyotype analysis of chromosome number and structure, to assess the monophyletic status of the Nile crocodile. Samples were collected from throughout Africa, covering all major bioregions. We also utilized specimens from museum collections, including mummified crocodiles from the ancient Egyptian temples at Thebes and the Grottes de Samoun, to reconstruct the genetic profiles of extirpated populations. Our analyses reveal a cryptic evolutionary lineage within the Nile crocodile that elucidates the biogeographic history of the genus and clarifies long-standing arguments over the species' taxonomic identity and conservation status. An examination of crocodile mummy haplotypes indicates that the cryptic lineage corresponds to an earlier description of C. suchus and suggests that both African Crocodylus lineages historically inhabited the Nile River. Recent survey efforts indicate that C. suchus is declining or extirpated throughout much of its distribution. Without proper recognition of this cryptic species, current sustainable use-based management policies for the Nile crocodile may do more harm than good. PMID:21906195

  11. Mitochondrial DNA Reveals the Trace of the Ancient Settlers of a Violently Devastated Late Bronze and Iron Ages Village

    Science.gov (United States)

    Núñez, Carolina; Baeta, Miriam; Cardoso, Sergio; Palencia-Madrid, Leire; García-Romero, Noemí; Llanos, Armando; M. de Pancorbo, Marian

    2016-01-01

    La Hoya (Alava, Basque Country) was one of the most important villages of the Late Bronze and Iron Ages of the north of the Iberian Peninsula, until it was violently devastated around the 4th century and abandoned in the 3rd century B.C. Archaeological evidences suggest that descendants from La Hoya placed their new settlement in a nearby hill, which gave rise to the current village of Laguardia. In this study, we have traced the genetic imprints of the extinct inhabitants of La Hoya through the analysis of maternal lineages. In particular, we have analyzed the mitochondrial DNA (mtDNA) control region of 41 human remains recovered from the archaeological site for comparison with a sample of 51 individuals from the geographically close present-day population of Laguardia, as well as 56 individuals of the general population of the province of Alava, where the archaeological site and Laguardia village are located. MtDNA haplotypes were successfully obtained in 25 out of 41 ancient samples, and 14 different haplotypes were identified. The major mtDNA subhaplogroups observed in La Hoya were H1, H3, J1 and U5, which show a distinctive frequency pattern in the autochthonous populations of the north of the Iberian Peninsula. Approximate Bayesian Computation analysis was performed to test the most likely model for the local demographic history. The results did not sustain a genealogical continuity between Laguardia and La Hoya at the haplotype level, although factors such as sampling effects, recent admixture events, and genetic bottlenecks need to be considered. Likewise, the highly similar subhaplogroup composition detected between La Hoya and Laguardia and Alava populations do not allow us to reject a maternal genetic continuity in the human groups of the area since at least the Iron Age to present times. Broader analyses, based on a larger collection of samples and genetic markers, would be required to study fine-scale population events in these human groups. PMID

  12. DNA barcoding of authentic and substitute samples of herb of the family Asparagaceae and Asclepiadaceae based on the ITS2 region

    Directory of Open Access Journals (Sweden)

    Padmalatha S Rai

    2012-01-01

    Full Text Available Background : Herbal drugs used to treat illness according to Ayurveda are often misidentified or adulterated with similar plant materials. Objective: To aid taxonomical identification, we used DNA barcoding to evaluate authentic and substitute samples of herb and phylogenetic relationship of four medicinal plants of family Asparagaceace and Asclepiadaceae. Materials and Methods : DNA extracted from dry root samples of two authentic and two substitutes of four specimens belonging to four species were subjected to polymerase chain reaction (PCR and DNA sequencing. Primers for nuclear DNA (nu ITS2 and plastid DNA (matK and rpoC1 were used for PCR and sequence analysis was performed by Clustal W. The intraspecific variation and interspecific divergence were calculated using MEGA V 4.0. Statistical Analysis : Kimura′s two parameter model, neighbor joining and bootstrapping methods were used in this work. Results: The result indicates the efficiency of amplification for ITS2 candidate DNA barcodes was 100% for four species tested. The average interspecific divergence is 0.12 and intraspecific variation was 0.232 in the case of two Asparagaceae species. In two Asclepiadaceae species, average interspecific divergence and intraspecific variation were 0.178 and 0.004 respectively. Conclusions: Our findings show that the ITS2 region can effectively discriminate Asparagus racemosus and Hemidesmus indicus from its substitute samples and hence can resolve species admixtures in raw samples. The ITS2 region may be used as one of the standard DNA barcodes to identify closely related species of family Asclepiadaceae but was noninformative for Asparagaceae species suggesting a need for the development of new markers for each family. More detailed studies involving more species and substitutes are warranted.

  13. Whole genome amplification and microsatellite genotyping of herbarium DNA revealed the identity of an ancient grapevine cultivar

    Science.gov (United States)

    Malenica, Nenad; Šimon, Silvio; Besendorfer, Višnja; Maletić, Edi; Karoglan Kontić, Jasminka; Pejić, Ivan

    2011-09-01

    Reconstruction of the grapevine cultivation history has advanced tremendously during the last decade. Identification of grapevine cultivars by using microsatellite DNA markers has mostly become a routine. The parentage of several renowned grapevine cultivars, like Cabernet Sauvignon and Chardonnay, has been elucidated. However, the assembly of a complete grapevine genealogy is not yet possible because missing links might no longer be in cultivation or are even extinct. This problem could be overcome by analyzing ancient DNA from grapevine herbarium specimens and other historical remnants of once cultivated varieties. Here, we present the first successful genotyping of a grapevine herbarium specimen and the identification of the corresponding grapevine cultivar. Using a set of nine grapevine microsatellite markers, in combination with a whole genome amplification procedure, we found the 90-year-old Tribidrag herbarium specimen to display the same microsatellite profile as the popular American cultivar Zinfandel. This work, together with information from several historical documents, provides a new clue of Zinfandel cultivation in Croatia as early as the beginning of fifteenth century, under the native name Tribidrag. Moreover, it emphasizes substantial information potential of existing grapevine and other herbarium collections worldwide.

  14. Aplication of authenticity criteria in mitochondrial studies on archaic bone remains from a prehispanic Muisca population

    Directory of Open Access Journals (Sweden)

    Mónica Díaz

    2011-01-01

    Full Text Available Introduction: Ancient DNA (aDNAstudies can support hypotheses regarding ancient populations; molecular studies can analyze the local population’s genetic composition, minimizing biases introduced by later migrations, demographic expansions, mutations, and bottleneck effects. These analyses must be performed with special care because of the low DNA concentrations and contamination risk; therefore, it is necessary to establish protocols to guarantee the reproducibility and veracity of results. Objective: The present study aims to establish a protocol to obtain ancient DNA from 16 pre-Columbian bone samples found in an excavation performed in the area «Candelaria La Nueva» in Bogota, Colombia, dated in the period «Muisca Tardio». Methods: Four founder mitochondrial DNA Amerindian haplotypes were analyzed by high resolution restriction enzyme analyses, obtaining fragments between 121 and 186 base pairs (bp. Different analyses were performed following a strict control of authenticity criteria regarding laboratory conditions, including: positive and negative controls, reproducibility of results, and verification of particular characteristics present in ancient DNA. Results: Results obtained from the bone samples showed the exclusive presence of haplogroup A in the population studied. This data support the statement of the archaeologists of a single biological population in space and time. The distribution of this haplogroup in a 100% frequency supports the hypothesis of Chibcha genetic affiliation. Conclusion: The present study is a contribution to the study of genetic diversity in archaic American populations, allowing the integration of geographic and historic data with genetic characterization techniques associated with linguistic, ethnographic, and glottochronology patterns. Following the protocol proposed in the present study allows fulfilling authenticity criteria for ancient samples with the available techniques.

  15. Ancient DNA extracted from Danish aurochs (Bos primigenius)

    DEFF Research Database (Denmark)

    Nielsen, Peter Gravlund; Aaris-Sørensen, Kim; Hofreiter, Michael;

    2012-01-01

    We extracted DNA from 39 Danish aurochs specimens and successfully amplified and sequenced a 252 base pair long fragment of the multivariable region I of the mitochondrial control region from 11 specimens. The sequences from these specimens dated back to 9830-2865 14C yr BP and represent the firs...

  16. Ancient mitochondrial DNA provides high-resolution time scale of the peopling of the Americas.

    Science.gov (United States)

    Llamas, Bastien; Fehren-Schmitz, Lars; Valverde, Guido; Soubrier, Julien; Mallick, Swapan; Rohland, Nadin; Nordenfelt, Susanne; Valdiosera, Cristina; Richards, Stephen M; Rohrlach, Adam; Romero, Maria Inés Barreto; Espinoza, Isabel Flores; Cagigao, Elsa Tomasto; Jiménez, Lucía Watson; Makowski, Krzysztof; Reyna, Ilán Santiago Leboreiro; Lory, Josefina Mansilla; Torrez, Julio Alejandro Ballivián; Rivera, Mario A; Burger, Richard L; Ceruti, Maria Constanza; Reinhard, Johan; Wells, R Spencer; Politis, Gustavo; Santoro, Calogero M; Standen, Vivien G; Smith, Colin; Reich, David; Ho, Simon Y W; Cooper, Alan; Haak, Wolfgang

    2016-04-01

    The exact timing, route, and process of the initial peopling of the Americas remains uncertain despite much research. Archaeological evidence indicates the presence of humans as far as southern Chile by 14.6 thousand years ago (ka), shortly after the Pleistocene ice sheets blocking access from eastern Beringia began to retreat. Genetic estimates of the timing and route of entry have been constrained by the lack of suitable calibration points and low genetic diversity of Native Americans. We sequenced 92 whole mitochondrial genomes from pre-Columbian South American skeletons dating from 8.6 to 0.5 ka, allowing a detailed, temporally calibrated reconstruction of the peopling of the Americas in a Bayesian coalescent analysis. The data suggest that a small population entered the Americas via a coastal route around 16.0 ka, following previous isolation in eastern Beringia for ~2.4 to 9 thousand years after separation from eastern Siberian populations. Following a rapid movement throughout the Americas, limited gene flow in South America resulted in a marked phylogeographic structure of populations, which persisted through time. All of the ancient mitochondrial lineages detected in this study were absent from modern data sets, suggesting a high extinction rate. To investigate this further, we applied a novel principal components multiple logistic regression test to Bayesian serial coalescent simulations. The analysis supported a scenario in which European colonization caused a substantial loss of pre-Columbian lineages. PMID:27051878

  17. Ancient mitochondrial DNA provides high-resolution time scale of the peopling of the Americas

    Science.gov (United States)

    Llamas, Bastien; Fehren-Schmitz, Lars; Valverde, Guido; Soubrier, Julien; Mallick, Swapan; Rohland, Nadin; Nordenfelt, Susanne; Valdiosera, Cristina; Richards, Stephen M.; Rohrlach, Adam; Romero, Maria Inés Barreto; Espinoza, Isabel Flores; Cagigao, Elsa Tomasto; Jiménez, Lucía Watson; Makowski, Krzysztof; Reyna, Ilán Santiago Leboreiro; Lory, Josefina Mansilla; Torrez, Julio Alejandro Ballivián; Rivera, Mario A.; Burger, Richard L.; Ceruti, Maria Constanza; Reinhard, Johan; Wells, R. Spencer; Politis, Gustavo; Santoro, Calogero M.; Standen, Vivien G.; Smith, Colin; Reich, David; Ho, Simon Y. W.; Cooper, Alan; Haak, Wolfgang

    2016-01-01

    The exact timing, route, and process of the initial peopling of the Americas remains uncertain despite much research. Archaeological evidence indicates the presence of humans as far as southern Chile by 14.6 thousand years ago (ka), shortly after the Pleistocene ice sheets blocking access from eastern Beringia began to retreat. Genetic estimates of the timing and route of entry have been constrained by the lack of suitable calibration points and low genetic diversity of Native Americans. We sequenced 92 whole mitochondrial genomes from pre-Columbian South American skeletons dating from 8.6 to 0.5 ka, allowing a detailed, temporally calibrated reconstruction of the peopling of the Americas in a Bayesian coalescent analysis. The data suggest that a small population entered the Americas via a coastal route around 16.0 ka, following previous isolation in eastern Beringia for ~2.4 to 9 thousand years after separation from eastern Siberian populations. Following a rapid movement throughout the Americas, limited gene flow in South America resulted in a marked phylogeographic structure of populations, which persisted through time. All of the ancient mitochondrial lineages detected in this study were absent from modern data sets, suggesting a high extinction rate. To investigate this further, we applied a novel principal components multiple logistic regression test to Bayesian serial coalescent simulations. The analysis supported a scenario in which European colonization caused a substantial loss of pre-Columbian lineages. PMID:27051878

  18. Highly skewed sex ratios and biased fossil deposition of moa: ancient DNA provides new insight on New Zealand's extinct megafauna

    Science.gov (United States)

    Allentoft, Morten E.; Bunce, Michael; Scofield, R. Paul; Hale, Marie L.; Holdaway, Richard N.

    2010-03-01

    Ancient DNA was isolated from the bones of 267 individuals of the extinct New Zealand moa (Aves: Dinornithiformes) from two late Holocene deposits [Pyramid Valley (PV) and Bell Hill Vineyard (BHV)] located 5.7 km apart in North Canterbury, South Island. The two sites' combined fossil record cover the last 3000 years of pre-human New Zealand and mitochondrial DNA confirmed that four species ( Dinornis robustus, Euryapteryx curtus, Emeus crassus, and Pachyornis elephantopus) were sympatric in the region. However, the relative species compositions in the two deposits differed significantly with D. robustus and E. crassus being most abundant at PV while E. curtus outnumbered the other three moa taxa combined at BHV. A subsample of 227 individuals had sufficient nuclear DNA preservation to warrant the use of molecular sexing techniques, and the analyses uncovered a remarkable excess of females in both deposits with an overall male to female ratio of 1:5.1. Among juveniles of E. curtus, the only species which was represented by a substantial fraction of juveniles, the sex ratio was not skewed (10 ♂, 10 ♀), suggesting that the observed imbalance arose as a result of differential mortality during maturation. Surprisingly, sex ratios proved significantly different between sites with a 1:2.2 ratio at BHV ( n = 90) and 1:14.2 at PV ( n = 137). Given the mobility of large ratites, and the proximity of the two fossil assemblages in space and time, these differences in taxonomic and gender composition indicate that moa biology and the local environment have affected the fossil representation dramatically and several possible explanations are offered. Apart from adding to our understanding of moa biology, these discoveries reinforce the need for caution when basing interpretation of the fossil record on material from a single site.

  19. Ancient DNA suggests the leading role played by men in the Neolithic dissemination.

    Science.gov (United States)

    Lacan, Marie; Keyser, Christine; Ricaut, François-Xavier; Brucato, Nicolas; Tarrús, Josep; Bosch, Angel; Guilaine, Jean; Crubézy, Eric; Ludes, Bertrand

    2011-11-01

    The impact of the Neolithic dispersal on the western European populations is subject to continuing debate. To trace and date genetic lineages potentially brought during this transition and so understand the origin of the gene pool of current populations, we studied DNA extracted from human remains excavated in a Spanish funeral cave dating from the beginning of the fifth millennium B.C. Thanks to a "multimarkers" approach based on the analysis of mitochondrial and nuclear DNA (autosomes and Y-chromosome), we obtained information on the early Neolithic funeral practices and on the biogeographical origin of the inhumed individuals. No close kinship was detected. Maternal haplogroups found are consistent with pre-Neolithic settlement, whereas the Y-chromosomal analyses permitted confirmation of the existence in Spain approximately 7,000 y ago of two haplogroups previously associated with the Neolithic transition: G2a and E1b1b1a1b. These results are highly consistent with those previously found in Neolithic individuals from French Late Neolithic individuals, indicating a surprising temporal genetic homogeneity in these groups. The high frequency of G2a in Neolithic samples in western Europe could suggest, furthermore, that the role of men during Neolithic dispersal could be greater than currently estimated. PMID:22042855

  20. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  1. Molecular dating of caprines using ancient DNA sequences of Myotragus balearicus, an extinct endemic Balearic mammal

    Directory of Open Access Journals (Sweden)

    Alcover Josep Antoni

    2005-12-01

    Full Text Available Abstract Background Myotragus balearicus was an endemic bovid from the Balearic Islands (Western Mediterranean that became extinct around 6,000-4,000 years ago. The Myotragus evolutionary lineage became isolated in the islands most probably at the end of the Messinian crisis, when the desiccation of the Mediterranean ended, in a geological date established at 5.35 Mya. Thus, the sequences of Myotragus could be very valuable for calibrating the mammalian mitochondrial DNA clock and, in particular, the tree of the Caprinae subfamily, to which Myotragus belongs. Results We have retrieved the complete mitochondrial cytochrome b gene (1,143 base pairs, plus fragments of the mitochondrial 12S gene and the nuclear 28S rDNA multi-copy gene from a well preserved Myotragus subfossil bone. The best resolved phylogenetic trees, obtained with the cytochrome b gene, placed Myotragus in a position basal to the Ovis group. Using the calibration provided by the isolation of Balearic Islands, we calculated that the initial radiation of caprines can be dated at 6.2 ± 0.4 Mya. In addition, alpine and southern chamois, considered until recently the same species, split around 1.6 ± 0.3 Mya, indicating that the two chamois species have been separated much longer than previously thought. Conclusion Since there are almost no extant endemic mammals in Mediterranean islands, the sequence of the extinct Balearic endemic Myotragus has been crucial for allowing us to use the Messinian crisis calibration point for dating the caprines phylogenetic tree.

  2. Ancient DNA from 8400 Year-Old Çatalhöyük Wheat: Implications for the Origin of Neolithic Agriculture.

    Science.gov (United States)

    Bilgic, Hatice; Hakki, Erdogan E; Pandey, Anamika; Khan, Mohd Kamran; Akkaya, Mahinur S

    2016-01-01

    Human history was transformed with the advent of agriculture in the Fertile Crescent with wheat as one of the founding crops. Although the Fertile Crescent is renowned as the center of wheat domestication, archaeological studies have shown the crucial involvement of Çatalhöyük in this process. This site first gained attention during the 1961-65 excavations due to the recovery of primitive hexaploid wheat. However, despite the seeds being well preserved, a detailed archaeobotanical description of the samples is missing. In this article, we report on the DNA isolation, amplification and sequencing of ancient DNA of charred wheat grains from Çatalhöyük and other Turkish archaeological sites and the comparison of these wheat grains with contemporary wheat species including T. monococcum, T. dicoccum, T. dicoccoides, T. durum and T. aestivum at HMW glutenin protein loci. These ancient samples represent the oldest wheat sample sequenced to date and the first ancient wheat sample from the Middle East. Remarkably, the sequence analysis of the short DNA fragments preserved in seeds that are approximately 8400 years old showed that the Çatalhöyük wheat stock contained hexaploid wheat, which is similar to contemporary hexaploid wheat species including both naked (T. aestivum) and hulled (T. spelta) wheat. This suggests an early transitory state of hexaploid wheat agriculture from the Fertile Crescent towards Europe spanning present-day Turkey. PMID:26998604

  3. A critical evaluation of how ancient DNA bulk bone metabarcoding complements traditional morphological analysis of fossil assemblages

    Science.gov (United States)

    Grealy, Alicia C.; McDowell, Matthew C.; Scofield, Paul; Murray, Dáithí C.; Fusco, Diana A.; Haile, James; Prideaux, Gavin J.; Bunce, Michael

    2015-11-01

    When pooled for extraction as a bulk sample, the DNA within morphologically unidentifiable fossil bones can, using next-generation sequencing, yield valuable taxonomic data. This method has been proposed as a means to rapidly and cost-effectively assess general ancient DNA preservation at a site, and to investigate temporal and spatial changes in biodiversity; however, several caveats have yet to be considered. We critically evaluated the bulk bone metabarcoding (BBM) method in terms of its: (i) repeatability, by quantifying sampling and technical variance through a nested experimental design containing sub-samples and replicates at several stages; (ii) accuracy, by comparing morphological and molecular family-level identifications; and (iii) overall utility, by applying the approach to two independent Holocene fossil deposits, Bat Cave (Kangaroo Island, Australia) and Finsch's Folly (Canterbury, New Zealand). For both sites, bone and bone powder sub-sampling were found to contribute significantly to variance in molecularly identified family assemblage, while the contribution of library preparation and sequencing was almost negligible. Nevertheless, total variance was small. Sampling over 80% fewer bones than was required to morphologically identify the taxonomic assemblages, we found that the families identified molecularly are a subset of the families identified morphologically and, for the most part, represent the most abundant families in the fossil record. In addition, we detected a range of extinct, extant and endangered taxa, including some that are rare in the fossil record. Given the relatively low sampling effort of the BBM approach compared with morphological approaches, these results suggest that BBM is largely consistent, accurate, sensitive, and therefore widely applicable. Furthermore, we assessed the overall benefits and caveats of the method, and suggest a workflow for palaeontologists, archaeologists, and geneticists that will help mitigate these

  4. The origin of European cattle: evidence from modern and ancient DNA.

    Science.gov (United States)

    Beja-Pereira, Albano; Caramelli, David; Lalueza-Fox, Carles; Vernesi, Cristiano; Ferrand, Nuno; Casoli, Antonella; Goyache, Felix; Royo, Luis J; Conti, Serena; Lari, Martina; Martini, Andrea; Ouragh, Lahousine; Magid, Ayed; Atash, Abdulkarim; Zsolnai, Attila; Boscato, Paolo; Triantaphylidis, Costas; Ploumi, Konstantoula; Sineo, Luca; Mallegni, Francesco; Taberlet, Pierre; Erhardt, Georg; Sampietro, Lourdes; Bertranpetit, Jaume; Barbujani, Guido; Luikart, Gordon; Bertorelle, Giorgio

    2006-05-23

    Cattle domestication from wild aurochsen was among the most important innovations during the Neolithic agricultural revolution. The available genetic and archaeological evidence points to at least two major sites of domestication in India and in the Near East, where zebu and the taurine breeds would have emerged independently. Under this hypothesis, all present-day European breeds would be descended from cattle domesticated in the Near East and subsequently spread during the diffusion of herding and farming lifestyles. We present here previously undescribed genetic evidence in contrast with this view, based on mtDNA sequences from five Italian aurochsen dated between 7,000 and 17,000 years B.P. and >1,000 modern cattle from 51 breeds. Our data are compatible with local domestication events in Europe and support at least some levels of introgression from the aurochs in Italy. The distribution of genetic variation in modern cattle suggest also that different south European breeds were affected by introductions from northern Africa. If so, the European cattle may represent a more variable and valuable genetic resource than previously realized, and previous simple hypotheses regarding the domestication process and the diffusion of selected breeds should be revised. PMID:16690747

  5. Subspecific Status of the Korean Tiger Inferred by Ancient DNA Analysis

    Directory of Open Access Journals (Sweden)

    Mu-Yeong Lee

    2012-01-01

    Full Text Available The tiger population that once inhabited the Korean peninsula was initially considered a unique subspecies (Panthera tigris coreensis, distinct from the Amur tiger of the Russian Far East (P. t. altaica. However, in the following decades, the population of P. t. coreensis was classified as P. t. altaica and hence forth the two populations have been considered the same subspecies. From an ecological point of view, the classification of the Korean tiger population as P. t. altaica is a plausible conclusion. Historically, there were no major dispersal barriers between the Korean peninsula and the habitat of Amur tigers in Far Eastern Russia and northeastern China that might prevent gene flow, especially for a large carnivore with long-distance dispersal abilities. However, there has yet to be a genetic study to confirm the subspecific status of the Korean tiger. Bone samples from four tigers originally caught in the Korean peninsula were collected from two museums in Japan and the United States. Eight mitochondrial gene fragments were sequenced and compared to previously published tiger subspecies’ mtDNA sequences to assess the phylogenetic relationship of the Korean tiger. Three individuals shared an identical haplotype with the Amur tigers. One specimen grouped with Malayan tigers, perhaps due to misidentification or mislabeling of the sample. Our results support the conclusion that the Korean tiger should be classified as P. t. altaica, which has important implications for the conservation and reintroduction of Korean tigers.

  6. Assessment of the extirpated Maritimes walrus using morphological and ancient DNA analysis.

    Directory of Open Access Journals (Sweden)

    Brenna A McLeod

    Full Text Available Species biogeography is a result of complex events and factors associated with climate change, ecological interactions, anthropogenic impacts, physical geography, and evolution. To understand the contemporary biogeography of a species, it is necessary to understand its history. Specimens from areas of localized extinction are important, as extirpation of species from these areas may represent the loss of unique adaptations and a distinctive evolutionary trajectory. The walrus (Odobenus rosmarus has a discontinuous circumpolar distribution in the arctic and subarctic that once included the southeastern Canadian Maritimes region. However, exploitation of the Maritimes population during the 16th-18th centuries led to extirpation, and the species has not inhabited areas south of 55°N for ∼250 years. We examined genetic and morphological characteristics of specimens from the Maritimes, Atlantic (O. r. rosmarus and Pacific (O. r. divergens populations to test the hypothesis that the first group was distinctive. Analysis of Atlantic and Maritimes specimens indicated that most skull and mandibular measurements were significantly different between the Maritimes and Atlantic groups and discriminant analysis of principal components confirmed them as distinctive groups, with complete isolation of skull features. The Maritimes walrus appear to have been larger animals, with larger and more robust tusks, skulls and mandibles. The mtDNA control region haplotypes identified in Maritimes specimens were unique to the region and a greater average number of nucleotide differences were found between the regions (Atlantic and Maritimes than within either group. Levels of diversity (h and π were lower in the Maritimes, consistent with other studies of species at range margins. Our data suggest that the Maritimes walrus was a morphologically and genetically distinctive group that was on a different evolutionary path from other walrus found in the north Atlantic.

  7. Ancient DNA Analysis of 8000 B.C. Near Eastern Farmers Supports an Early Neolithic Pioneer Maritime Colonization of Mainland Europe through Cyprus and the Aegean Islands

    Science.gov (United States)

    Fernández, Eva; Pérez-Pérez, Alejandro; Gamba, Cristina; Prats, Eva; Cuesta, Pedro; Anfruns, Josep; Molist, Miquel; Arroyo-Pardo, Eduardo; Turbón, Daniel

    2014-01-01

    The genetic impact associated to the Neolithic spread in Europe has been widely debated over the last 20 years. Within this context, ancient DNA studies have provided a more reliable picture by directly analyzing the protagonist populations at different regions in Europe. However, the lack of available data from the original Near Eastern farmers has limited the achieved conclusions, preventing the formulation of continental models of Neolithic expansion. Here we address this issue by presenting mitochondrial DNA data of the original Near-Eastern Neolithic communities with the aim of providing the adequate background for the interpretation of Neolithic genetic data from European samples. Sixty-three skeletons from the Pre Pottery Neolithic B (PPNB) sites of Tell Halula, Tell Ramad and Dja'de El Mughara dating between 8,700–6,600 cal. B.C. were analyzed, and 15 validated mitochondrial DNA profiles were recovered. In order to estimate the demographic contribution of the first farmers to both Central European and Western Mediterranean Neolithic cultures, haplotype and haplogroup diversities in the PPNB sample were compared using phylogeographic and population genetic analyses to available ancient DNA data from human remains belonging to the Linearbandkeramik-Alföldi Vonaldiszes Kerámia and Cardial/Epicardial cultures. We also searched for possible signatures of the original Neolithic expansion over the modern Near Eastern and South European genetic pools, and tried to infer possible routes of expansion by comparing the obtained results to a database of 60 modern populations from both regions. Comparisons performed among the 3 ancient datasets allowed us to identify K and N-derived mitochondrial DNA haplogroups as potential markers of the Neolithic expansion, whose genetic signature would have reached both the Iberian coasts and the Central European plain. Moreover, the observed genetic affinities between the PPNB samples and the modern populations of Cyprus and

  8. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  9. Ancient DNA reveals genetic stability despite demographic decline: 3,000 years of population history in the endemic Hawaiian petrel.

    Science.gov (United States)

    Welch, Andreanna J; Wiley, Anne E; James, Helen F; Ostrom, Peggy H; Stafford, Thomas W; Fleischer, Robert C

    2012-12-01

    In the Hawaiian Islands, human colonization, which began approximately 1,200 to 800 years ago, marks the beginning of a period in which nearly 75% of the endemic avifauna became extinct and the population size and range of many additional species declined. It remains unclear why some species persisted whereas others did not. The endemic Hawaiian petrel (Pterodroma sandwichensis) has escaped extinction, but colonies on two islands have been extirpated and populations on remaining islands have contracted. We obtained mitochondrial DNA sequences from 100 subfossil bones, 28 museum specimens, and 289 modern samples to investigate patterns of gene flow and temporal changes in the genetic diversity of this endangered species over the last 3,000 years, as Polynesians and then Europeans colonized the Hawaiian Islands. Genetic differentiation was found to be high between both modern and ancient petrel populations. However, gene flow was substantial between the extirpated colonies on Oahu and Molokai and modern birds from the island of Lanai. No significant reductions in genetic diversity occurred over this period, despite fears in the mid-1900s that this species may have been extinct. Simulations show that even a decline to a stable effective population size of 100 individuals would result in the loss of only 5% of the expected heterozygosity. Simulations also show that high levels of genetic diversity may be retained due to the long generation time of this species. Such decoupling between population size and genetic diversity in long-lived species can have important conservation implications. It appears that a pattern of dispersal from declining colonies, in addition to long generation time, may have allowed the Hawaiian petrel to escape a severe genetic bottleneck, and the associated extinction vortex, and persist despite a large population decline after human colonization. PMID:22844071

  10. Authenticating cache.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  11. 800,000 year old mammoth DNA, modern elephant DNA or PCR artefact?

    DEFF Research Database (Denmark)

    Binladen, Jonas; Gilbert, M Thomas P; Willerslev, Eske

    2007-01-01

    Poulakakis and colleagues (Poulakakis et al. 2006: Biol. Lett. 2, 451-454), report the recovery of 'authentic' mammoth DNA from an 800,000-year-old fragment of bone excavated on the island of Crete. In light of results from other ancient DNA studies that indicate how DNA survival is unlikely in s...... polymorphisms. Finally, we demonstrate using a simple BLAST search in GenBank that the claimed 'uniquely derived character state' for mammoths is in fact also found within modern elephants. Udgivelsesdato: 2007-Feb-22...

  12. System and method for authentication

    Science.gov (United States)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  13. Mitochondrial DNA diversity of modern, ancient and wild sheep(Ovis gmelinii anatolica) from Turkey: new insights on the evolutionary history of sheep.

    Science.gov (United States)

    Demirci, Sevgin; Koban Baştanlar, Evren; Dağtaş, Nihan Dilşad; Pişkin, Evangelia; Engin, Atilla; Ozer, Füsun; Yüncü, Eren; Doğan, Sükrü Anıl; Togan, Inci

    2013-01-01

    In the present study, to contribute to the understanding of the evolutionary history of sheep, the mitochondrial (mt) DNA polymorphisms occurring in modern Turkish native domestic (n = 628), modern wild (Ovis gmelinii anatolica) (n = 30) and ancient domestic sheep from Oylum Höyük in Kilis (n = 33) were examined comparatively with the accumulated data in the literature. The lengths (75 bp/76 bp) of the second and subsequent repeat units of the mtDNA control region (CR) sequences differentiated the five haplogroups (HPGs) observed in the domestic sheep into two genetic clusters as was already implied by other mtDNA markers: the first cluster being composed of HPGs A, B, D and the second cluster harboring HPGs C, E. To manifest genetic relatedness between wild Ovis gmelinii and domestic sheep haplogroups, their partial cytochrome B sequences were examined together on a median-joining network. The two parallel but wider aforementioned clusters were observed also on the network of Ovis gmelenii individuals, within which domestic haplogroups were embedded. The Ovis gmelinii wilds of the present day appeared to be distributed on two partially overlapping geographic areas parallel to the genetic clusters that they belong to (the first cluster being in the western part of the overall distribution). Thus, the analyses suggested that the domestic sheep may be the products of two maternally distinct ancestral Ovis gmelinii populations. Furthermore, Ovis gmelinii anatolica individuals exhibited a haplotype of HPG A (n = 22) and another haplotype (n = 8) from the second cluster which was not observed among the modern domestic sheep. HPG E, with the newly observed members (n = 11), showed signs of expansion. Studies of ancient and modern mtDNA suggest that HPG C frequency increased in the Southeast Anatolia from 6% to 22% some time after the beginning of the Hellenistic period, 500 years Before Common Era (BCE). PMID:24349158

  14. Mitochondrial DNA diversity of modern, ancient and wild sheep(Ovis gmelinii anatolica from Turkey: new insights on the evolutionary history of sheep.

    Directory of Open Access Journals (Sweden)

    Sevgin Demirci

    Full Text Available In the present study, to contribute to the understanding of the evolutionary history of sheep, the mitochondrial (mt DNA polymorphisms occurring in modern Turkish native domestic (n = 628, modern wild (Ovis gmelinii anatolica (n = 30 and ancient domestic sheep from Oylum Höyük in Kilis (n = 33 were examined comparatively with the accumulated data in the literature. The lengths (75 bp/76 bp of the second and subsequent repeat units of the mtDNA control region (CR sequences differentiated the five haplogroups (HPGs observed in the domestic sheep into two genetic clusters as was already implied by other mtDNA markers: the first cluster being composed of HPGs A, B, D and the second cluster harboring HPGs C, E. To manifest genetic relatedness between wild Ovis gmelinii and domestic sheep haplogroups, their partial cytochrome B sequences were examined together on a median-joining network. The two parallel but wider aforementioned clusters were observed also on the network of Ovis gmelenii individuals, within which domestic haplogroups were embedded. The Ovis gmelinii wilds of the present day appeared to be distributed on two partially overlapping geographic areas parallel to the genetic clusters that they belong to (the first cluster being in the western part of the overall distribution. Thus, the analyses suggested that the domestic sheep may be the products of two maternally distinct ancestral Ovis gmelinii populations. Furthermore, Ovis gmelinii anatolica individuals exhibited a haplotype of HPG A (n = 22 and another haplotype (n = 8 from the second cluster which was not observed among the modern domestic sheep. HPG E, with the newly observed members (n = 11, showed signs of expansion. Studies of ancient and modern mtDNA suggest that HPG C frequency increased in the Southeast Anatolia from 6% to 22% some time after the beginning of the Hellenistic period, 500 years Before Common Era (BCE.

  15. Authenticating Performances

    DEFF Research Database (Denmark)

    Rudolph, Michael

    2015-01-01

    ” (Bell 1997). This contribution focuses on the role of ritual in postcolonial identity constitution and the performative authentication of political power and social authority in Taiwan. Since the middle of the 1990s, traditionalist performances have been on the rise on the island. Generously subsidized...... competition. In other words, while these rituals may in many cases have efficacy with regard to the constitution of society and identity, the traditionalist rituals in particular frequently serve the authentication exigencies of various elites. Finally, I suggest that if one wants to provide the culture...... of common people with greater opportunities for representation, one should not focus too much on the display of ‘authentic’ old traditions in order to highlight Taiwanese subjectivity, but should also acknowledge those hybridized new traditions which aboriginal society has generated over the course...

  16. Reconstructing ancient genomes and epigenomes

    DEFF Research Database (Denmark)

    Orlando, Ludovic Antoine Alexandre; Gilbert, M. Thomas P.; Willerslev, Eske

    2015-01-01

    DNA studies have now progressed to whole-genome sequencing for an increasing number of ancient individuals and extinct species, as well as to epigenomic characterization. Such advances have enabled the sequencing of specimens of up to 1 million years old, which, owing to their extensive DNA damage and...... contamination, were previously not amenable to genetic analyses. In this Review, we discuss these varied technical challenges and solutions for sequencing ancient genomes and epigenomes....

  17. DNA Sequence Duplication in Rhodobacter sphaeroides 2.4.1: Evidence of an Ancient Partnership between Chromosomes I and II†

    OpenAIRE

    Choudhary, Madhusudan; Fu, Yun-Xin; Mackenzie, Chris; Kaplan, Samuel

    2004-01-01

    The complex genome of Rhodobacter sphaeroides 2.4.1, composed of chromosomes I (CI) and II (CII), has been sequenced and assembled. We present data demonstrating that the R. sphaeroides genome possesses an extensive amount of exact DNA sequence duplication, 111 kb or ∼2.7% of the total chromosomal DNA. The chromosomal DNA sequence duplications were aligned to each other by using MUMmer. Frequency and size distribution analyses of the exact DNA duplications revealed that the interchromosomal d...

  18. Tamil merchant in ancient Mesopotamia.

    Directory of Open Access Journals (Sweden)

    Malliya Gounder Palanichamy

    Full Text Available Recent analyses of ancient Mesopotamian mitochondrial genomes have suggested a genetic link between the Indian subcontinent and Mesopotamian civilization. There is no consensus on the origin of the ancient Mesopotamians. They may be descendants of migrants, who founded regional Mesopotamian groups like that of Terqa or they may be merchants who were involved in trans Mesopotamia trade. To identify the Indian source population showing linkage to the ancient Mesopotamians, we screened a total of 15,751 mitochondrial DNAs (11,432 from the literature and 4,319 from this study representing all major populations of India. Our results although suggest that south India (Tamil Nadu and northeast India served as the source of the ancient Mesopotamian mtDNA gene pool, mtDNA of these ancient Mesopotamians probably contributed by Tamil merchants who were involved in the Indo-Roman trade.

  19. Tamil merchant in ancient Mesopotamia.

    Science.gov (United States)

    Palanichamy, Malliya Gounder; Mitra, Bikash; Debnath, Monojit; Agrawal, Suraksha; Chaudhuri, Tapas Kumar; Zhang, Ya-Ping

    2014-01-01

    Recent analyses of ancient Mesopotamian mitochondrial genomes have suggested a genetic link between the Indian subcontinent and Mesopotamian civilization. There is no consensus on the origin of the ancient Mesopotamians. They may be descendants of migrants, who founded regional Mesopotamian groups like that of Terqa or they may be merchants who were involved in trans Mesopotamia trade. To identify the Indian source population showing linkage to the ancient Mesopotamians, we screened a total of 15,751 mitochondrial DNAs (11,432 from the literature and 4,319 from this study) representing all major populations of India. Our results although suggest that south India (Tamil Nadu) and northeast India served as the source of the ancient Mesopotamian mtDNA gene pool, mtDNA of these ancient Mesopotamians probably contributed by Tamil merchants who were involved in the Indo-Roman trade. PMID:25299580

  20. Ancient Egypt.

    Science.gov (United States)

    Evers, Virginia

    This four-week fourth grade social studies unit dealing with religious dimensions in ancient Egyptian culture was developed by the Public Education Religion Studies Center at Wright State University. It seeks to help students understand ancient Egypt by looking at the people, the culture, and the people's world view. The unit begins with outlines…

  1. Ancient DNA Analysis Suggests Negligible Impact of the Wari Empire Expansion in Peru’s Central Coast during the Middle Horizon

    Science.gov (United States)

    Barreto Romero, María Inés; Flores Espinoza, Isabel; Cooper, Alan; Fehren-Schmitz, Lars

    2016-01-01

    The analysis of ancient human DNA from South America allows the exploration of pre-Columbian population history through time and to directly test hypotheses about cultural and demographic evolution. The Middle Horizon (650–1100 AD) represents a major transitional period in the Central Andes, which is associated with the development and expansion of ancient Andean empires such as Wari and Tiwanaku. These empires facilitated a series of interregional interactions and socio-political changes, which likely played an important role in shaping the region’s demographic and cultural profiles. We analyzed individuals from three successive pre-Columbian cultures present at the Huaca Pucllana archaeological site in Lima, Peru: Lima (Early Intermediate Period, 500–700 AD), Wari (Middle Horizon, 800–1000 AD) and Ychsma (Late Intermediate Period, 1000–1450 AD). We sequenced 34 complete mitochondrial genomes to investigate the potential genetic impact of the Wari Empire in the Central Coast of Peru. The results indicate that genetic diversity shifted only slightly through time, ruling out a complete population discontinuity or replacement driven by the Wari imperialist hegemony, at least in the region around present-day Lima. However, we caution that the very subtle genetic contribution of Wari imperialism at the particular Huaca Pucllana archaeological site might not be representative for the entire Wari territory in the Peruvian Central Coast. PMID:27248693

  2. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  3. Ancient mtDNA sequences in the human nuclear genome: A potential source of errors in identifying pathogenic mutations

    OpenAIRE

    Douglas C. Wallace; Stugard, Carol; Murdock, Deborah; Schurr, Theodore; Brown, Michael D.

    1997-01-01

    Nuclear-localized mtDNA pseudogenes might explain a recent report describing a heteroplasmic mtDNA molecule containing five linked missense mutations dispersed over the contiguous mtDNA CO1 and CO2 genes in Alzheimer’s disease (AD) patients. To test this hypothesis, we have used the PCR primers utilized in the original report to amplify CO1 and CO2 sequences from two independent ρ° (mtDNA-less) cell lines. CO1 and CO2 sequences amplified from both of the ρ° cells, ...

  4. Ancient DNA analyses of early archaeological sites in New Zealand reveal extreme exploitation of moa (Aves: Dinornithiformes) at all life stages

    Science.gov (United States)

    Oskam, Charlotte L.; Allentoft, Morten E.; Walter, Richard; Scofield, R. Paul; Haile, James; Holdaway, Richard N.; Bunce, Michael; Jacomb, Chris

    2012-10-01

    The human colonisation of New Zealand in the late thirteenth century AD led to catastrophic impacts on the local biota and is among the most compelling examples of human over-exploitation of native fauna, including megafauna. Nearly half of the species in New Zealand' s pre-human avifauna are now extinct, including all nine species of large, flightless moa (Aves: Dinornithiformes). The abundance of moa in early archaeological sites demonstrates the significance of these megaherbivores in the diet of the first New Zealanders. Combining moa assemblage data, based on DNA identification of eggshell and bone, with morphological identification of bone (literature and museum catalogued specimens), we present the most comprehensive audit of moa to date from several significant 13th-15th century AD archaeological deposits across the east coast of the South Island. Mitochondrial DNA (mtDNA) was amplified from 251 of 323 (78%) eggshell fragments and 22 of 27 (88%) bone samples, and the analyses revealed the presence of four moa species: Anomalopteryx didiformis; Dinornis robustus; Emeus crassus and Euryapteryx curtus. The mtDNA, along with polymorphic microsatellite markers, enabled an estimate of the minimum number of individual eggs consumed at each site. Remarkably, in one deposit over 50 individual eggs were identified - a number that likely represents a considerable proportion of the total reproductive output of moa in the area and emphasises that human predation of all life stages of moa was intense. Molecular sexing was conducted on bones (n = 11). Contrary to previous ancient DNA studies from natural sites that consistently report an excess of female moa, we observed an excess of males (2.7:1), suggestive that males were preferential targets. This could be related to different behaviour between the two highly size-dimorphic sexes in moa. Lastly, we investigated the moa species from recovered skeletal and eggshell remains from seven Wairau Bar burials, and identified

  5. Pre-whaling genetic diversity and population ecology in eastern Pacific gray whales: insights from ancient DNA and stable isotopes.

    Directory of Open Access Journals (Sweden)

    S Elizabeth Alter

    Full Text Available Commercial whaling decimated many whale populations, including the eastern Pacific gray whale, but little is known about how population dynamics or ecology differed prior to these removals. Of particular interest is the possibility of a large population decline prior to whaling, as such a decline could explain the ~5-fold difference between genetic estimates of prior abundance and estimates based on historical records. We analyzed genetic (mitochondrial control region and isotopic information from modern and prehistoric gray whales using serial coalescent simulations and Bayesian skyline analyses to test for a pre-whaling decline and to examine prehistoric genetic diversity, population dynamics and ecology. Simulations demonstrate that significant genetic differences observed between ancient and modern samples could be caused by a large, recent population bottleneck, roughly concurrent with commercial whaling. Stable isotopes show minimal differences between modern and ancient gray whale foraging ecology. Using rejection-based Approximate Bayesian Computation, we estimate the size of the population bottleneck at its minimum abundance and the pre-bottleneck abundance. Our results agree with previous genetic studies suggesting the historical size of the eastern gray whale population was roughly three to five times its current size.

  6. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  7. mtDNA and the origin of Caucasians: identification of ancient Caucasian-specific haplogroups, one of which is prone to a recurrent somatic duplication in the D-loop region.

    OpenAIRE

    Torroni, A.; Lott, M. T.; Cabell, M F; Chen, Y. S.; Lavergne, L.; Wallace, D.C.

    1994-01-01

    mtDNA sequence variation was examined in 175 Caucasians from the United States and Canada by PCR amplification and high-resolution restriction-endonuclease analysis. The majority of the Caucasian mtDNAs were subsumed within four mtDNA lineages (haplogroups) defined by mutations that are rarely seen in Africans and Mongoloids. The sequence divergence of these haplogroups indicates that they arose early in Caucasian radiation and gave raise to modern European mtDNAs. Although ancient, none of t...

  8. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this...... paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication as...

  9. Fingerprint Recognition on Various Authentication Sensors

    Institute of Scientific and Technical Information of China (English)

    A.Tirupathi Rao; N.Pattabhi Ramaiah; C.Krishna Mohan

    2014-01-01

    Fingerprint is a very popular and an ancient biometric technology to uniquely identify a person. In this paper, a fingerprint matcher is proposed which uses the global and local adaptive binarization and global minutia features. The fingerprint data is collected using three different authentication devices based on optical sensors. The experimental results are compared with the National Institute of Standards and Technology (NIST) Bozorth algorithm and various authentication fingerprint sensors. The accuracy of the proposed algorithm has been improved significantly compared with that of the NIST Bozorth algorithm.

  10. Adsorption of DNA on biomimetic apatites: Toward the understanding of the role of bone and tooth mineral on the preservation of ancient DNA

    OpenAIRE

    Grunenwald, Anne; Keyser, Christine; Sautereau, Anne-Marie; Crubézy, Eric; Ludes, Bertrand; Drouet, Christophe

    2014-01-01

    International audience In order to shed some light on DNA preservation over time in skeletal remains from a physicochemicalviewpoint, adsorption and desorption of DNA on a well characterized synthetic apatite mimicking boneand dentin biominerals were studied. Batch adsorption experiments have been carried out to determinethe effect of contact time (kinetics), DNA concentration (isotherms) and environmentally relevant factorssuch as temperature, ionic strength and pH on the adsorption behav...

  11. Moa's Ark or volant ghosts of Gondwana? Insights from nineteen years of ancient DNA research on the extinct moa (Aves: Dinornithiformes) of New Zealand.

    Science.gov (United States)

    Allentoft, Morten E; Rawlence, Nicolas J

    2012-01-20

    The moa (Aves: Dinornithiformes) of New Zealand represent one of the extinct iconic taxa that define the field of ancient DNA (aDNA), and after almost two decades of genetic scrutiny of bones, feathers, coprolites, mummified tissue, eggshell, and sediments, our knowledge of these prehistoric giants has increased significantly. Thanks to molecular and morphological-based research, the insights that have been obtained into moa phylogenetics, phylogeography, and palaeobiology exceeds that of any other extinct taxon. This review documents the strengths of applying a multidisciplinary approach when studying extinct taxa but also shows that cross-disciplinary controversies still remain at the most fundamental levels, with highly conflicting interpretations derived from aDNA and morphology. Moa species diversity, for example, is still heavily debated, as well as their relationship with other ratites and the mode of radiation. In addition to increasing our knowledge on a lineage of extinct birds, further insights into these aspects can clarify some of the basal splits in avian evolution, and the evolutionary implications of the breakup of the prehistoric supercontinent Gondwana. Did a flightless moa ancestor drift away on proto New Zealand (Moa's Ark) or did a volant ancestor arrive by flight? Here we provide an overview of 19 years of aDNA research on moa, critically assess the attempts and controversies in placing the moa lineage among palaeognath birds, and discuss the factors that facilitated the extensive radiation of moa. Finally, we identify the most obvious gaps in the current knowledge to address the future potential research areas in moa genetics. PMID:21596537

  12. Should Teachers Be Authentic?

    Science.gov (United States)

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  13. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in...... theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  14. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...

  15. 基于ITS序列分析对紫花地丁的分子鉴别%Molecular authentication of Viola yedoensis Makino and adulterants by analysis of rDNA ITS sequences

    Institute of Scientific and Technical Information of China (English)

    朱烨; 张春; 庄元春; 税丕先

    2013-01-01

    Objective: The rDNA ITS sequences of Viola yedoensis Makino and the adulterants were analyzed to establish the molecular biological method for authentication of Viola yedoensis Makino and the adulterants. Methods: Total DNA of Viola yedoensis Makino and the adulterants were extracted. The ITS sequence was amplified by universal primer. The PCR products were directly sequenced and both directions were sequenced. Results: 8 specific authenticate sites were found in the ITS1 and ITS2 region. Conclusion: The rDNA ITS sequence can be used as good marker for authenticating Viola yedoensis Makino from the adulterants.%目的:通过研究比较紫花地丁与其易混中药材ITS序列的差异和规律,建立紫花地丁与其易混药材之间的分子鉴别方法.方法:分别从紫花地丁和易混品中提取总DNA,用ITS序列通用引物扩增,扩增产物双向测序.结果:紫花地丁与其他易混品在ITS1和ITS2区段存在特异鉴别位点共8个.结论:根据ITS序列特征,能有效区分紫花地丁和其他易混中药材.ITS序列是紫花地丁鉴定的有效的分子标记.

  16. The genome of the brown alga Ectocarpus siliculosus contains a series of viral DNA pieces, suggesting an ancient association with large dsDNA viruses

    Directory of Open Access Journals (Sweden)

    Boland Wilhelm

    2008-04-01

    Full Text Available Abstract Background Ectocarpus siliculosus virus-1 (EsV-1 is a lysogenic dsDNA virus belonging to the super family of nucleocytoplasmic large DNA viruses (NCLDV that infect Ectocarpus siliculosus, a marine filamentous brown alga. Previous studies indicated that the viral genome is integrated into the host DNA. In order to find the integration sites of the viral genome, a genomic library from EsV-1-infected algae was screened using labelled EsV-1 DNA. Several fragments were isolated and some of them were sequenced and analyzed in detail. Results Analysis revealed that the algal genome is split by a copy of viral sequences that have a high identity to EsV-1 DNA sequences. These fragments are interspersed with DNA repeats, pseudogenes and genes coding for products involved in DNA replication, integration and transposition. Some of these gene products are not encoded by EsV-1 but are present in the genome of other members of the NCLDV family. Further analysis suggests that the Ectocarpus algal genome contains traces of the integration of a large dsDNA viral genome; this genome could be the ancestor of the extant NCLDV genomes. Furthermore, several lines of evidence indicate that the EsV-1 genome might have originated in these viral DNA pieces, implying the existence of a complex integration and recombination system. A protein similar to a new class of tyrosine recombinases might be a key enzyme of this system. Conclusion Our results support the hypothesis that some dsDNA viruses are monophyletic and evolved principally through genome reduction. Moreover, we hypothesize that phaeoviruses have probably developed an original replication system.

  17. Transparent User Authentication

    CERN Document Server

    Clarke, Nathan

    2011-01-01

    This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication -- where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discu

  18. DNA typing of ancient parasite eggs from environmental samples identifies human and animal worm infections in Viking-age settlement

    DEFF Research Database (Denmark)

    Søe, Martin Jensen; Fredensborg, Brian Lund; Nejsum, Peter;

    which parasite eggs from environmental samples collected at a Viking-age settlement (1018-1030 A.D.) are DNA typed to the species level. The human whipworm (Trichuris trichiura) and the human roundworm (Ascaris lumbricoides) are identified indicating that these parasites were endemic in Denmark in the...

  19. Transcriptional profiling in C. elegans suggests DNA damage dependent apoptosis as an ancient function of the p53 family

    NARCIS (Netherlands)

    S. Greiss (Sebastian); B. Schumacher (Björn); K. Grandien (Kaj); J. Rothblatt (Jonathan); A. Gartner (Anton)

    2008-01-01

    textabstractBackground: In contrast to the three mammalian p53 family members, p53, which is generally involved in DNA damage responses, and p63 and p73 which are primarily needed for developmental regulation, cep-1 encodes for the single C. elegans p53-like gene. cep-1 acts as a transcription activ

  20. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2015-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader....... This paper uses Deleuze’s discussion of Platonism as a point of departure for critically scrutinizing the problem of authenticating the leader - drawing a distinction between authentic and inauthentic leaders. This will be done through a reading of Bill George’s book Authentic Leadership. Informed by Deleuze......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  1. Ancient DNA Analyses Reveal Contrasting Phylogeographic Patterns amongst Kiwi (Apteryx spp.) and a Recently Extinct Lineage of Spotted Kiwi

    OpenAIRE

    Shepherd, Lara D.; Worthy, Trevor H.; Tennyson, Alan J. D.; Scofield, R. Paul; Ramstad, Kristina M.; Lambert, David M.

    2012-01-01

    The little spotted kiwi (Apteryx owenii) is a flightless ratite formerly found throughout New Zealand but now greatly reduced in distribution. Previous phylogeographic studies of the related brown kiwi (A. mantelli, A. rowi and A. australis), with which little spotted kiwi was once sympatric, revealed extremely high levels of genetic structuring, with mitochondrial DNA haplotypes often restricted to populations. We surveyed genetic variation throughout the present and pre-human range of littl...

  2. Ancient DNA study of the remains of putative infanticide victims from the Yewden Roman villa site at Hambleden, England

    OpenAIRE

    Hassan, A; Brown, K; Eyers, J.; Brown, T; Mays, S.

    2014-01-01

    Previous analysis of the perinatal infant burials from Romano-British Yewden villa, Hambleden, indicated the practice of infanticide at that site. We attempted to determine whether this practice was specifically targeted at one sex or other by determining the sex of the infants using analysis of fragments of the amelogenin gene. We also analysed mtDNA in order to shed light on aspects of kinship. Thirty-three infants were analysed, and sex was successfully identified in 12. Seven were female,...

  3. Statistical Methods for Population Genetic Inference Based on Low-Depth Sequencing Data from Modern and Ancient DNA

    DEFF Research Database (Denmark)

    Korneliussen, Thorfinn Sand

    data. These methods are all based on the concept of genotype likelihoods, which provides a degree of uncertainty of the data, and we show, both through simulations and with proper high-throughput sequencing data, that for low-depth data our methods outperform existing approaches, which are based......Due to the recent advances in DNA sequencing technology genomic data are being generated at an unprecedented rate and we are gaining access to entire genomes at population level. The technology does, however, not give direct access to the genetic variation and the many levels of preprocessing...... that is required before being able to make inferences from the data introduces multiple levels of uncertainty, especially for low-depth data. Therefore methods that take into account the inherent uncertainty are needed for being able to make robust inferences in the downstream analysis of such data. This poses...

  4. The Recognizability of Authenticity

    OpenAIRE

    Henderson, Madeleine; Gabora, Liane

    2013-01-01

    The goals of this research were to (1) determine if there is agreement both amongst viewers, and between viewers and the performer, about the extent to which performances are authentic, and (2) ascertain whether or not performers and/or viewers can distinguish between authenticity and skill. An authentic performance is one that is natural or genuine, while an inauthentic performance feels faked, forced, or imitative. Study participants were asked to rate the authenticity and skill level of a ...

  5. Authentic Assessment, Professional's Guide.

    Science.gov (United States)

    Ryan, Concetta Doti

    Authentic assessment is the process of gathering evidence and documenting student learning and growth in an authentic context. Authentic assessment can do a better job than more traditional forms of assessment in informing educators and parents about a student's real achievement. The first chapter of this book presents an overview of authentic…

  6. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  7. Authenticity in Adult Learning

    Science.gov (United States)

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  8. The TL dating of ancient porcelain

    International Nuclear Information System (INIS)

    The age determination of ancient porcelain using the pre-dose technique in TL dating was reported. The variation of beta dose with depth below the surface of the porcelain slice, the thermal activation characteristic (TAC) for 110 degree C peak, the measurement of paleodose and the estimation of annual dose were studied. The results show that this technique is suitable for authenticity testing of ancient porcelain, but both accuracy and precision for porcelain dating are worse than those for pottery, because porcelain differs from pottery on composition, structure and firing temperature. Besides, some complicated factors in the pre-dose technique would be the possible cause of the greater errors

  9. Multi-factor authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  10. Ancient Egypt

    Science.gov (United States)

    Swamy, Ashwin Balegar

    This thesis involves development of an interactive GIS (Geographic Information System) based application, which gives information about the ancient history of Egypt. The astonishing architecture, the strange burial rituals and their civilization were some of the intriguing questions that motivated me towards developing this application. The application is a historical timeline starting from 3100 BC, leading up to 664 BC, focusing on the evolution of the Egyptian dynasties. The tool holds information regarding some of the famous monuments which were constructed during that era and also about the civilizations that co-existed. It also provides details about the religions followed by their kings. It also includes the languages spoken during those periods. The tool is developed using JAVA, a programing language and MOJO (Map Objects Java Objects) a product of ESRI (Environmental Science Research Institute) to create map objects, to provide geographic information. JAVA Swing is used for designing the user interface. HTML (Hyper Text Markup Language) pages are created to provide the user with more information related to the historic period. CSS (Cascade Style Sheets) and JAVA Scripts are used with HTML5 to achieve creative display of content. The tool is kept simple and easy for the user to interact with. The tool also includes pictures and videos for the user to get a feel of the historic period. The application is built to motivate people to know more about one of the prominent and ancient civilization of the Mediterranean world.

  11. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...... of community. The project explores the inherent paradox of such staging of authenticity by way of three research questions: 1) How are new houses and areas made authentic through stories told through material design and branding? 2) What different concepts of authenticity are at stake? 3) How are the...

  12. Sport and Authenticity

    OpenAIRE

    Bednář, Miloš

    2014-01-01

    This article focuses on the concept of authenticity as understood by Heidegger, Taylor, and Ferrara and its relationship to sport. I divide Heidegger’s unusual terms (existentiales) from “Being and time” into the categories of authenticity and inauthenticity and provide examples of each from the field of sport. In further I analyse the ethical standpoint of authenticity which is in the centre of both ethical and sociological discourse today. Taylor´s conceptions of moral ideal and culture of ...

  13. SECURE REMOTE CLIENT AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    K.Pradeep,

    2010-10-01

    Full Text Available This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  14. SECURE REMOTE CLIENT AUTHENTICATION

    OpenAIRE

    K.Pradeep,; R.Usha Rani; E.Ravi Kumar; K.Nikhila,; Vijay Sankar

    2010-01-01

    This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  15. Temporal patterns of damage and decay kinetics of DNA retrieved from plant herbarium specimens.

    Science.gov (United States)

    Weiß, Clemens L; Schuenemann, Verena J; Devos, Jane; Shirsekar, Gautam; Reiter, Ella; Gould, Billie A; Stinchcombe, John R; Krause, Johannes; Burbano, Hernán A

    2016-06-01

    Herbaria archive a record of changes of worldwide plant biodiversity harbouring millions of specimens that contain DNA suitable for genome sequencing. To profit from this resource, it is fundamental to understand in detail the process of DNA degradation in herbarium specimens. We investigated patterns of DNA fragmentation and nucleotide misincorporation by analysing 86 herbarium samples spanning the last 300 years using Illumina shotgun sequencing. We found an exponential decay relationship between DNA fragmentation and time, and estimated a per nucleotide fragmentation rate of 1.66 × 10(-4) per year, which is six times faster than the rate estimated for ancient bones. Additionally, we found that strand breaks occur specially before purines, and that depurination-driven DNA breakage occurs constantly through time and can to a great extent explain decreasing fragment length over time. Similar to what has been found analysing ancient DNA from bones, we found a strong correlation between the deamination-driven accumulation of cytosine to thymine substitutions and time, which reinforces the importance of substitution patterns to authenticate the ancient/historical nature of DNA fragments. Accurate estimations of DNA degradation through time will allow informed decisions about laboratory and computational procedures to take advantage of the vast collection of worldwide herbarium specimens. PMID:27429780

  16. One-step triplex-polymerase chain reaction assay for the authentication of yellowfin (Thunnus albacares), bigeye (Thunnus obesus), and skipjack (Katsuwonus pelamis) tuna DNA from fresh, frozen, and canned tuna samples.

    Science.gov (United States)

    Michelini, Elisa; Cevenini, Luca; Mezzanotte, Laura; Simoni, Patrizia; Baraldini, Mario; De Laude, Luca; Roda, Aldo

    2007-09-19

    A one-step triplex-polymerase chain reaction (PCR)-based assay was developed to discriminate between three tuna species, Thunnus albacares, Thunnus obesus, and Katsuwonus pelamis, even in highly processed food samples such as canned or cooked tuna. Diagnostic nucleotides were identified by direct sequencing and alignment of part of the mitochondrial cytochrome b gene of 30 authenticated exemplars, which allowed us to evaluate intraspecific variation and the genetic distance between three tuna species. The assay relies on a one-step triplex-PCR reaction in which in a single tube species-specific amplification products are generated only in the presence of the correct template nucleic acid and the species of origin of the DNA is indicated by the distinctive size of the PCR product. The identification of tuna species can be performed with a good accuracy, low cost, and with potential automation for large-scale high-throughput screenings in small in-house laboratories. PMID:17711337

  17. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities. PMID:19018894

  18. Mitogenomic analyses from ancient DNA

    DEFF Research Database (Denmark)

    Paijmans, Johanna L.A.; Gilbert, M Thomas P; Hofreiter, Michael

    2013-01-01

    . To date, at least 124 partially or fully assembled mitogenomes from more than 20 species have been obtained, and, given the rapid progress in sequencing technology, this number is likely to dramatically increase in the future. The increased information content offered by analysing full mitogenomes...

  19. Decolonizing Researcher Authenticity

    Science.gov (United States)

    Daza, Stephanie Lynn

    2008-01-01

    This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…

  20. Single password authentication

    OpenAIRE

    Küpçü, Alptekin; Acar, Tolga; Belenkiy, Mira

    2013-01-01

    Single Password Authentication Tolga Acar∗ Intel Corporation, Bellevue, WA, USA Mira Belenkiy Microsoft Research, Redmond, WA, USA Alptekin K up c u† Ko c University, _Istanbul, TURKEY May 11, 2013 Abstract Users frequently reuse their passwords when authenticating to various online services. Com-bined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to th...

  1. Authenticity and Imagination

    Science.gov (United States)

    Dirkx, John M.

    2006-01-01

    Central to development of authenticity in teaching is self-understanding and self-awareness. Using a Jungian perspective, the author suggests that the imaginative dimensions of the self play a critical role in our journey and experience as teachers, and in developing self-awareness and authenticity in our teaching.

  2. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  3. Complete mitochondrial genome sequence of a Middle Pleistocene cave bear reconstructed from ultrashort DNA fragments.

    Science.gov (United States)

    Dabney, Jesse; Knapp, Michael; Glocke, Isabelle; Gansauge, Marie-Theres; Weihmann, Antje; Nickel, Birgit; Valdiosera, Cristina; García, Nuria; Pääbo, Svante; Arsuaga, Juan-Luis; Meyer, Matthias

    2013-09-24

    Although an inverse relationship is expected in ancient DNA samples between the number of surviving DNA fragments and their length, ancient DNA sequencing libraries are strikingly deficient in molecules shorter than 40 bp. We find that a loss of short molecules can occur during DNA extraction and present an improved silica-based extraction protocol that enables their efficient retrieval. In combination with single-stranded DNA library preparation, this method enabled us to reconstruct the mitochondrial genome sequence from a Middle Pleistocene cave bear (Ursus deningeri) bone excavated at Sima de los Huesos in the Sierra de Atapuerca, Spain. Phylogenetic reconstructions indicate that the U. deningeri sequence forms an early diverging sister lineage to all Western European Late Pleistocene cave bears. Our results prove that authentic ancient DNA can be preserved for hundreds of thousand years outside of permafrost. Moreover, the techniques presented enable the retrieval of phylogenetically informative sequences from samples in which virtually all DNA is diminished to fragments shorter than 50 bp. PMID:24019490

  4. Resurrecting ancient animal genomes: the extinct moa and more.

    Science.gov (United States)

    Huynen, Leon; Millar, Craig D; Lambert, David M

    2012-08-01

    Recently two developments have had a major impact on the field of ancient DNA (aDNA). First, new advances in DNA sequencing, in combination with improved capture/enrichment methods, have resulted in the recovery of orders of magnitude more DNA sequence data from ancient animals. Second, there has been an increase in the range of tissue types employed in aDNA. Hair in particular has proven to be very successful as a source of DNA because of its low levels of contamination and high level of ancient endogenous DNA. These developments have resulted in significant advances in our understanding of recently extinct animals: namely their evolutionary relationships, physiology, and even behaviour. Hair has been used to recover the first complete ancient nuclear genome, that of the extinct woolly mammoth, which then facilitated the expression and functional analysis of haemoglobins. Finally, we speculate on the consequences of these developments for the possibility of recreating extinct animals. PMID:22674514

  5. Discovering your authentic leadership.

    Science.gov (United States)

    George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana

    2007-02-01

    The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results. PMID:17345686

  6. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  7. Data Authentication Using Cryptography

    Directory of Open Access Journals (Sweden)

    Sagar Chouksey

    2013-06-01

    Full Text Available We present a novel approach using cryptographyfor data authentication. The key idea is to provide aencoded quantized data projection as authenticationdata. This can be correctly decoded with the help ofan authentic data using as side information.Cryptography source coding provides the desiredrobustness against legitimate variations whiledetecting illegitimate modification. Additionaladjustments might not change the meaning of thecontent, but could be misclassified as tampering.Users might also beinterested in localizingtampered regions. Distinguishing legitimateencodings with possible adjustments fromtampering and localizing tampering are thechallenges addressed in this paper. We applycryptography source coding and statistical methodsto solve the data authentication problem.Experimental results have been presented for dataauthentication.

  8. STUDENTS’ POTENTIAL FOR AUTHENTIC LEADERSHIP

    OpenAIRE

    Djurdja Solesa-Grijak; Dragan Solesa; Nedjo Kojic

    2015-01-01

    To know yourself and to act accordingly has been seen as a moral imperative throughout history. The aim of this research was to determine potential of students for authentic leadership and relation between their authentic personality and potential for authentic leadership. The sample consisted of students (N=133) from Serbia (male – 59% and female – 41%). The average age of students was M=21.9. Instruments used were Authenticity Scale (Wood et al., 2008) and Authentic Leadership Self-Assessme...

  9. Biometric Authentication: A Review

    OpenAIRE

    Debnath Bhattacharyya; Rahul Ranjan; Farkhod Alisherov; Minkyu Choi

    2009-01-01

    Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological parameters. A wide variety of systems require reliable personal recognition schemes to either confirm or de...

  10. National Authentication Systems

    OpenAIRE

    Sandnes, Are Haugen

    2012-01-01

    Information security has to adapt to an ever-changing environment. Recently there has been a significant increase in the use of smartphones and other mobile devices to access services on the Internet that originally is designed for desktop computers.This thesis examines authentication systems on the Internet aimed at large user groups in light of the evolving threats due to increased use of mobile devices. It examines these authentication systems from the perspective of the end user and inves...

  11. Authentication of quantum messages.

    Energy Technology Data Exchange (ETDEWEB)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  12. DNA-Based Authentication of Botanicals and Plant-Derived Dietary Supplements: Where Have We Been and Where Are We Going?

    Science.gov (United States)

    Coutinho Moraes, Denise F; Still, David W; Lum, Michelle R; Hirsch, Ann M

    2015-06-01

    Herbal medicines and botanicals have long been used as sole or additional medical aids worldwide. Currently, billions of dollars are spent on botanicals and related products, but minimal regulation exists regarding their purity, integrity, and efficacy. Cases of adulteration and contamination have led to severe illness and even death in some cases. Identifying the plant material in botanicals and phytomedicines using organoleptic means or through microscopic observation of plant parts is not trivial, and plants are often misidentified. Recently, DNA-based methods have been applied to these products because DNA is not changed by growth conditions unlike the chemical constituents of many active pharmaceutical agents. In recent years, DNA barcoding methods, which are used to identify species diversity in the Tree of Life, have been also applied to botanicals and plant-derived dietary supplements. In this review, we recount the history of DNA-based methods for identification of botanicals and discuss some of the difficulties in defining a specific bar code or codes to use. In addition, we describe how next generation sequencing technologies have enabled new techniques that can be applied to identifying these products with greater authority and resolution. Lastly, we present case histories where dietary supplements, decoctions, and other products have been shown to contain materials other than the main ingredient stipulated on the label. We conclude that there is a fundamental need for greater quality control in this industry, which if not self-imposed, that may result from legislation. PMID:25856442

  13. Apps for Ancient Civilizations

    Science.gov (United States)

    Thompson, Stephanie

    2011-01-01

    This project incorporates technology and a historical emphasis on science drawn from ancient civilizations to promote a greater understanding of conceptual science. In the Apps for Ancient Civilizations project, students investigate an ancient culture to discover how people might have used science and math smartphone apps to make their lives…

  14. Active Image Authentication System (AIAS

    Directory of Open Access Journals (Sweden)

    S. B. Nikam

    2013-09-01

    Full Text Available Today’s networking age provides greater importance to the authentication mechanism for security. Authentication is the process of identification of user or client respect to service parameters. These service parameters consist of unique combination of password associated with username or userid. Graphical based authentication mechanism had provided strong alternative for knowledge based, token based {&} biometric authentication mechanism. In this paper we are going to propose new graphical based authentication mechanism. This Active Image Authentication System (AIAS provides strong solution on guessing attack using random positioning of Active Points (AP with respect to time domain

  15. Password authentication in cloud

    Directory of Open Access Journals (Sweden)

    Indal Singh

    2015-09-01

    Full Text Available Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing describes applications that are extended to be accessible through the internet and for this purpose large data centers and powerful servers are used to host the web applications and web services. Authentication is one the most important security primitive [6]. Password authentication is most widely used authentication mechanism. Password provides security mechanism for authentication and protection services against unwanted access to resource. In this paper, we applied a technique to preserve our password using graphical authentication.

  16. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  17. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review......, it becomes possible to specify employment relations parameters between the indirect and direct employer and employees in a manner that will ensure working conditions consistent with these traditions, substantially enhancing the prospect of authenticity in employment relations. This theology of the workplace...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...

  18. A comparative study of ancient environmental DNA to pollen and macrofossils from lake sediments reveals taxonomic overlap and additional plant taxa

    DEFF Research Database (Denmark)

    Pedersen, M.W.; Ginolhac, A.; Orlando, L.;

    2013-01-01

    thirty-nine samples from the core yielded putative DNA sequences. Using a multiple assignment strategy on the trnL g-h DNA barcode, consisting of two different phylogenetic and one sequence similarity assignment approaches, thirteen families of plants were identified, of which two (. Scrophulariaceae and...

  19. Information barriers and authentication

    International Nuclear Information System (INIS)

    Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.

  20. Haunted by the authentic

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi

    2013-01-01

    Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...... its findings, but, in line with its exploratory nature, to investigate the behaviour of Danish guests in relation to consumption of Italian food in an authentic setting. Originality/value: This paper looks at the relationship between the guest and the experience of ethnic food from a new perspective...

  1. QKD Quantum Channel Authentication

    CERN Document Server

    Kosloski, J T

    2006-01-01

    Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

  2. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  3. Mega Key Authentication Mechanism

    OpenAIRE

    Kloss, Guy

    2016-01-01

    For secure communication it is not just sufficient to use strong cryptography with good and strong keys, but to actually have the assurance, that the keys in use for it are authentic and from the contact one is expecting to communicate with. Without that, it is possible to be subject to impersonation or man-in-the-middle (MitM) attacks. Mega meets this problem by providing a hierarchical authentication mechanism for contacts and their keys. To avoid any hassle when using multiple types of key...

  4. A 150-year record of ancient DNA, lipid biomarkers and hydrogen isotopes, tracing the microbial-planktonic community succession controlled by (hydro)climatic variability in a tropical lake

    Science.gov (United States)

    Smittenberg, Rienk; Yamoah, Kweku; Callac, Nolwenn; Fru, Ernest Chi; Chabangborn, Akkaneewut; Rattray, Jayne; Wohlfarth, Barbara

    2016-04-01

    We investigated the decadal variations in phytoplankton communities, and their response to environmental and climatic conditions, from a ˜150 year long sedimentary archive of Lake Nong Thale Prong (NTP), southern Thailand. We applied a combination of analyses: lipid biomarkers, compound-specific hydrogen isotopes, bulk carbon and nitrogen concentrations and isotopes, environmental SEM, and fossil DNA using qPCR targeted to specific taxa. Past hydrological conditions were reconstructed using the hydrogen isotopic composition of leaf wax n-alkanes. Temperatures were reconstructed using the tetraether-based MBT/CBT index, measured using a new and efficient reverse-phase HPLC-MS method. The climatological data compared well with meteorological data from the last decades. Reconstructed drier and warmer conditions from ˜1857-1916 Common Era (CE) coincided with oligotrophic lake water conditions and dominance of the green algae Botryococcus braunii - evidenced by a combination of both fossil DNA and the occurrence of characteristic botryococcene lipids. A change to higher silica (Si) input ˜1916 CE was related to increased rainfall and lower temperatures concurring with an abrupt takeover by diatom blooms lasting for 50 years - as evidenced by ancient DNA, characteristic highly branched isoprenoid lipids, and SEM. From the 1970s onwards, more eutrophic conditions prevailed, and these were likely caused by increased levels of anthropogenic phosphate (P), aided by stronger lake stratification caused by dryer and warmer conditions. The eutrophic conditions led to increased primary productivity in the lake, consisting again of a Botryococcus sp., although this time not producing botryococcene lipids. Moreover, Cyanobacteria became dominant - again evidenced by ancient DNA and the characteristic C19 alkane. Throughout the record, stratification and primary production could be linked to the intensity of methane cycling, by targeting and quantifying the mcrA gene that is used

  5. Nuclear and mitochondrial DNA sequence data reveal the evolutionary history of Barbus (Cyprinidae) in the ancient lake systems of the Balkans.

    Science.gov (United States)

    Marková, Silvia; Sanda, Radek; Crivelli, Alain; Shumka, Spase; Wilson, Iain F; Vukić, Jasna; Berrebi, Patrick; Kotlík, Petr

    2010-05-01

    Freshwater fauna of ancient lakes frequently contain endemic taxa thought to have originated during the long existence of these lakes, yet uncertainties remain as to whether they represent distinct genetic lineages with respect to more widespread relatives and to the relative roles of isolation and dispersal in their evolution. Phylogenetic analyses of sequence variation at nuclear and mitochondrial genes were used to examine these issues for the freshwater fish genus Barbus in two European ancient lake systems on the Balkan Peninsula. The nuclear and mitochondrial data yielded concordant phylogeographic patterns though incomplete sorting of nuclear haplotypes between some mitochondrial clades was detected. The distributions of two currently recognized species investigated here do not match the distributions of evolutionary lineages revealed by phylogenetic analyses. The Prespa barbel, Barbus prespensis, is not endemic to the lakes Prespa as previously thought but is instead found to be widespread in the south-eastern Adriatic Sea basin, with a distribution largely corresponding to the basin of the now extinct Lake Maliq historically connected with Lake Prespa. On the other hand, a cryptic phylogenetic subdivision in a widespread species, B. rebeli, was discovered to be more distant from B. rebeli than from other Barbus species and to be endemic to the system of connected lakes Ohrid and Shkodra. The division coincides with the hydrogeographical boundary delimiting distributions of other freshwater fishes, and we suggest that this newly discovered evolutionary lineage represents a distinct species. These findings support the emerging pattern that endemic taxa have evolved not through isolation of individual lakes, but in systems of currently and historically interconnected lakes and their wider basins. PMID:20139017

  6. Reading Authentic Texts

    DEFF Research Database (Denmark)

    Balling, Laura Winther

    2013-01-01

    Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...

  7. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  8. Low-bandwidth authentication.

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  9. Facilitating Authentic Becoming

    Science.gov (United States)

    Eriksen, Matthew

    2012-01-01

    A "Model of Authentic Becoming" that conceptualizes learning as a continuous and ongoing embodied and relational process, and uses social constructionism assumptions as well as Kolb's experiential learning model as its point of departure, is presented. Through a focus on the subjective, embodied, and relational nature of organizational life, the…

  10. Tools for Authentication

    International Nuclear Information System (INIS)

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work

  11. A video authentication technique

    International Nuclear Information System (INIS)

    Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system

  12. Mitochondrial phylogenomics of modern and ancient equids

    DEFF Research Database (Denmark)

    Vilstrup, Julia T; Seguin-Orlando, Andaine; Stiller, Mathias; Ginolhac, Aurelien; Raghavan, Maanasa; Nielsen, Sandra C A; Weinstock, Jacobo; Froese, Duane; Vasiliev, Sergei K; Ovodov, Nikolai D; Clary, Joel; Helgen, Kristofer M; Fleischer, Robert C; Cooper, Alan; Shapiro, Beth; Orlando, Ludovic Antoine Alexandre

    2013-01-01

    sequences from all seven extant lineages within the genus Equus. Bayesian and Maximum Likelihood phylogenetic inference confirms that zebras are monophyletic within the genus, and the Plains and Grevy's zebras form a well-supported monophyletic group. Using ancient DNA techniques, we further characterize...

  13. HORTUS MALABARICUS AND THE ETHNOIATRICAL KNOWLEDGE OF ANCIENT MALABAR

    OpenAIRE

    Manilal, K.S.

    1984-01-01

    Hortus Malabaricus is the oldest important printed book on Indian medicinal plants. The 1st of its 12 volumes was published in 1678 from Amsterdam this book, written by H.A. Van Rheede is perhaps the only authentic record of the ethnoiatrical knowledge of ancient Malabar, available to us today. Several hundred medicinal plants which were successful used by the Ayurvedic physiclans of 17th century are described in this, along with their medicinal powers and methods of application. The identity...

  14. [The Dynamics of the Composition of mtDNA Haplotypes of the Ancient Population of the Altai Mountains from the Early Bronze Age (3rd Millennium BC) to the Iron Age (2nd-1st Centuries BC)].

    Science.gov (United States)

    Gubina, M A; Kulikov, I V; Babenko, V N; Chikisheva, T A; Romaschenko, A G; Voevoda, M I; Molodin, V I

    2016-01-01

    The mtDNA polymorphism in representatives of various archaeological cultures of the Developed Bronze Age, Early Scythian, and Hunnish-Sarmatian periods was analyzed (N = 34). It detected the dominance of Western-Eurasian haplotypes (70.6%) in mtDNA samples from the representatives of the ancient population of the Early Bronze Age--Iron Age on the territory of Altai Mountains. Since the 8th to the 7th centuries BC, a sharp increase was revealed in the Eastern-Eurasian haplogroups A, D, C, andZ (43.75%) as compared to previous cultures (16.7%). The presence of haplotype 223-242-290-319 of haplogroup A8 in Dolgans, Itelmens, Evens, Koryaks, and Yakuts indicates the possible long-term presence of its carriers in areas inhabited by these populations. The prevalence of Western-Eurasian haplotypes is observed not only in the Altai Mountains but also in Central Asia (Kazakhstan) and the South of the Krasnoyarsk Krai. All of the three studied samples from the Western-Eurasian haplogroups were revealed to contain U, H, T, and HV. The ubiquitous presence of haplotypes of haplogroup H and some haplogroups of cluster U (U5al, U4, U2e, and K) in the vast territory from the Yenisei River basin to the Atlantic Ocean may indicate the direction of human settlement, which most likely occurred in the Paleolithic Period from Central Asia. PMID:27183799

  15. Studying Ancient History.

    Science.gov (United States)

    Barrow, Robin

    1982-01-01

    Defends the value and relevance of the study of ancient history and classics in history curricula. The unique homogeneity of the classical period contributes to its instructional manageability. A year-long, secondary-level course on fifth-century Greece and Rome is described to illustrate effective approaches to teaching ancient history. (AM)

  16. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  17. Challenge Measurements For Authentication

    International Nuclear Information System (INIS)

    Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator's ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

  18. Probabilistic authenticated quantum dialogue

    Science.gov (United States)

    Hwang, Tzonelih; Luo, Yi-Ping

    2015-12-01

    This work proposes a probabilistic authenticated quantum dialogue (PAQD) based on Bell states with the following notable features. (1) In our proposed scheme, the dialogue is encoded in a probabilistic way, i.e., the same messages can be encoded into different quantum states, whereas in the state-of-the-art authenticated quantum dialogue (AQD), the dialogue is encoded in a deterministic way; (2) the pre-shared secret key between two communicants can be reused without any security loophole; (3) each dialogue in the proposed PAQD can be exchanged within only one-step quantum communication and one-step classical communication. However, in the state-of-the-art AQD protocols, both communicants have to run a QKD protocol for each dialogue and each dialogue requires multiple quantum as well as classical communicational steps; (4) nevertheless, the proposed scheme can resist the man-in-the-middle attack, the modification attack, and even other well-known attacks.

  19. Abusing SIP authentication

    OpenAIRE

    Abdelnur H.; Avanesov T.; Rusinowitch M.; State R.

    2009-01-01

    International audience The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this vulnerability, highlight a simple usage case and propose a mitigati...

  20. International safeguards data authentication

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  1. International safeguards data authentication

    International Nuclear Information System (INIS)

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software

  2. Lake sediment multi-taxon DNA from North Greenland records early post-glacial appearance of vascular plants and accurately tracks environmental changes

    DEFF Research Database (Denmark)

    Epp, L. S.; Gussarova, C.; Boessenkool, S.;

    2015-01-01

    temperatures. Lake sediments contain DNA paleorecords of the surrounding ecosystems and can be used to retrieve a variety of organismal groups from a single sample. In this study, we analyzed vascular plant, bryophyte, algal (in particular diatom) and copepod DNA retrieved from a sediment core spanning the...... phases, and distinct temporal changes in plant presence were recovered. The plant DNA was mostly in agreement with expected vegetation history, but very early occurrences of vascular plants, including the woody Empetrum nigrum, document terrestrial vegetation very shortly after glacial retreat. Our study...... core. Our DNA record was stratigraphically coherent, with no indication of leaching between layers, and our cross-taxon comparisons were in accordance with previously inferred local ecosystem changes. Authentic ancient plant DNA was retrieved from nearly all layers, both from the marine and the limnic...

  3. Authentication and Authorization Models

    Directory of Open Access Journals (Sweden)

    More V.N

    2011-04-01

    Full Text Available In computer science distributed systems could be more secured with a distributed trust model based on either PKIor Kerberos. However, it becomes difficult to establish trust relationship across heterogeneous domains due todifferent actual trust mechanism and security policy as well as the intrinsic flaw of each trust model. Since Internethas been used commonly in information systems technologies, many applications need some security capabilitiesto protect against threats to the communication of information. Two critical procedures of these capabilities areauthentication and authorization. This report presents a strong authentication and authorization model using threestandard frameworks. They are PKI, PMI, and Directory. The trust in this approach is enabled by the use of publickey infrastructure (PKI which is applied for client two-factor authentication and secures the infrastructure. Weintroduce the preventive activity-based authorization policy for dynamic user privilege controls. It helps preventsuccessive unauthorized requests in a formal manner. At the core, we apply An Improved Trust Model to facilitatethe authentication with the different keys with work flow of model efficiently. Also describes the X.509 standard todefine the directory schemas of PKI and PMI to find the object classes and optional attributes.

  4. Ancient DNA analysis of mid-holocene individuals from the Northwest Coast of North America reveals different evolutionary paths for mitogenomes.

    Directory of Open Access Journals (Sweden)

    Yinqiu Cui

    Full Text Available To gain a better understanding of North American population history, complete mitochondrial genomes (mitogenomes were generated from four ancient and three living individuals of the northern Northwest Coast of North America, specifically the north coast of British Columbia, Canada, current home to the indigenous Tsimshian, Haida, and Nisga'a. The mitogenomes of all individuals were previously unknown and assigned to new sub-haplogroup designations D4h3a7, A2ag and A2ah. The analysis of mitogenomes allows for more detailed analyses of presumed ancestor-descendant relationships than sequencing only the HVSI region of the mitochondrial genome, a more traditional approach in local population studies. The results of this study provide contrasting examples of the evolution of Native American mitogenomes. Those belonging to sub-haplogroups A2ag and A2ah exhibit temporal continuity in this region for 5000 years up until the present day. Of possible associative significance is that archaeologically identified house structures in this region maintain similar characteristics for this same period of time, demonstrating cultural continuity in residence patterns. The individual dated to 6000 years before present (BP exhibited a mitogenome belonging to sub-haplogroup D4h3a. This sub-haplogroup was earlier identified in the same general area at 10300 years BP on Prince of Wales Island, Alaska, and may have gone extinct, as it has not been observed in any living individuals of the Northwest Coast. The presented case studies demonstrate the different evolutionary paths of mitogenomes over time on the Northwest Coast.

  5. Adolescent Perspectives on Authentic Writing Instruction

    Science.gov (United States)

    Behizadeh, Nadia

    2014-01-01

    Researchers and educators support the idea of providing authentic literacy experiences to students. However, a critical misconception of the locus of authenticity exists; the focus has generally been on making tasks authentic to college, careers, or researcher-determined notions of authenticity rather than making tasks authentic to students and…

  6. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  7. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls will not...... be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This...

  8. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls...... will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper...

  9. An Authentic RFLP Lab for High School or College Biology Students.

    Science.gov (United States)

    Guilfoile, Patrick G.; Plum, Stephen

    1998-01-01

    Explains how students can perform an alternative authentic DNA fingerprinting analysis. Presents restriction fragment length polymorphism (RFLP) analysis and can serve as a simulated molecular epidemiology laboratory or as a simulated forensic laboratory exercise. (DDR)

  10. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    OpenAIRE

    Nebojsa Pavlovic

    2015-01-01

    This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The rese...

  11. Two Factor Authentication Made Easy

    OpenAIRE

    Chen, Alex Q. and Goh, Weihan

    2015-01-01

    Authentication on the Web is a challenge that can have a negative effect on user experience if it becomes overly complicated and cumbersome. This experience is even more crucial for older and visually impaired users due to their functional abilities. Web applications typically authenticate users by requesting for information that only the user knows (e.g. password). To enhance security, two-factor authentication (2FA) are increasingly implemented, which require the user to manually transfer i...

  12. Mobile authentication problems and solutions

    CERN Document Server

    Jakobsson, Markus

    2012-01-01

    Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication with

  13. Ancient DNA unravels the truth behind the controversial GUS Greenlandic Norse fur samples: the bison was a horse, and the muskox and beats were goats

    DEFF Research Database (Denmark)

    Sinding, Mikkel-Holger; Arneborg, Jette; Nyegaard, Georg;

    2015-01-01

    The Norse Greenlandic archaeological site known as ‘the Farm Beneath the Sand’ (GUS) has sourced many well-preserved and unique archaeological artefacts. Some of the most controversial finds are tufts of hair, which previous morphological-based examination concluded derive from bison, black bear...... mitochondrial 16S DNA analysis. The results revealed that the putative bison was, in fact horse, while the bears and muskox were goat. The results demonstrate the importance of using genetic analyses to validate results derived from morphological analyses on hair, in particular where such studies lead to...

  14. Art Activities about Mesopotamia, Egypt and Islam. Hands-On Ancient People.

    Science.gov (United States)

    Merrill, Yvonne Y.

    This book features objects of the Mesopotamian, the Egyptian, and Islamic cultures. In exploring important contributions in ancient art, the book presents visuals that are interpretations of authentic artifacts, usually in museum collections, or illustrations from archaeological publications and articles. Historical items (n=55+) have been adapted…

  15. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  16. Molecular authentication of geo-authentic Scrophularia ningpoensis

    Institute of Scientific and Technical Information of China (English)

    Chuan CHEN; Li-na DUAN; Xiao-long ZHOU; Bing-long CHEN; Cheng-xin FU

    2011-01-01

    Scrophularia ningpoensis has long been used in the Chinese Materia Medica for inflammation. Like other herbal medicines, S. ningpoensis collected from different localities may considerably differ in their therapeutic efficacy,and the one grown in Zhejiang Province is recognized as geo-authentic. However, it is difficult to confirm the geographical authenticity by similar morphological characteristics. In the present study, inter-simple sequence repeat (ISSR) markers were conducted to detect S. ningpoensis from different origins. A 1259-bp fragment amplified by primer UBC874 was found only in geo-authentic ones. By cloning and sequencing that specific band, sequence characterized amplified region (SCAR) markers were designed to distinguish geo-authentic S. ningpoensis from others.This is a rapid and easy method that can be used to identify the geographical authenticity of S. ningpoensis.

  17. Anonymous authenticated communications

    Science.gov (United States)

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  18. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced...... as both a scientific and political site of interest more recently through the study of population genetics in both humans and non-humans. This article explores the ways in which genetics and notions of ‘authentic’, ‘indigenous’, and ‘endemic’ have become intertwined with everyday practices in research...

  19. QKD Quantum Channel Authentication

    OpenAIRE

    Kosloski, J. T.

    2006-01-01

    Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and c...

  20. Esotericism Ancient and Modern

    OpenAIRE

    Frazer, Michael

    2006-01-01

    Leo Strauss presents at least two distinct accounts of the idea that the authors in the political-philosophical canon have often masked their true teachings. A weaker account of esotericism, dependent on the contingent fact of persecution, is attributed to the moderns, while a stronger account, stemming from a necessary conflict between philosophy and society, is attributed to the ancients. Although most interpreters agree that Strauss here sides with the ancients, this view fails to consider...

  1. Genetic authentication of ginsengand other traditional Chinese medicine

    Institute of Scientific and Technical Information of China (English)

    CCHON; YCCHOW; FYZENG; FCCLEUNG

    2003-01-01

    The main objective of this paper is to review the chemical and genetic methods used in authentication ofginseng, especially the recent advances in microsatellite genotyping and its application to the authentication of othertraditional Chinese medicines (TCM). The standardization and modernization of TCM hinge on the authenticationof their botanical identities. Analysis of well-characterized marker compounds is now the most popular method foridentifying the herbal materials and quality control of TCM, eg, ginsenoside profiling for authentication of Panaxspecies. However, in many herbal species the chemical composition of the plant changes with the external environment and processing conditions, which lowers the reliability of these authentication methods. In the light of theadvances in molecular biotechnology in the past few decades, genetic tools are now considered to provide morestandardized and reliable methods for authentication of herbal materials at the DNA level. These genetic toolsinclude random amplified polymorphic DNA (RAPD), DNA fingerprinting using multi-loci probes, restriction fragment length polymorphism (RFLP), amplified fragment length polymorphism (AFLP), and microsatellite markertechnology. The practicality of these methods varies in terms of their sensitivity, reliability, reproducibility, andrunning cost. Using ginseng as an example, we reviewed the advantages and limitations of these molecular tech-niques in TCM authentication. We have developed a set of microsatellite markers from American ginseng that areable to differentiate Panax ginseng and Panax quinquetolius with the resolution down to farm level, ie, confirmationof its botanical identity and origin. Compared with other molecular techniques, microsatellite marker technology ismore robust, accurate, reproducible, reliable, and sensitive. This is essential for large-scale TCM authenticationcenters.

  2. Authenticity, Culture and Language Learning

    Science.gov (United States)

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  3. Study and progress of the thermoluminescence dating of the ancient pottery and porcelain

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Two standard methods,the "fine-grain technique" and the "quartz inclusion technique",and a new method,the pre-dose saturation exponential technique in thermoluminescence(TL)dating of ancient pottery and porcelain were reviewed,especially for the measurement of the paleodose and the annual dose.The two standard methods have been acknowledged in domain of TL dating and are used widely for age determination in archaeology and geology.As a dating tool the TL technique has been of great success in authentication of ancient ceramic art objects.However,a few complicated factors limit the precision and accuracy in age determination.These complicated factors are analyzed and discussed.Therefore,although ceramic TL dating can in general solve the problem of authentication of ancient ceramics,there are still complexities that require further research and study.

  4. AVNG authentication features

    International Nuclear Information System (INIS)

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  5. Message Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-01-01

    Full Text Available The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.

  6. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......, the paper explores the inherent paradox of the staging of authenticity. Rather than viewing the house solely from the perspective of the resident, the study ethnographically traces the entire process from design to occupancy in order to investigate how notions of value and authenticity are negotiated...

  7. Deep Sequencing of RNA from Ancient Maize Kernels

    OpenAIRE

    Fordyce, Sarah Louise; Avila Arcos, Maria del Carmen; Rasmussen, Morten; CAPPELLINI, Enrico; Romero-Navarro, J. Alberto; Wales, Nathan; Alquezar Planas, David Eugenio; Penfield, Steven; Brown, Terence A.; Vielle-Calzada, Jean-Philippe; Montiel, Rafael; Jørgensen, Tina; Odegaard, Nancy; Jacobs, Michael; Arriaza, Bernardo

    2013-01-01

    The characterization of biomolecules from ancient samples can shed otherwise unobtainable insights into the past. Despite the fundamental role of transcriptomal change in evolution, the potential of ancient RNA remains unexploited - perhaps due to dogma associated with the fragility of RNA. We hypothesize that seeds offer a plausible refuge for long-term RNA survival, due to the fundamental role of RNA during seed germination. Using RNA-Seq on cDNA synthesized from nucleic acid extracts, we v...

  8. High Resolution Melting (HRM) applied to wine authenticity.

    Science.gov (United States)

    Pereira, Leonor; Gomes, Sónia; Castro, Cláudia; Eiras-Dias, José Eduardo; Brazão, João; Graça, António; Fernandes, José R; Martins-Lopes, Paula

    2017-02-01

    Wine authenticity methods are in increasing demand mainly in Denomination of Origin designations. The DNA-based methodologies are a reliable means of tracking food/wine varietal composition. The main aim of this work was the study of High Resolution Melting (HRM) application as a screening method for must and wine authenticity. Three sample types (leaf, must and wine) were used to validate the three developed HRM assays (Vv1-705bp; Vv2-375bp; and Vv3-119bp). The Vv1 HRM assay was only successful when applied to leaf and must samples. The Vv2 HRM assay successfully amplified all sample types, allowing genotype discrimination based on melting temperature values. The smallest amplicon, Vv3, produced a coincident melting curve shape in all sample types (leaf and wine) with corresponding genotypes. This study presents sensitive, rapid and efficient HRM assays applied for the first time to wine samples suitable for wine authenticity purposes. PMID:27596395

  9. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  10. [Problems of food authenticity].

    Science.gov (United States)

    Czerwiecki, Ludwik

    2004-01-01

    In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry. PMID:15307611

  11. Authentic leadership: application to women leaders

    OpenAIRE

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  12. Is Authentic a thing of the Past?

    OpenAIRE

    Mac Con Iomaire, Máirtín

    2005-01-01

    This article is a review of the Oxford Symposium on Food and Cookery 2005 where the theme was Authenticity. It discusses the subject of Autheniticity in food and asks whether there is such a thing? What is Authenticity? Who can define what Authenticity means in the context of food? Is authenticity in food an indulgence of the rich which stiffles creativity and invention?

  13. Authentic leadership: application to women leaders.

    Science.gov (United States)

    Hopkins, Margaret M; O'Neil, Deborah A

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  14. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  15. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori;

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  16. Effects of Helping on State Authenticity Versus Recalled Authenticity

    OpenAIRE

    Allan, Clare M.

    2011-01-01

    This study focuses on the under-researched subject of “state authenticity”, the experience of expressing one’s true self. The 2 major hypotheses of the causes of state authenticity are tested: behavioural content versus consistency with personal traits. Investigations examine the proposal that behaviour expressing values, specifically “helping others” increases state authenticity, regardless of an individual’s own helpfulness-traits. Using a web-based survey, 238 participants were randomly as...

  17. [Psychiatry in ancient Mexico].

    Science.gov (United States)

    Calderón Narváez, G

    1992-12-01

    Using studies on prehispanic and early post-conquest documents of Ancient Mexico--such as the Badianus Manuscript, also known as Libellus de Medicinalibus Indorum Herbis, and Brother Bernardino de Sahagún's famous work History of the Things of the New Spain, a description of some existing medical and psychiatric problems, and treatments Ancient Aztecs resorted to, is presented. The structure of the Aztec family, their problems with the excessive ingestion of alcoholic beverages, and the punishments native authorities had implemented in order to check alcoholism up are also described. PMID:1341125

  18. Analysis and Authenticity Investigations of Glass and Metallic Art Objects

    International Nuclear Information System (INIS)

    A suite of glass pieces of Art, and several metal-based corroded objects were studied in the frame of this project, which intends to accommodate two purposes; a) to investigate the feasibility of physico-chemical characterization of ancient glass by employing a non-widely used analytical technique, that of luminescence spectroscopy, along with conventionally used methods such as XRF and SEM-EDX, and b) to approach issues of counterfeiting of culturally-related iron and other metallic objects, by examining the features of their corrosion products, studied via a combination of the non-destructive RF-plasma treatment and the microscopic techniques. The results of the study show that luminescence measurements own diagnostic power that can aid substantially to the classifying and understanding of the manufacturing of ancient glass, particularly when bridged with longer-established analytical methods. Moreover, evident differences between corrosion layers of authentic metallic objects and of the ones created after artificial pre-corrosion, as ascertained by the plasma treatment and by microscopy (SEM or optical) study, provide a basis for suggesting such a combination of techniques for authenticity detection of corroded metallic objects with cultural heritage importance. (author)

  19. Molecular identification of bacteria by total sequence screening: determining the cause of death in ancient human subjects.

    OpenAIRE

    Adler, Ben; Thèves, Catherine; Senescau, Alice; Vanin, Stefano; Keyser, Christine; Ricaut, François Xavier; Alekseev, Anatoly N; Dabernat, Henri; Ludes, Bertrand; Fabre, Richard; Crubézy, Eric

    2011-01-01

    Research of ancient pathogens in ancient human skeletons has been mainly carried out on the basis of one essential historical or archaeological observation, permitting specific pathogens to be targeted. Detection of ancient human pathogens without such evidence is more difficult, since the quantity and quality of ancient DNA, as well as the environmental bacteria potentially present in the sample, limit the analyses possible. Using human lung tissue and/or teeth samples from burials in easter...

  20. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  1. Research on Mixed Encryption Authentication

    Institute of Scientific and Technical Information of China (English)

    SUN Zhi-xin; WANG Ru-chuan; WANG Shao-di

    2003-01-01

    With the development of network techniques, the problem of network security is also arising as we enjoy its open convenience. There are many developed methods to overcome this problem. Identity authentication is one of these important measures. The authentication methods of traditional symmetric cryptogram systems and asymmetric cryptogram systems have both advantages and defects. This paper brings forward a Mixed Encryption Model for Authentication (MEMA), which has obvious advantages compared to the two traditional methods. MEMA model can be used widely in opening network environment such as mobile agent systems, multi-agents security safeguard systems and other situations in which identity authentication of users are needed. At last, the paper also presents the MEMA model's structure and implementation of an experimental system.

  2. The myxomycete genus Schenella: morphological and DNA sequence evidence for synonymy with the gasteromycete genus Pyrenogaster.

    Science.gov (United States)

    Estrada-Torres, Arturo; Gaither, Thomas W; Miller, Dennis L; Lado, Carlos; Keller, Harold W

    2005-01-01

    The genus Schenella has proven difficult to classify since its description as a new genus in 1911. Macbride placed it with the Myxomycetes but it was unclear with which myxomycete, if any, it should be grouped. Recent identification of abundant samples of Schenella has aided a re-evaluation of its classification as a myxomycete. Morphological evidence based on light and scanning electron microscopy of recently collected specimens and on the type specimen of Macbride suggested that it might be synonymous with the gasteromycete Pyrenogaster Analysis of DNA sequences from freshly isolated samples indicates that the genus Schenella is related closely to an anciently diverged, monophyletic group of fungi that includes several gasteromycete genera, among them Geastrum, Sphaerobolus and Pseudocolus. Comparisons of the morphology and DNA sequences of authentically identified specimens of Pyrenogaster atrogleba indicate that it is synonymous with Schenella simplex. The nomenclatural implications of this discovery are discussed. PMID:16389965

  3. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  4. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  5. Teaching Materials Should be Authentic

    Institute of Scientific and Technical Information of China (English)

    俞莹

    2008-01-01

    <正>In terms of the teaching materials,we hold the opinion that authentic materials should be adapted in the process of teaching,and students should have access to the original language. According to Richards(2001),authentic materials refer to the use in teaching of texts,photographs, video selections,and other teaching resources that were not specially prepared for pedagogical purposes.Created materials refer to textbooks and other specially developed instructional resources. The use of authentic materials in an EFL classroom is what many teachers involved in foreign language teaching have discussed in recent years.Most of the teachers throughout the world agree that authentic texts or materials are beneficial to the language learning process.Authentic materials enable learners to interact with the real language and content rather than the form.Learners feel that they are learning a target language as it is used outside the classroom.Exposing students to authentic materials can also help them better understand the target culture and envision how they might participate in this community.

  6. Adoption in ancient times

    OpenAIRE

    Bisha Eugena

    2015-01-01

    Since in ancient times, in all human cultures, children transfered from biological parents to parents that want them to create family, for political alliances, for inheritance, for a future marriage, or to care for elderly parents. The practice of adoption was fairly common in different places and periods. Adoption is mention on Bible and Quran. Greeks, Romans, Egyptians and Babylonians had adoption systems.

  7. Ancient deforestation revisited.

    Science.gov (United States)

    Hughes, J Donald

    2011-01-01

    The image of the classical Mediterranean environment of the Greeks and Romans had a formative influence on the art, literature, and historical perception of modern Europe and America. How closely does is this image congruent with the ancient environment as it in reality existed? In particular, how forested was the ancient Mediterranean world, was there deforestation, and if so, what were its effects? The consensus of historians, geographers, and other scholars from the mid-nineteenth century through the first three quarters of the twentieth century was that human activities had depleted the forests to a major extent and caused severe erosion. My research confirmed this general picture. Since then, revisionist historians have questioned these conclusions, maintaining instead that little environmental damage was done to forests and soils in ancient Greco-Roman times. In a reconsideration of the question, this paper looks at recent scientific work providing proxy evidence for the condition of forests at various times in ancient history. I look at three scientific methodologies, namely anthracology, palynology, and computer modeling. Each of these avenues of research offers support for the concept of forest change, both in abundance and species composition, and episodes of deforestation and erosion, and confirms my earlier work. PMID:20669043

  8. A Vibrant Ancient City

    Institute of Scientific and Technical Information of China (English)

    WANGTONG

    2004-01-01

    LIJIANG is a small city onthe Yunnan-Guizhou Plateau in southern Chinawith an 800-year history.Word of its ancient language and music, and unique natural scenery has spread over the decades, and Lijiang is now known throughout the world. It was added

  9. Ancient Egypt: History 380.

    Science.gov (United States)

    Turk, Laraine D.

    "Ancient Egypt," an upper-division, non-required history course covering Egypt from pre-dynastic time through the Roman domination is described. General descriptive information is presented first, including the method of grading, expectation of student success rate, long-range course objectives, procedures for revising the course, major course…

  10. Ancient Egypt: Personal Perspectives.

    Science.gov (United States)

    Wolinski, Arelene

    This teacher resource book provides information on ancient Egypt via short essays, photographs, maps, charts, and drawings. Egyptian social and religious life, including writing, art, architecture, and even the practice of mummification, is conveniently summarized for the teacher or other practitioner in a series of one to three page articles with…

  11. Creative Ventures: Ancient Civilizations.

    Science.gov (United States)

    Stark, Rebecca

    The open-ended activities in this book are designed to extend the imagination and creativity of students and encourage students to examine their feelings and values about historic eras. Civilizations addressed include ancient Egypt, Greece, Rome, Mayan, Stonehenge, and Mesopotamia. The activities focus upon the cognitive and affective pupil…

  12. Ancient ports of Kalinga

    Digital Repository Service at National Institute of Oceanography (India)

    Tripati, S.

    which plied between Kalinga and south east Asian countries. Nanda Raja, is said to have attacked Kalinga with the intention of getting access to the sea for the landlocked Kingdom of Magadha (Bihar). The ancient texa Artha Sastra (3rd-4th century B...

  13. Molecular authentication of the traditional medicinal plant Fallopia multiflora.

    Science.gov (United States)

    Zheng, Chuan-Jin; Zhao, Shu-Jin; Zhao, Zhen-Hua; Guo, Jun

    2009-06-01

    The root of Fallopia multiflora is one of the most widely used traditional Chinese medicines. However, it is often confused and substituted with the roots of F. multiflora var. ciliinervis, Pteroxygonum giraldii, Cynanchum auriculatum, and Stephania cepharantha. To establish a DNA polymorphism-based assay for the identification of F. multiflora, the nuclear ribosomal DNA (nrDNA) internal transcribed spacer (ITS) regions of six Fallopia species were sequenced and analyzed. Based on the diversity of ITS regions among the species the diagnostic primers PMITS28 and PMITS545, which amplified an expected 517-bp DNA fragment from F. multiflora DNA, were designed. No amplified product was observed when DNA from other species was used. This method can be used for the authentication of F. multiflora. PMID:19242903

  14. Hortus malabaricus and the ethnoiatrical knowledge of ancient malabar.

    Science.gov (United States)

    Manilal, K S

    1984-10-01

    Hortus Malabaricus is the oldest important printed book on Indian medicinal plants. The 1(st) of its 12 volumes was published in 1678 from Amsterdam this book, written by H.A. Van Rheede is perhaps the only authentic record of the ethnoiatrical knowledge of ancient Malabar, available to us today. Several hundred medicinal plants which were successful used by the Ayurvedic physiclans of 17(th) century are described in this, along with their medicinal powers and methods of application. The identity of many of the plants described has not yet been accurately established, which would be of considerable interest to ayurveda. PMID:22557457

  15. Authenticity in art

    International Nuclear Information System (INIS)

    After a general introductory chapter, the subject is treated under three headings: paintings, ceramics and metals. The scientific tests for authenticity are described in their application to one or more of these branches of art. The traditional method of visual stylistic judgement is compared with and supplemented by scientific methods which (as well as 'wet' chemical analysis, optical microscopy, ultraviolet, infrared, electron and X-ray microscopy, X-ray crystallography and X-ray fluorescence, and direct age determination) include the following or more direct 'nuclear' interest: neutron (or proton, deuteron and high-energy photon) activation analysis for determining impurity and trace element content, gamma radiography for bronzes, neutron autoradiography or examining paintings, radiocarbon dating, other isotope dating (e.g. with lead isotopes and the radium-lead ratio), high temperature thermoluminescence for ceramics, and mass spectroscopy to determine isotope ratios indicative of particular sources of materials. As well as the reference in each chapter there is an additional bibliography. (U.K.)

  16. Tracking down human contamination in ancient human teeth

    DEFF Research Database (Denmark)

    Sampietro, María Lourdes; Gilbert, M Thomas P; Lao, Oscar;

    2006-01-01

    DNA contamination arising from the manipulation of ancient calcified tissue samples is a poorly understood, yet fundamental, problem that affects the reliability of ancient DNA (aDNA) studies. We have typed the mitochondrial DNA hypervariable region I of the only 6 people involved in the excavation...... identified as contaminants, with those derived from the people involved in the retrieval and washing of the remains present in higher frequencies than those of the anthropologist and genetic researchers. This finding confirms, for the first time, previous hypotheses that teeth samples are most susceptible...... to contamination at their initial excavation. More worrying, the cloned contaminant sequences exhibit substitutions that can be attributed to DNA damage after the contamination event, and we demonstrate that the level of such damage increases with time: contaminants that are >10 years old have approximately 5...

  17. Efficient and secure source authentication scheme for multicast user authentication

    Institute of Scientific and Technical Information of China (English)

    JEONG; Yoon-su; LEE; Sang-hyuk; SHIN; Seung-soo

    2013-01-01

    Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.

  18. Use of neutron diffraction and laser-induced plasma spectroscopy in integrated authentication methodologies of copper alloy artefacts

    International Nuclear Information System (INIS)

    The present study approaches the general problem of the authentication of copper alloy artefacts of art and historical interest using non-invasive analytical techniques. It aims to demonstrate that a suitable combination of time-of-flight neutron diffraction and laser-induced plasma spectroscopy in integrated multidisciplinary authentication methodologies can provide crucial data for discriminating between genuine archaeological objects and modern counterfeits. After introducing the methodology, which is dedicated in particular to copper alloy figurines of ancient style, two representative authentication case studies are discussed. The results of the work provide evidence that the combination of multiphase analysis using TOF-N D and elemental depth profiles provided by Lips makes it possible to solve most of the present authentication problems.

  19. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  20. Deep sequencing of RNA from ancient maize kernels.

    Directory of Open Access Journals (Sweden)

    Sarah L Fordyce

    Full Text Available The characterization of biomolecules from ancient samples can shed otherwise unobtainable insights into the past. Despite the fundamental role of transcriptomal change in evolution, the potential of ancient RNA remains unexploited - perhaps due to dogma associated with the fragility of RNA. We hypothesize that seeds offer a plausible refuge for long-term RNA survival, due to the fundamental role of RNA during seed germination. Using RNA-Seq on cDNA synthesized from nucleic acid extracts, we validate this hypothesis through demonstration of partial transcriptomal recovery from two sources of ancient maize kernels. The results suggest that ancient seed transcriptomics may offer a powerful new tool with which to study plant domestication.

  1. Ancient human microbiomes

    Science.gov (United States)

    Warinner, Christina; Speller, Camilla; Collins, Matthew J.; Lewis, Cecil M.

    2015-01-01

    Very recently, we discovered a vast new microbial self: the human microbiome. Our native microbiota interface with our biology and culture to influence our health, behavior, and quality of life, and yet we know very little about their origin, evolution, or ecology. With the advent of industrialization, globalization, and modern sanitation, it is intuitive that we have changed our relationship with microbes, but we have little information about the ancestral state of our microbiome, and therefore, we lack a foundation for characterizing this change. High-throughput sequencing has opened up new opportunities in the field of paleomicrobiology, allowing us to investigate the evolution of the complex microbial ecologies that inhabit our bodies. By focusing on recent coprolite and dental calculus research, we explore how emerging research on ancient human microbiomes is changing the way we think about ancient disease and how archaeological studies can contribute to a medical understanding of health and nutrition today. PMID:25559298

  2. Comets in ancient India

    CERN Document Server

    Gupta, Patrick Das

    2014-01-01

    The Indo-aryans of ancient India observed stars and constellations for ascertaining auspicious times for sacrificial rites ordained by vedas. It is but natural that they would have recounted in the vedic texts about comets. In Rigveda ($\\sim $ 1700 - 1500 BC) and Atharvaveda ($\\sim $ 1150 BC), there are references to dhumaketus and ketus, which stand for comets in Sanskrit. Varahamihira in 550 AD and Ballala Sena ($\\sim $ 1100 - 1200 AD) have described a large number of comets recorded by ancient seers such as Parashara, Vriddha Garga, Narada, Garga, etc. In this article, I conjecture that an episode narrated in Mahabharata of a radiant king, Nahusha, ruling the heavens, and later turning into a serpent after he had kicked the seer Agastya (also the star Canopus), is a mythological retelling of a cometary event.

  3. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  4. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy k-means classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based ...

  5. Designing Pu600 for Authentication

    International Nuclear Information System (INIS)

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work

  6. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    The combination of user-names and passwords has become the predominant method of user authentication in computer systems. Most users have multiple accounts on different systems, which impose different constraints on the length and complexity of passwords that the user is allowed to select....... This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication......, which accepts the most common typing mistakes. The proposed algorithm has been implemented in secure hardware and integrated into a standard Unix system. We present the design, implementation and preliminary evaluation of the developed passphrase authentication prototype....

  7. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users in the...... environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...

  8. Introduction to Methods Demonstrations for Authentication

    International Nuclear Information System (INIS)

    During the Trilateral Initiative Technical Workshop on Authentication and Certification, PNNL will demonstrate some authentication technologies. This paper briefly describes the motivation for these demonstrations and provide background on them

  9. Suicide in ancient Greece.

    Science.gov (United States)

    Laios, K; Tsoukalas, G; Kontaxaki, M-I; Karamanou, M; Androutsos, G

    2014-01-01

    The theme of suicide appears several times in ancient Greek literature. However, each such reference acquires special significance depending on the field from which it originates. Most of the information found in mythology, but the suicide in a mythological tale, although in terms of motivation and mental situation of heroes may be in imitation of similar incidents of real life, in fact is linked with the principles of the ancient Greek religion. In ancient drama and mainly in tragedies suicide conduces to the tragic hypostasis of the heroes and to the evolution of the plot and also is a tool in order to be presented the ideas of poets for the relations of the gods, the relation among gods and men and the relation among the men. In ancient Greek philosophy there were the deniers of suicide, who were more concerned about the impact of suicide on society and also these who accepted it, recognizing the right of the individual to put an end to his life, in order to avoid personal misfortunes. Real suicides will be found mostly from historical sources, but most of them concern leading figures of the ancient world. Closer to the problem of suicide in the everyday life of antiquity are ancient Greek medicines, who studied the phenomenon more general without references to specific incidents. Doctors did not approve in principal the suicide and dealt with it as insane behavior in the development of the mental diseases, of melancholia and mania. They considered that the discrepancy of humors in the organ of logic in the human body will cause malfunction, which will lead to the absurdity and consequently to suicide, either due to excessive concentration of black bile in melancholia or due to yellow bile in mania. They believed that greater risk to commit suicide had women, young people and the elderly. As therapy they used the drugs of their time with the intention to induce calm and repression in the ill person, therefore they mainly used mandragora. In general, we would say

  10. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  11. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  12. 28 CFR 68.46 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed...

  13. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  14. 29 CFR 18.50 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as...

  15. Whole-genome shotgun sequencing of mitochondria from ancient hair shafts

    DEFF Research Database (Denmark)

    Gilbert, M Thomas P; Tomsho, Lynn P; Rendulic, Snjezana;

    2007-01-01

    Although the application of sequencing-by-synthesis techniques to DNA extracted from bones has revolutionized the study of ancient DNA, it has been plagued by large fractions of contaminating environmental DNA. The genetic analyses of hair shafts could be a solution: We present 10 previously unex...

  16. Dance in Ancient Greek Culture

    OpenAIRE

    Spalva, Rita

    2015-01-01

    The greatness and harmony of ancient Greece has had an impact upon the development of the Western European culture to this day. The ancient Greek culture has influenced contemporary literature genres and systems of philosophy, principles of architecture, sculpture and drama and has formed basis for such sciences as astronomy and mathematics. The art of ancient Greece with its penchant for beauty and clarity has been the example of the humanity’s search for an aesthetic ideal. Despite only bei...

  17. Authentication of Herbal Supplements Using Next-Generation Sequencing

    Science.gov (United States)

    Braukmann, Thomas W. A.; Borisenko, Alex V.; Zakharov, Evgeny V.

    2016-01-01

    Background DNA-based testing has been gaining acceptance as a tool for authentication of a wide range of food products; however, its applicability for testing of herbal supplements remains contentious. Methods We utilized Sanger and Next-Generation Sequencing (NGS) for taxonomic authentication of fifteen herbal supplements representing three different producers from five medicinal plants: Echinacea purpurea, Valeriana officinalis, Ginkgo biloba, Hypericum perforatum and Trigonella foenum-graecum. Experimental design included three modifications of DNA extraction, two lysate dilutions, Internal Amplification Control, and multiple negative controls to exclude background contamination. Ginkgo supplements were also analyzed using HPLC-MS for the presence of active medicinal components. Results All supplements yielded DNA from multiple species, rendering Sanger sequencing results for rbcL and ITS2 regions either uninterpretable or non-reproducible between the experimental replicates. Overall, DNA from the manufacturer-listed medicinal plants was successfully detected in seven out of eight dry herb form supplements; however, low or poor DNA recovery due to degradation was observed in most plant extracts (none detected by Sanger; three out of seven–by NGS). NGS also revealed a diverse community of fungi, known to be associated with live plant material and/or the fermentation process used in the production of plant extracts. HPLC-MS testing demonstrated that Ginkgo supplements with degraded DNA contained ten key medicinal components. Conclusion Quality control of herbal supplements should utilize a synergetic approach targeting both DNA and bioactive components, especially for standardized extracts with degraded DNA. The NGS workflow developed in this study enables reliable detection of plant and fungal DNA and can be utilized by manufacturers for quality assurance of raw plant materials, contamination control during the production process, and the final product

  18. Authentication of Herbal Supplements Using Next-Generation Sequencing.

    Directory of Open Access Journals (Sweden)

    Natalia V Ivanova

    Full Text Available DNA-based testing has been gaining acceptance as a tool for authentication of a wide range of food products; however, its applicability for testing of herbal supplements remains contentious.We utilized Sanger and Next-Generation Sequencing (NGS for taxonomic authentication of fifteen herbal supplements representing three different producers from five medicinal plants: Echinacea purpurea, Valeriana officinalis, Ginkgo biloba, Hypericum perforatum and Trigonella foenum-graecum. Experimental design included three modifications of DNA extraction, two lysate dilutions, Internal Amplification Control, and multiple negative controls to exclude background contamination. Ginkgo supplements were also analyzed using HPLC-MS for the presence of active medicinal components.All supplements yielded DNA from multiple species, rendering Sanger sequencing results for rbcL and ITS2 regions either uninterpretable or non-reproducible between the experimental replicates. Overall, DNA from the manufacturer-listed medicinal plants was successfully detected in seven out of eight dry herb form supplements; however, low or poor DNA recovery due to degradation was observed in most plant extracts (none detected by Sanger; three out of seven-by NGS. NGS also revealed a diverse community of fungi, known to be associated with live plant material and/or the fermentation process used in the production of plant extracts. HPLC-MS testing demonstrated that Ginkgo supplements with degraded DNA contained ten key medicinal components.Quality control of herbal supplements should utilize a synergetic approach targeting both DNA and bioactive components, especially for standardized extracts with degraded DNA. The NGS workflow developed in this study enables reliable detection of plant and fungal DNA and can be utilized by manufacturers for quality assurance of raw plant materials, contamination control during the production process, and the final product. Interpretation of results should

  19. Molecular confirmation of Schistosoma and family relationship in two ancient Egyptian mummies

    OpenAIRE

    Matheson, C. D.; David, R; Spigelman, M.; Donoghue, H. D.

    2014-01-01

    Egg morphology and immunocytochemistry have identified schistosomiasis in ancient Egypt. Our study aimedbto detect and characterize schistosomal DNA in mummified human tissue. Liver samples from the mummy Nekht-Ankh (c. 3900 BP) and intestinal samples from Khnum-Nakht, possibly his brother, were analyzed using PCR primers suitable for fragmented ancient DNA, specific for either Schistosoma mansoni or Schistosoma haematobium. Mitochondrial primers examined any relationship between the supposed...

  20. Gnomons in Ancient China

    Science.gov (United States)

    Li, Geng

    Gnomon shadow measurement was one of the most fundamental astronomical observations in ancient China. It was crucial for calendar making, which constituted an important aspect of imperial governance. A painted stick discovered from a prehistoric (2300 BC) astronomical site of Taosi (see Chap. 201, "Taosi Observatory", 10.1007/978-1-4614-6141-8_215") is the oldest gnomon known of China. From second century BC onward, gnomon shadow measurements have been essential part of calendrical practice. Various historical measurements are discussed in this chapter.

  1. Climate and Ancient Societies

    DEFF Research Database (Denmark)

    Climate, and human responses to it, have a strongly interconnected relationship. This when climate change occurs, the result of either natural or human causes, societies should react and adapt to these. But do they? If so, what is the nature of that change, and are the responses positive...... or negative for the long-term survival of social groups? In this volume, scholars from diverse disciplines including archaeology, geology and climate sciences explore scientific and material evidence for climate changes in the past, their causes, their effects on ancient societies and how those societies...

  2. Mathematics in ancient Greece

    CERN Document Server

    Dantzig, Tobias

    2006-01-01

    More than a history of mathematics, this lively book traces mathematical ideas and processes to their sources, stressing the methods used by the masters of the ancient world. Author Tobias Dantzig portrays the human story behind mathematics, showing how flashes of insight in the minds of certain gifted individuals helped mathematics take enormous forward strides. Dantzig demonstrates how the Greeks organized their precursors' melange of geometric maxims into an elegantly abstract deductive system. He also explains the ways in which some of the famous mathematical brainteasers of antiquity led

  3. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul;

    2013-01-01

    cipher is a strong PRP. We then extend COPE to create COPA, the first parallelizable, online authenticated cipher with nonce-misuse resistance. COPA only requires two extra block cipher calls to provide integrity. The privacy and integrity of the scheme is proven secure assuming the underlying block...

  4. Authentic Instruction and Technology Literacy

    Science.gov (United States)

    Cydis, Susan

    2015-01-01

    Technology integration is an important aspect of student competence in the 21st century. The use of technology in teaching and learning is a valuable practice for supporting student learning and engagement. Modelling the pedagogical practices that integrate authentic, performance-based opportunities for technology integration was the focus of a…

  5. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  6. Authenticity in a Digital Environment.

    Science.gov (United States)

    Cullen, Charles T.; Hirtle, Peter B.; Levy, David; Lynch, Clifford A.; Rothenberg, Jeff

    On January 24, 2000, the Council on Library and Information Resources (CLIR) convened a group of experts from different domains of the information resources community to address the question, "What is an authentic digital object?" Five writers--an archivist, a digital library expert, a documentary editor and special collections librarian, an…

  7. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement. PMID:25150413

  8. Authenticity and Lesbian Health Educators

    Science.gov (United States)

    Weiler-Timmins, Rebecca A.

    2011-01-01

    This qualitative study used narrative inquiry to explore how lesbian health educators navigate authenticity in a heteronormative higher education setting. The study was grounded in a lesbian standpoint pedagogical viewpoint, which provided a lens with which to view the nine participants' experiences. Of particular interest was how the educators in…

  9. Authenticity or School-only?

    DEFF Research Database (Denmark)

    Fougt, Simon Skov

    Challenging the apparent distinction among educational researchers between ‘authenticity’ outside schools and ‘school-only’ inside schools, this paper investigates the concept of meaningfulness from different perspectives with a focus on formal learning in schools, as it states that teaching...... and learning inside school also can be authentic....

  10. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  11. Laser surface authentication for containment and surveillance

    International Nuclear Information System (INIS)

    Full text: Containment and Surveillance (C and S) techniques are extensively used for Agency safeguards activities because they are flexible and cost effective. The two main C and S categories have been optical surveillance and sealing systems. A revolutionary new technology invented by physicists at Imperial College, London and the University of Durham may now provide a new tool for both laser item identification and sealing systems authentication. The method uses surface intrinsic features applicable to UF-6 containers and safeguards seals. The Laser Surface Authentication (LSA) technology, invented by Prof. Russell Cowburn, Professor of Physics, and his team in the Nanotechnology Laboratories of Imperial College, London, recognizes the inherent 'fingerprint' within all material surfaces such as paper, plastic, metals and ceramics. In the laser item identification application, this fingerprint identification will uniquely identify a container at a distance (perhaps 50 cm). In the sealing systems authentication application, the identification takes place nearly on contact (1 cm). In either case, the unique fingerprint is formed by the differentiation of microscopic surface imperfections in the container or the seal. Once the unique signature of the container or the seal is extracted by the LSA method, the signature can be subsequently used to authenticate the container or the seal as genuine and quickly identify counterfeit items. In addition, since every surface on every item is microscopically different, the distribution of 'like' container or seal signatures is expected to be well separated from the distribution of 'unlike' container or seal signatures. The separation of these two distributions on some materials is such that estimated false positives are less than one in 10 to the power 100+ using fitted distributions, exceeding the forensic identification and discrimination performance of DNA. The laser item identification system (LIIS) application satisfies a

  12. Molecular genetic analysis of Dongzhou-period ancient human of Helingeer in Inner Mongolia, China

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The mtDNA hypervariable region I (HVR-I) of 10 ancient individuals from Dongzhou-period ancient human populations in Helingeer county of Inner Mongolia were amplified and sequenced to investigate the genetic structure. The relationships between the ancient population and related extant populations, as well as its possible origin at the molecular level, were also studied. Moreover, phylogenetic analysis and multi-dimensional scaling analysis were also performed based on the mtDNA data of the ancient population in Helingeer and the related Eurasian population. The results showed that the ancient population in Helingeer were closer to the northern Asian populations than to the other compared populations in matrilineal lineage. Combining the research results of archaeology and anthropology as well as molecular biology, we inferred that they were nomads who migrated from Mongolia plateau and cis-Baikal region to Helingeer in Inner Mongolia, China.

  13. Exploring Ancient Skies A Survey of Ancient and Cultural Astronomy

    CERN Document Server

    Kelley, David H

    2011-01-01

    Exploring Ancient Skies brings together the methods of archaeology and the insights of modern astronomy to explore the science of astronomy as it was practiced in various cultures prior to the invention of the telescope. The book reviews an enormous and growing body of literature on the cultures of the ancient Mediterranean, the Far East, and the New World (particularly Mesoamerica), putting the ancient astronomical materials into their archaeological and cultural contexts. The authors begin with an overview of the field and proceed to essential aspects of naked-eye astronomy, followed by an examination of specific cultures. The book concludes by taking into account the purposes of ancient astronomy: astrology, navigation, calendar regulation, and (not least) the understanding of our place and role in the universe. Skies are recreated to display critical events as they would have appeared to ancient observers—events such as the supernova of 1054 A.D., the "lion horoscope," and the Star of Bethlehem. Explori...

  14. Ancient celtic horns

    Science.gov (United States)

    Campbell, Murray

    2002-11-01

    There is considerable evidence from iconographic and documentary sources that musical lip-reed instruments were important in the early celtic communities of Scotland and Ireland. In recent years several studies have been undertaken with the aim of gaining a better understanding of the musical nature of these ancient horns, and of their place in the life and culture of the time. A valuable source of tangible evidence is to be found in the archaeological remains deposited across Scotland and the whole of Ireland. A project is now under way, under the auspices of the Kilmartin House Trust and the general direction of John Purser, which has brought together an international team of musicians, craftsmen, archaeologists, musicologists and physicists with the aim of analyzing ancient musical artifacts, reconstructing some of the original instruments, and analyzing the sounds they produce. This paper describes acoustical studies carried out on a number of recent reconstructions of wooden and bronze instruments, and discusses the role of acoustics in this type of investigation. [Work supported by Sciart and EPSRC.

  15. Bioinformatical approaches to RNA structure prediction & Sequencing of an ancient human genome

    DEFF Research Database (Denmark)

    Lindgreen, Stinus

    in the publication of the first genome of an ancient human individual, where close to the theoretical maximum of the genome sequence was recovered with high confidence. Part of the project was the development of the program SNPest for genotyping and SNP calling that models various sources of error...... prediction tools that exist. The second part has been focused on the mapping and genotyping of ancient genomic DNA. The development of next generation sequencing technologies combined with the use of ancient DNA material present the researchers with some special challenges in the analyses. This work resulted...

  16. BIOMETRICS BASED USER AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tanuj Tiwari

    2015-10-01

    Full Text Available Biometrics is automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometrics technologies are base for a plethora of highly secure identification and personal verification solutions. It is measurement of biological characteristics – either physiological or behavioral – that verify the claimed identity of an individual. Physiological biometrics include fingerprints, iris recognition. voice verification, retina recognition, palm vein patterns, finger vein patterns, hand geometry and DNA But there arises a need for more robust systems in order to tackle the increasing incidents of security breaches and frauds. So there is always a need for fool proof technology that can provide security and safety to individuals and the transactions that the individuals make. Biometrics is increasingly used by organizations to verify identities, but coupled with quantum cryptography it offers a new range of security benefits with quantum cryptography where we form a key when we need it and then destroy it. In this paper, we give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns.

  17. Halal authenticity of gelatin using species-specific PCR.

    Science.gov (United States)

    Shabani, Hessam; Mehdizadeh, Mehrangiz; Mousavi, Seyed Mohammad; Dezfouli, Ehsan Ansari; Solgi, Tara; Khodaverdi, Mahdi; Rabiei, Maryam; Rastegar, Hossein; Alebouyeh, Mahmoud

    2015-10-01

    Consumption of food products derived from porcine sources is strictly prohibited in Islam. Gelatin, mostly derived from bovine and porcine sources, has many applications in the food and pharmaceutical industries. To ensure that food products comply with halal regulations, development of valid and reliable analytical methods is very much required. In this study, a species-specific polymerase chain reaction (PCR) assay using conserved regions of mitochondrial DNA (cytochrome b gene) was performed to evaluate the halal authenticity of gelatin. After isolation of DNA from gelatin powders with known origin, conventional PCR using species-specific primers was carried out on the extracted DNA. The amplified expected PCR products of 212 and 271 bp were observed for porcine and bovine gelatin, respectively. The sensitivity of the method was tested on binary gelatin mixtures containing 0.1%, 1%, 10%, and 100% (w/w) of porcine gelatin within bovine gelatin and vice versa. Although most of the DNA is degraded due to the severe processing steps of gelatin production, the minimum level of 0.1% w/w of both porcine and bovine gelatin was detected. Moreover, eight food products labeled as containing bovine gelatin and eight capsule shells were subjected to PCR examination. The results showed that all samples contained bovine gelatin, and the absence of porcine gelatin was verified. This method of species authenticity is very useful to verify whether gelatin and gelatin-containing food products are derived from halal ingredients. PMID:25872445

  18. Genome-wide patterns of selection in 230 ancient Eurasians

    Science.gov (United States)

    Mathieson, Iain; Lazaridis, Iosif; Rohland, Nadin; Mallick, Swapan; Patterson, Nick; Roodenberg, Songül Alpaslan; Harney, Eadaoin; Stewardson, Kristin; Fernandes, Daniel; Novak, Mario; Sirak, Kendra; Gamba, Cristina; Jones, Eppie R.; Llamas, Bastien; Dryomov, Stanislav; Pickrel, Joseph; Arsuaga, Juan Luís; de Castro, José María Bermúdez; Carbonell, Eudald; Gerritsen, Fokke; Khokhlov, Aleksandr; Kuznetsov, Pavel; Lozano, Marina; Meller, Harald; Mochalov, Oleg; Moiseyev, Vayacheslav; Rojo Guerra, Manuel A.; Roodenberg, Jacob; Vergès, Josep Maria; Krause, Johannes; Cooper, Alan; Alt, Kurt W.; Brown, Dorcas; Anthony, David; Lalueza-Fox, Carles; Haak, Wolfgang; Pinhasi, Ron; Reich, David

    2016-01-01

    Ancient DNA makes it possible to directly witness natural selection by analyzing samples from populations before, during and after adaptation events. Here we report the first scan for selection using ancient DNA, capitalizing on the largest genome-wide dataset yet assembled: 230 West Eurasians dating to between 6500 and 1000 BCE, including 163 with newly reported data. The new samples include the first genome-wide data from the Anatolian Neolithic culture whose genetic material we extracted from the DNA-rich petrous bone and who we show were members of the population that was the source of Europe’s first farmers. We also report a complete transect of the steppe region in Samara between 5500 and 1200 BCE that allows us to recognize admixture from at least two external sources into steppe populations during this period. We detect selection at loci associated with diet, pigmentation and immunity, and two independent episodes of selection on height. PMID:26595274

  19. Ancient Chinese Sundials

    Science.gov (United States)

    Deng, Kehui

    Timekeeping was essential in the agricultural society of ancient China. The use of sundials for timekeeping was associated with the use of the gnomon, which had its origin in remote antiquity. This chapter studies three sundials (guiyi 晷仪) from the Qin and Han dynasties, the shorter shadow plane sundial (duanying ping yi 短影平仪) invented by Yuan Chong in the Sui Dynasty, and the sundial chart (guiyingtu 晷影图) invented by Zeng Minxing in the Southern Song dynasty. This chapter also introduces Guo Shoujing's hemispherical sundial (yang yi 仰仪). A circular stone sundial discovered at the Small Wild Goose Pagoda in Xi'an is also mentioned. It is dated from the Sui and Tang dynasties. A brief survey of sundials from the Qing dynasty shows various types of sundials.

  20. Characterization of Ancient Tripitaka

    Science.gov (United States)

    Gong, Y. X.; Geng, L.; Gong, D. C.

    2015-08-01

    Tripitaka is the world's most comprehensive version of Buddhist sutra. There are limited numbers of Tripitaka currently preserved, most of them present various patterns of degradation. As little is known about the materials and crafts used in Tripitaka, it appeared necessary to identify them, and to further define adapted conservation treatment. In this work, a study concerning the paper source and dyestuff of the Tripitaka from approximate 16th century was carried out using fiber analysis and thin-layer chromatography (TLC). The results proved that the papers were mainly made from hemp or bark of mulberry tree, and indigo was used for colorizing the paper. At the end, we provide with suggestions for protecting and restoring the ancient Tripitaka.

  1. ANALYTICAL AUTHENTICATION OF ORGANIC FOODS

    OpenAIRE

    Simeone, F.C.; Ruth, Saskia

    2014-01-01

    A growing consumers’ awareness of human health’s risks, environmental fragility, and animal welfare has boosted organic production of foods. Due to their high production costs, however, organic products tend to retail at a higher prices than their non-organic counterparts. This premium price exposes organic products to fraud and counterfeiting, which, in addition to administrative controls, call for confirmatory assessments of the organic identity. Authentication of organic products is a comp...

  2. Authentic leadership in school organizations

    OpenAIRE

    Bento, António; Ribeiro, Maria Isabel

    2013-01-01

    This research study, descriptive and exploratory in nature, had as objectives to know the perceptions of the teacher/students of a graduation course in Educational Sciences about their leaders, measured and evaluated through the Authentic Leadership Questionnaire (ALQ) and to verify if existed differences between the public and private school organizations in the four characteristics defined for the ALQ: a) self-conscious; b) transparency; c) moral/ethics; d) balanced processing. A non-proba...

  3. Graphical Passwords Authentication: A Survey

    OpenAIRE

    Nikhil Tarkeshwar Ambade; Prof. Dr. Arati Dixit

    2015-01-01

    In typically text-based passwords, well known users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. Reusing same or easy passwords across different accounts help to memorability, but decrease in security. Text passwords are the most popular user authentication method, but have security and usability problems. Alternatives such as biometric systems and tokens have their own drawbacks Graphical pass...

  4. Food authentication by molecular methods

    OpenAIRE

    de Oliveira, B.; Mafra, I; Costa, J; Amaral, J S; Faria, M.; Fernandes, T.; Soares, S.

    2011-01-01

    Quality and authenticity evaluation of foods encompasses many issues, such as the entire or partial fraudulent substitution of higher commercial value constituents by others with lower value and the presence of undeclared constituents/ingredients. To protect consumers from misleading labeling, regulations issued across the world have implemented specific guidelines and listed particular foods that sh ould be declared on the label. Particularly in the case of genetically modi...

  5. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity......’. When ‘an authentic body’ is sought by participants or demanded by judges and ‘experts’ on popular makeover and casting TV shows such as The Swan (Fox 2004) or Germany’s Next Topmodel (Pro 7 2006-present) this refers to the physical visualisation of what is perceived/presented as the participants ‘inner...... self’. I scrutinise the staging techniques and the codes of appearance that bodies have to comply with in order to be deemed ‘authentic’ on the shows. To define them and place them in the history of the idea of ‘bodily authenticity’, I complement my study with an outline of how ‘authenticity...

  6. An Examination of Career Indecision and Application to Dispositional Authenticity

    Science.gov (United States)

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  7. Rapid evolution of sessility in an endemic species flock of the freshwater bivalve Corbicula from ancient lakes on Sulawesi, Indonesia

    OpenAIRE

    von Rintelen, Thomas; Glaubrecht, Matthias

    2005-01-01

    The fauna of ancient lakes frequently contains taxa with highly derived morphologies that resulted from in situ radiation of lacustrine lineages with high antiquity. We employed a molecular mtDNA phylogeny to investigate this claim for corbiculid freshwater bivalves in two ancient lake systems on the Indonesian island Sulawesi. Among the otherwise mobile corbiculid species flock, only one taxon, Posostrea anomioides, in the ancient Lake Poso exhibits a unique habit, i.e. cementing one valve t...

  8. Deciphering Equine Evolution and Spatial Ancestry with Ancient Data

    DEFF Research Database (Denmark)

    Jónsson, Hákon

    genetic anity to ancient individuals, which often represents the key question in human paleogenomic projects. We applied the computational infrastructure developed to complete the genomic characterization of extant members of the genus Equus, which is composed of horses, asses and zebras. We sequenced the......-flow between lineages despite considerable heterogeneity in chromosomal organization. Finally, we explored the genetic footprint of horse domestication and reconstructed the population context in which domestication took place, by sequencing complete genomes of ancient horses significantly predating......High-throughput sequencing has opened ancient DNA research to genomics, revolutionizing the amount of genetic information retrievable from archaeological and paleontological remains. Paleogenomics is still in infancy and requires substantial improvements in computational methods tailored to the...

  9. An Authentication Framework for Nomadic Users

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    . This is probably best explained by considering password based authentication, where a user is actively involved in the process. If the time required to log in to an account is considered too high, users tend to leave their terminals logged in throughout the day and share their account with other users...... defeating the obstacle by leaving terminals logged in or choosing short and easy to type passwords. Therefore, a password based authentication mechanism, which is quite simple and secure in personal computing, has become too cumbersome for nomadic users, which means that other means of authentication must...... be developed for nomadic users. In this paper, we focus on usability of authentication for nomadic users in a ubiquitous computing environment. We identify requirements for authentication of nomadic users and propose an authentication framework for this class of users. A prototype of the proposed...

  10. staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2015-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  11. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  12. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity.

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    Gulikers, J. T. M., Bastiaens, Th. J., Kirschner, P. A., & Kester, L. (2008). Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity. Journal of Vocational Education and Training, 60(4)

  13. Astronomy in the Ancient Caucasus

    Science.gov (United States)

    Simonia, Irakli; Jijelava, Badri

    This chapter discusses the role of recurrent heavenly phenomena in the formation of ancient cultural traditions. Artifacts bearing witness to astronomical and calendrical practices in the ancient Caucasus are described and we analyze the significance of the "boats of the sun" petroglyphs at Gobustan in Azerbaijan, the solar station at Abuli in Georgia, and the "sky dial" at Carahunge in Armenia. Similarities and differences between the ancient cultures of the region are discussed. Finally, we present the results of the latest field research and new facts and hypotheses.

  14. The Ancient Egyptian Demonology Project

    OpenAIRE

    Weber, Felicitas

    2016-01-01

    “The Ancient Egyptian Demonology Project: Second Millennium BCE” was intended and funded as a three-year project (2013-2016) to explore the world of Ancient Egyptian demons in the 2nd millennium BC. It intends to create a classification and ontology of benevolent and malevolent demons. Whereas ancient Egyptians did not use a specific term denoting “demons”, liminal beings known from various other cultures such as δαίμονες, ghosts, angels, Mischwesen, genies, etc., were nevertheless described ...

  15. Did the ancient Egyptians migrate to ancient Nigeria?

    OpenAIRE

    Jock M. Agai

    2014-01-01

    Literatures concerning the history of West African peoples published from 1900 to 1970 debate�the possible migrations of the Egyptians into West Africa. Writers like Samuel Johnson and�Lucas Olumide believe that the ancient Egyptians penetrated through ancient Nigeria but Leo�Frobenius and Geoffrey Parrinder frowned at this opinion. Using the works of these early�20th century writers of West African history together with a Yoruba legend which teaches�about the origin of their earliest ancesto...

  16. Obfuscated authentication systems, devices, and methods

    Science.gov (United States)

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  17. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  18. Heidegger's Concept of Authenticity and Sport Experience

    OpenAIRE

    HIGUCHI Satoshi

    1991-01-01

    Carolyne Thomas regarded the aesthetic experience in sport as authentic in the meaning from Martin Heidegger's Being and Time. To examine the adequacy of the interpretation, the comparison between Thomas' concept of authenticity and the Heidegger's was attempted in this paper. Thomas' concept of authenticity is opposite to accidentality. It is also positive realization of a self, positive movement toward a capable being, a unique self, a unique experience, and honesty in a sport situation...

  19. Heidegger's Concept of Authenticity and Sport Experience

    OpenAIRE

    HIGUCHI Satoshi

    1991-01-01

    Carolyne Thomas regarded the aesthetic experience in sport as authentic in the meaning from Martin Heidegger's Being and Time. To examine the adequacy of the interpretation, the comparison between Thomas' concept of authenticity and the Heidegger's was attempted in this paper.Thomas' concept of authenticity is opposite to accidentality. It is also positive realization of a self, positive movement toward a capable being, a unique self, a unique experience, and honesty in a sport situation. Aut...

  20. Negotiating authenticity in consuming the hyperreal

    OpenAIRE

    Kuronen, Noora

    2013-01-01

    OBJECTIVES OF THE STUDY: This study seeks to further our understanding of how authenticity is negotiated and produced in online discourses; what forms of negotiating authenticity can be identified. The idea is not to produce absolute answers, but to extent our understanding of the concept of authenticity in the culture increasingly based on simulation. METHODOLOGY/APPROACH: The research approach used in this study is Consumer Culture Theory (CCT). CCT studies consumption choices a...

  1. Laying Claim to Authenticity: Five Anthropological Dilemmas

    OpenAIRE

    THEODOSSOPOULOS, Dimitrios

    2013-01-01

    The introduction to this special collection examines five dilemmas about the use of the concept of authenticity in anthropological analysis. These relate to 1) the expectation of a singular authenticity “deep” in oneself or beyond the surface of social reality, 2) the contradictions emerging from the opposition of authenticity with inauthenticity, 3) the irony of the notion of invention of tradition (which deconstructs, but also offends), 4) the criteria involved in the auth...

  2. The Duality of Authenticity in ELT

    OpenAIRE

    Joy, J. John Love

    2011-01-01

    Purpose: This study aims to find out the dual-perspectives on authenticity in English language teaching.Problem: The concept of authenticity has generated quite a ripple in ESL/EFL classrooms. Contrasting perspectives have emerged over the years in reaction to this concept. Some regard authenticity as an inevitable part of teaching as it provides students with opportunities to interact with reality in the classroom itself, whereas, some others consider it an ambitious construct and suggest ap...

  3. Authentic leadership: What's in the construct?

    OpenAIRE

    Endrissat, Nada; Müller, Werner R.

    2006-01-01

    In a qualitative leadership study conducted in the German-speaking part of Switzerland the quest to be oneself i.e., to be authentic was found to be central for leadership. We will present the results in detail and highlight the difficulties leaders experience when trying to be authentic in their daily interaction. By providing a contextually rich description of authentic leadership from practitioners' point of views, our study contributes to the current endeavor to understand and define auth...

  4. Quantum Secure Direct Communication Based on Authentication

    International Nuclear Information System (INIS)

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken. (general)

  5. The Ideal Self and State Authenticity

    OpenAIRE

    Power, Katherine Emilia

    2011-01-01

    The current study investigated the effect of priming people with alignment or distance to ideal self attributes on their feelings of authenticity. The effect of priming participants with self-irrelevant alignment or distance to ideal attributes was also explored, to test whether these manipulations might respectively increase or lower state authenticity, or whether state authenticity would only be affected by self-relevant priming. As expected, discrepant conditions were associated with lower...

  6. Quantum Secure Direct Communication Based on Authentication

    Institute of Scientific and Technical Information of China (English)

    WANG Min-Jie; PAN Wei

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken.

  7. Authenticated tree parity machine key exchange

    OpenAIRE

    Volkmer, Markus; Schaumburg, André

    2004-01-01

    The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys. Adding an authentication via hashing e.g. is straightforward but with no relation to Neural Cryptography. We consequently formulate an authenticated key exchange within this concept. Another alternative, integrating a Zero-Knowledge protocol in...

  8. Food Authenticity, Technology and Consumer Acceptance

    OpenAIRE

    Hobbs, Jill E.; McDonald, Jillian; Zhang, Jing

    2012-01-01

    Traceability and authenticity issues have gained increasing prominence in food markets and create both opportunities and challenges for the food industry in providing credible information to consumers. Internal molecular tagging is an emerging technology with the potential to deliver traceability and authenticity assurances. A key question for the food industry in adopting new technologies is consumer acceptance. This paper explores consumer attitudes toward traceability and authenticity and ...

  9. The application of biotechnological methods in authenticity testing.

    Science.gov (United States)

    Popping, Bert

    2002-09-11

    By counterfeiting brand names in the food and drink industry as well as fraudulently labelling and selling low quality products as premium products, this sector of the industry has lost significant amounts of money and the consumer has been deceived. While it was difficult to establish certain types of fraud before the advent of modern biotechnology, DNA-based methods make an important contribution to protect high-quality brand names and protect the consumer. Several years ago, DNA technologies were considered as methods used in universities, primarily for research purpose, not so much for 'real-life' applications. However, this has changed and a number of laboratories have specialised in offering such services to the industry. This article will review DNA-based techniques commonly used for authenticity testing. PMID:12126809

  10. [Ancient Egyptian Odontology].

    Science.gov (United States)

    Berghult, B

    1999-01-01

    In ancient Egypt during the reign of Pharaoh Djoser, circa 2650 BC, the Step Pyramid was constructed by Imhotep. He was later worshiped as the God of Medicine. One of his contemporaries was the powerful writer Hesy who is reproduced on a panel showing a rebus of a swallow, a tusk and an arrow. He is therefore looked upon as being the first depicted odontologist. The art of writing begun in Egypt in about 3100 BC and the medical texts we know from different papyri were copied with hieratic signs around 1900-1100 BC. One of the most famous is the Papyrus Ebers. It was purchased by professor Ebers on a research travel to Luxor in 1873. Two years later a beautiful facsimile in color was published and the best translation came in 1958 in German. The text includes 870 remedies and some of them are related to teeth and oral troubles like pain in the mouth, gingivitis, periodontitis and cavities in the teeth. The most common oral pain was probably pulpitis caused by extreme attrition due to the high consumption of bread contaminated with soil and/or quern minerals. Another text is the Papyrus Edwin Smith with four surgical cases of dental interest. The "toothworms" that were presumed to bring about decayed teeth have not been identified in the medical texts. It was not until 1889 W.D. Miller presented a scientific explanation that cavities were caused by bacteria. In spite of extensive research only a few evidence of prosthetic and invasive treatments have been found and these dental artifacts have probably been made post mortem. Some of the 150 identified doctors were associated with treatments of disorders of the mouth. The stele of Seneb from Sa'is during the 26th dynasty of Psamtik, 664-525 BC, shows a young man who probably was a dental healer well known to Pharaoh and his court. Clement of Alexandria mentions circa 200 AD that the written knowledge of the old Egyptians was gathered in 42 collections of papyri. Number 37-42 contained the medical writings. The

  11. Perspectives for DNA studies on polar ice cores

    DEFF Research Database (Denmark)

    Hansen, Anders J.; Willerslev, E.

    2002-01-01

    Recently amplifiable ancient DNA was obtained from a Greenland ice core. The DNA revealed a diversity of fungi, plants, algae and protists and has thereby expanded the range of detectable organic material in fossil glacier ice. The results suggest that ancient DNA can be obtained from other ice...... cores as well. Here, we present some future perspectives for DNA studies on polar ice cores in regard to molecular ecology, DNA damage and degradation, anabiosis and antibiotic resistance genes. Finally, we address some of the methodological problems connected to ancient DNA research....

  12. Multifactor Authentication: Its Time Has Come

    Directory of Open Access Journals (Sweden)

    Jim Reno

    2013-08-01

    Full Text Available Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.

  13. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  14. A compression tolerant scheme for image authentication

    Institute of Scientific and Technical Information of China (English)

    刘宝锋; 张文军; 余松煜

    2004-01-01

    Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation,which are feasible for practical applications.

  15. Ancient and Current Chaos Theories

    Directory of Open Access Journals (Sweden)

    Güngör Gündüz

    2006-07-01

    Full Text Available Chaos theories developed in the last three decades have made very important contributions to our understanding of dynamical systems and natural phenomena. The meaning of chaos in the current theories and in the past is somewhat different from each other. In this work, the properties of dynamical systems and the evolution of chaotic systems were discussed in terms of the views of ancient philosophers. The meaning of chaos in Anaximenes’ philosophy and its role in the Ancient natural philosophy has been discussed in relation to other natural philosophers such as of Anaximander, Parmenides, Heraclitus, Empedocles, Leucippus (i.e. atomists and Aristotle. In addition, the fundamental concepts of statistical mechanics and the current chaos theories were discussed in relation to the views in Ancient natural philosophy. The roots of the scientific concepts such as randomness, autocatalysis, nonlinear growth, information, pattern, etc. in the Ancient natural philosophy were investigated.

  16. Ancient Astronomical Monuments of Athens

    Science.gov (United States)

    Theodossiou, E.; Manimanis, V. N.

    2010-07-01

    In this work, four ancient monuments of astronomical significance found in Athens and still kept in the same city in good condition are presented. The first one is the conical sundial on the southern slope of the Acropolis. The second one is the Tower of the Winds and its vertical sundials in the Roman Forum of Athens, a small octagonal marble tower with sundials on all 8 of its sides, plus a water-clock inside the tower. The third monument-instrument is the ancient clepsydra of Athens, one of the findings from the Ancient Agora of Athens, a unique water-clock dated from 400 B.C. Finally, the fourth one is the carved ancient Athenian calendar over the main entrance of the small Byzantine temple of the 8th Century, St. Eleftherios, located to the south of the temple of the Annunciation of Virgin Mary, the modern Cathedral of the city of Athens.

  17. Orthopedic surgery in ancient Egypt

    OpenAIRE

    Blomstedt, Patric

    2014-01-01

    Background — Ancient Egypt might be considered the cradle of medicine. The modern literature is, however, sometimes rather too enthusiastic regarding the procedures that are attributed an Egyptian origin. I briefly present and analyze the claims regarding orthopedic surgery in Egypt, what was actually done by the Egyptians, and what may have been incorrectly ascribed to them. Methods — I reviewed the original sources and also the modern literature regarding surgery in ancient Egypt, concentra...

  18. Lake sediment multi-taxon DNA from North Greenland records early post-glacial appearance of vascular plants and accurately tracks environmental changes

    Science.gov (United States)

    Epp, L. S.; Gussarova, G.; Boessenkool, S.; Olsen, J.; Haile, J.; Schrøder-Nielsen, A.; Ludikova, A.; Hassel, K.; Stenøien, H. K.; Funder, S.; Willerslev, E.; Kjær, K.; Brochmann, C.

    2015-06-01

    High Arctic environments are particularly sensitive to climate changes, but retrieval of paleoecological data is challenging due to low productivity and biomass. At the same time, Arctic soils and sediments have proven exceptional for long-term DNA preservation due to their constantly low temperatures. Lake sediments contain DNA paleorecords of the surrounding ecosystems and can be used to retrieve a variety of organismal groups from a single sample. In this study, we analyzed vascular plant, bryophyte, algal (in particular diatom) and copepod DNA retrieved from a sediment core spanning the Holocene, taken from Bliss Lake on the northernmost coast of Greenland. A previous multi-proxy study including microscopic diatom analyses showed that this lake experienced changes between marine and lacustrine conditions. We inferred the same environmental changes from algal DNA preserved in the sediment core. Our DNA record was stratigraphically coherent, with no indication of leaching between layers, and our cross-taxon comparisons were in accordance with previously inferred local ecosystem changes. Authentic ancient plant DNA was retrieved from nearly all layers, both from the marine and the limnic phases, and distinct temporal changes in plant presence were recovered. The plant DNA was mostly in agreement with expected vegetation history, but very early occurrences of vascular plants, including the woody Empetrum nigrum, document terrestrial vegetation very shortly after glacial retreat. Our study shows that multi-taxon metabarcoding of sedimentary ancient DNA from lake cores is a valuable tool both for terrestrial and aquatic paleoecology, even in low-productivity ecosystems such as the High Arctic.

  19. Bluetooth-based authentication system for ambient intelligence

    Institute of Scientific and Technical Information of China (English)

    Jian HE; Hui LI; Yong ZHANG; Zhang-qin HUANG

    2008-01-01

    According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth-based authentication technique is provided. An authentication network combining advantages of Bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a Bluetooth badge for storing the user's identification information. Finally, the authentication system based on Bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the Bluetooth-based authentication technique can authenticate the user automatically.

  20. Authentic Learning and Alien Worlds

    Science.gov (United States)

    Watt, Sara D.; Watt, Keith; Gleim, Brian

    2015-01-01

    Glendale Community College has developed a laboratory course and observing program which provides non-science majors with opportunities to perform authentic science in a community college setting. The program is designed around experiential learning which allows students to meaningfully construct concepts within contexts that involve real-world problems that are relevant to the learner. Students learn observational astronomy and data analysis techniques by observing exoplanet transits using 8-inch Celestron telescopes. The exoplanet data gathered and analyzed by the students is contributed to the exoplanet database. This poster presents an overview of the program and highlights early educational results.

  1. Illuminating the evolution of equids and rodents with next-generation sequencing of ancient specimens

    DEFF Research Database (Denmark)

    Mouatt, Julia Thidamarth Vilstrup

    enrichment methods and the massive throughput and latest advances within DNA sequencing, the field of ancient DNA has flourished in later years. Those advances have even enabled the sequencing of complete genomes from the past, moving the field into genomic sciences. In this thesis we have used these latest...

  2. Micro-pixe studies on native Transylvanian gold for archaeological artifacts authentication

    International Nuclear Information System (INIS)

    Determination of the geological provenance of gold is a powerful argument in the authentication of ancient gold artifacts. Small samples (hundreds of microns) of native gold from Transylvanian deposits were scanned by micro-PIXE to obtain information on the natural Au–Ag alloy composition and on the presence of trace elements such as Sn, Sb, and Cu. The experiments were performed at the AGLAE Louvre and LNL AN2000 accelerators. Mineral identification was confirmed by a micro-mineralogical study using the INFLPR-Magurele Scanning Electron Microscope associated with an Energy-dispersive X-ray spectroscopy (EDAX) facility. (author)

  3. Authentic Moral Conflicts and Students' Moral Development

    Science.gov (United States)

    Fu, Wei-li

    2006-01-01

    This research deals with the different psychological processes people undergo when they experience firsthand authentic moral conflicts. It also discusses the value of authentic moral conflicts in students' moral development, and reasons for the ineffectiveness of moral education in China. The main reason for the unsatisfactory effects of moral…

  4. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...... authentication goals, the correctness requirements, can be derived from the binding sequence....

  5. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs for...

  6. Aggregated Authentication (AMAC) Using Universal Hash Functions

    Science.gov (United States)

    Znaidi, Wassim; Minier, Marine; Lauradoux, Cédric

    Aggregation is a very important issue to reduce the energy consumption in Wireless Sensors Networks (WSNs). There is currently a lack of cryptographic primitives for authentication of aggregated data. The theoretical background for Aggregated Message Authentication Codes (AMACs) has been proposed by Chan and Castelluccia at ISIT 08.

  7. Wikis as Platforms for Authentic Assessment

    Science.gov (United States)

    Eddy, Pamela L.; Lawrence, April

    2013-01-01

    Calls for accountability focus attention on assessment of student learning. Authentic assessment involves evaluating student learning as students perform real world tasks. We present a four-stage conceptual framework for authentic assessment. We argue first that evaluation is a process rather than a static one-time event. Second, authentic…

  8. Authentic Interdisciplinary Instruction: Raising the Bar

    Science.gov (United States)

    Mohnsen, Bonnie

    2011-01-01

    This article addressed the need for authentic interdisciplinary instruction. Authentic interdisciplinary instruction is defined as a learning activity that simultaneously improves student performance related to grade-level standards in two or more disciplines (e.g., science and physical education). The process described for creating authentic…

  9. Efficient Quantum Secure Direct Communication with Authentication

    International Nuclear Information System (INIS)

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We present two efficient protocols by using four Pauli operations, which are secure against inner Trent attacks as well as outer Eve attacks. Finally we generalize them to multiparty quantum direction communication. (general)

  10. Teacher Authenticity: A Theoretical and Empirical Investigation

    Science.gov (United States)

    Akoury, Paul N.

    2013-01-01

    This study builds on a small, under-acknowledged body of educational works that speak to the problem of an overly technical focus on teaching, which negates a more authentic consideration of what it means to teach, including an exploration of the spiritual and moral dimensions. A need for educational change and the teacher's authentic way of…

  11. Research on Secure Authentication Mechanism of Grid

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid.

  12. Difference packing arrays and systematic authentication codes

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of systematic authentication codes are obtainable in terms of existing difference packing arrays.

  13. Making it Real: Authenticity, Process and Pedagogy

    Science.gov (United States)

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  14. Did the ancient Egyptians migrate to ancient Nigeria?

    Directory of Open Access Journals (Sweden)

    Jock M. Agai

    2014-01-01

    Full Text Available Literatures concerning the history of West African peoples published from 1900 to 1970 debate�the possible migrations of the Egyptians into West Africa. Writers like Samuel Johnson and�Lucas Olumide believe that the ancient Egyptians penetrated through ancient Nigeria but Leo�Frobenius and Geoffrey Parrinder frowned at this opinion. Using the works of these early�20th century writers of West African history together with a Yoruba legend which teaches�about the origin of their earliest ancestor(s, this researcher investigates the theories that the�ancient Egyptians had contact with the ancient Nigerians and particularly with the Yorubas.Intradisciplinary and/or interdisciplinary implications: There is an existing ideology�amongst the Yorubas and other writers of Yoruba history that the original ancestors of�the Yorubas originated in ancient Egypt hence there was migration between Egypt and�Yorubaland. This researcher contends that even if there was migration between Egypt and�Nigeria, such migration did not take place during the predynastic and dynastic period as�speculated by some scholars. The subject is open for further research.

  15. Genome-wide nucleosome map and cytosine methylation levels of an ancient human genome

    DEFF Research Database (Denmark)

    Pedersen, Jakob Skou; Valen, Eivind; Velazquez, Amhed M Vargas; Parker, Brian J; Rasmussen, Morten; Lindgreen, Stinus; Lilje, Berit; Tobin, Desmond J; Kelly, Theresa K; Vang, Søren; Andersson, Robin; Jones, Peter A; Hoover, Cindi A; Tikhonov, Alexei; Prokhortchouk, Egor; Rubin, Edward M; Sandelin, Albin; Gilbert, M Thomas P; Krogh, Anders; Willerslev, Eske; Orlando, Ludovic

    2014-01-01

    expected signals at promoter regions, exon/intron boundaries, and CTCF sites. The top-scoring nucleosome calls revealed distinct DNA positioning biases, attesting to nucleotide-level accuracy. The ancient methylation levels exhibited high conservation over time, clustering closely with modern hair tissues......Epigenetic information is available from contemporary organisms, but is difficult to track back in evolutionary time. Here, we show that genome-wide epigenetic information can be gathered directly from next-generation sequence reads of DNA isolated from ancient remains. Using the genome sequence...... the contention that ancient epigenomic information can be reconstructed from a deep past. Our findings lay the foundation for extracting epigenomic information from ancient samples, allowing shifts in epialleles to be tracked through evolutionary time, as well as providing an original window into...

  16. On the fly finger knuckle print authentication

    Science.gov (United States)

    Abe, Narishige; Shinzaki, Takashi

    2014-05-01

    Finger knuckle print authentication has been researched not only as a supplemental authentication modality to fingerprint recognition but also as a method for logging into a PC or entering a building. However, in previous works, some specific devices were necessary to capture a finger knuckle print and users had to keep their fingers perfectly still to capture their finger knuckle. In this paper, we propose a new on the fly finger knuckle print authentication system using a general web camera. In our proposed authentication system, users can input their finger knuckle prints without needing their hand to remain motionless during image capture. We also evaluate the authentication accuracy of the proposed system, achieving an 7% EER under best conditions.

  17. Extensible Authentication Protocol Overview and Its Applications

    Science.gov (United States)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  18. Authentication in the context of international safeguards

    International Nuclear Information System (INIS)

    The International atomic Energy Agency held its first Advisory Group meeting on the subject of authentication in 1981. This meeting concentrated on the application of authentication to in-plant Non-Destructive Assay equipment supplied by the Facility Operator/State. In the decade since this meeting, a considerable amount of interest has developed over the use of authentication technology as a vital element of effective International Safeguards. Attendant with this interest, confusion has developed over the meaning and the need for the application of the technology as it exists today, and it may exist in the future. This paper addresses the subject of authentication, with emphasis on its basic definition and the applications of authentication technology in International Safeguards

  19. Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel

    CERN Document Server

    Singh, Raju

    2011-01-01

    The security of bio-metric information - finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.

  20. Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel

    Directory of Open Access Journals (Sweden)

    Raju Singh

    2011-03-01

    Full Text Available The security of bio-metric information – finger print, retina mapping, DNA mapping and some otherchemical and biological modified genes related information - transfer through low bandwidth andunreliable or covert channel is challenging task. Therefore, Security of biometric information is essentialrequirement in this fast developing communication world. Thus, in this paper, we propose efficient andeffective mechanism for confidentiality and authentication for biometric information transmitted by usingarithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed ofencryption, decryption and authentication process. It uses arithmetic encoding scheme and public keycryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.

  1. The Ancient Evolutionary History of Polyomaviruses.

    Science.gov (United States)

    Buck, Christopher B; Van Doorslaer, Koenraad; Peretti, Alberto; Geoghegan, Eileen M; Tisza, Michael J; An, Ping; Katz, Joshua P; Pipas, James M; McBride, Alison A; Camus, Alvin C; McDermott, Alexa J; Dill, Jennifer A; Delwart, Eric; Ng, Terry F F; Farkas, Kata; Austin, Charlotte; Kraberger, Simona; Davison, William; Pastrana, Diana V; Varsani, Arvind

    2016-04-01

    Polyomaviruses are a family of DNA tumor viruses that are known to infect mammals and birds. To investigate the deeper evolutionary history of the family, we used a combination of viral metagenomics, bioinformatics, and structural modeling approaches to identify and characterize polyomavirus sequences associated with fish and arthropods. Analyses drawing upon the divergent new sequences indicate that polyomaviruses have been gradually co-evolving with their animal hosts for at least half a billion years. Phylogenetic analyses of individual polyomavirus genes suggest that some modern polyomavirus species arose after ancient recombination events involving distantly related polyomavirus lineages. The improved evolutionary model provides a useful platform for developing a more accurate taxonomic classification system for the viral family Polyomaviridae. PMID:27093155

  2. The Ancient Evolutionary History of Polyomaviruses

    Science.gov (United States)

    Buck, Christopher B.; Van Doorslaer, Koenraad; Peretti, Alberto; Geoghegan, Eileen M.; Tisza, Michael J.; An, Ping; Katz, Joshua P.; Pipas, James M.; McBride, Alison A.; Camus, Alvin C.; McDermott, Alexa J.; Dill, Jennifer A.; Delwart, Eric; Ng, Terry F. F.; Farkas, Kata; Austin, Charlotte; Kraberger, Simona; Davison, William; Pastrana, Diana V.; Varsani, Arvind

    2016-01-01

    Polyomaviruses are a family of DNA tumor viruses that are known to infect mammals and birds. To investigate the deeper evolutionary history of the family, we used a combination of viral metagenomics, bioinformatics, and structural modeling approaches to identify and characterize polyomavirus sequences associated with fish and arthropods. Analyses drawing upon the divergent new sequences indicate that polyomaviruses have been gradually co-evolving with their animal hosts for at least half a billion years. Phylogenetic analyses of individual polyomavirus genes suggest that some modern polyomavirus species arose after ancient recombination events involving distantly related polyomavirus lineages. The improved evolutionary model provides a useful platform for developing a more accurate taxonomic classification system for the viral family Polyomaviridae. PMID:27093155

  3. The importance of studying inherited hematological disorders in ancient Anatolian populations

    Directory of Open Access Journals (Sweden)

    Yeşim Doğan Alakoç

    2011-12-01

    Full Text Available Before analysis of DNA from ancient remains was possible, anthropologists studied evolution and migration patterns using data obtained from population genetic studies on modern populations combined with data obtained from morphological evaluations of ancient remains. Currently, DNA analysis of ancient populations is making a valuable contribution to these efforts. Researchers that perform ancient DNA analysis prefer to study polymorphisms on the Y chromosome or mitochondrial DNA because the results are easier to statistically evaluate. To evaluate polymorphisms on diploid genomes, which are more informative, only mutations that have been extensively examined in modern populations should be chosen. The most extensively evaluated mutations are those related to prevalent inherited disorders. As such, beta-thalassemia, sickle cell anemia, FVL mutation of globin and the factor V genes are good candidates for DNA studies in ancient populations. These mutations are common in Anatolia, host to many civilizations since the Paleolithic period. This history makes Anatolia a good place for conducting research that could enhance our understanding of human evolution and migration patterns.

  4. Balancing Selection on a Regulatory Region Exhibiting Ancient Variation That Predates Human–Neandertal Divergence

    OpenAIRE

    Omer Gokcumen; Qihui Zhu; Mulder, Lubbertus C. F.; Iskow, Rebecca C.; Christian Austermann; Scharer, Christopher D.; Towfique Raj; Boss, Jeremy M.; Shamil Sunyaev; Alkes Price; Barbara Stranger; Viviana Simon; Charles Lee

    2013-01-01

    Ancient population structure shaping contemporary genetic variation has been recently appreciated and has important implications regarding our understanding of the structure of modern human genomes. We identified a ∼36-kb DNA segment in the human genome that displays an ancient substructure. The variation at this locus exists primarily as two highly divergent haplogroups. One of these haplogroups (the NE1 haplogroup) aligns with the Neandertal haplotype and contains a 4.6-kb deletion polymorp...

  5. Neonate human remains: a window of opportunity to the molecular study of ancient syphilis.

    Directory of Open Access Journals (Sweden)

    Rafael Montiel

    Full Text Available Ancient DNA (aDNA analysis can be a useful tool in bacterial disease diagnosis in human remains. However, while the recovery of Mycobacterium spp. has been widely successful, several authors report unsuccessful results regarding ancient treponemal DNA, casting doubts on the usefulness of this technique for the diagnosis of ancient syphilis. Here, we present results from an analysis of four newborn specimens recovered from the crypt of "La Ermita de la Soledad" (XVI-XVII centuries, located in the province of Huelva in the southwest of Spain. We extracted and analyzed aDNA in three independent laboratories, following specific procedures generally practiced in the aDNA field, including cloning of the amplified DNA fragments and sequencing of several clones. This is the most ancient case, reported to date, from which detection of DNA from T. pallidum subspecies pallidum has been successful in more than one individual, and we put forward a hypothesis to explain this result, taking into account the course of the disease in neonate individuals.

  6. Ligation Bias in Illumina Next-Generation DNA Libraries

    DEFF Research Database (Denmark)

    Seguin-Orlando, Andaine; Schubert, Mikkel; Clary, Joel;

    2013-01-01

    Ancient DNA extracts consist of a mixture of endogenous molecules and contaminant DNA templates, often originating from environmental microbes. These two populations of templates exhibit different chemical characteristics, with the former showing depurination and cytosine deamination by-products,...

  7. Image content authentication based on channel coding

    Science.gov (United States)

    Zhang, Fan; Xu, Lei

    2008-03-01

    The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.

  8. Graphical Passwords Authentication: A Survey

    Directory of Open Access Journals (Sweden)

    Nikhil Tarkeshwar Ambade

    2015-02-01

    Full Text Available In typically text-based passwords, well known users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. Reusing same or easy passwords across different accounts help to memorability, but decrease in security. Text passwords are the most popular user authentication method, but have security and usability problems. Alternatives such as biometric systems and tokens have their own drawbacks Graphical passwords offer another alternative. This paper conducts a comprehensive survey of the existing graphical password techniques also classifies these techniques into three categories: recall, recognition, and cued-recall approaches. This paper discusses security and usability aspects of graphical password techniques and point out the future research directions in this area.

  9. THORP: Authentication, transparency and independence

    International Nuclear Information System (INIS)

    The thermal oxide reprocessing plant (THORP) at Sellafield (United Kingdom) has started active commissioning in a run-up to full operation. It has a design annual throughput of 1200 t of heavy metal, containing up to 12 t of plutonium. The plant is subject to comprehensive Euratom safeguards involving challenges for both the inspectorate and the operator, extending from plant design through construction to commissioning and operation. The key elements of the safeguards approach are described and the concept of a network of safeguards measures at varying levels of independence is developed, leading to a comprehensive overall safeguards assurance. The importance of ensuring transparence of operations and of the related plant generated operating data is underlined. Authentication measures planned in all areas where information is obtained are described, leading, for the full set of verification activities, to a high level of independent assurance. (author). 7 refs

  10. Night blindness and ancient remedy

    Directory of Open Access Journals (Sweden)

    H.A. Hajar Al Binali

    2014-01-01

    Full Text Available The aim of this article is to briefly review the history of night blindness and its treatment from ancient times until the present. The old Egyptians, the Babylonians, the Greeks and the Arabs used animal liver for treatment and successfully cured the disease. The author had the opportunity to observe the application of the old remedy to a patient. Now we know what the ancients did not know, that night blindness is caused by Vitamin A deficiency and the animal liver is the store house for Vitamin A.

  11. Tuberculosis in ancient times

    Directory of Open Access Journals (Sweden)

    Louise Cilliers

    2008-09-01

    Full Text Available In spite of an array of effective antibiotics, tuberculosis is still very common in developing countries where overcrowding, malnutrition and poor hygienic conditions prevail. Over the past 30 years associated HIV infection has worsened the situation by increasing the infection rate and mortality of tuberculosis. Of those diseases caused by a single organism only HIV causes more deaths internationally than tuberculosis. The tubercle bacillus probably first infected man in Neolithic times, and then via infected cattle, but the causative Mycobacteriacea have been in existence for 300 million years. Droplet infection is the most common way of acquiring tuberculosis, although ingestion (e.g. of infected cows’ milk may occur. Tuberculosis probably originated in Africa. The earliest path gnomonic evidence of human tuberculosis in man was found in osteo-archaeological findings of bone tuberculosis (Pott’s disease of the spine in the skeleton of anEgyptian priest from the 21st Dynasty (approximately 1 000 BC. Suggestive but not conclusiveevidence of tuberculotic lesions had been found in even earlier skeletons from Egypt and Europe. Medical hieroglyphics from ancient Egypt are silent on the disease, which could be tuberculosis,as do early Indian and Chinese writings. The Old Testament refers to the disease schachapeth, translated as phthisis in the Greek Septuagint. Although the Bible is not specific about this condition, tuberculosis is still called schachapeth in modern Hebrew. In pre-Hippocratic Greece Homer did not mention phthisis, a word meaning non-specific wasting of the body. However. Alexander of Tralles (6th century BC seemed to narrow the concept down to a specific disease, and in the Hippocratic Corpus (5th-4th centuries BC phthisis can be recognised as tuberculosis. It was predominantly a respiratory disease commonly seen and considered to be caused by an imbalance of bodily humours. It was commonest in autumn, winter and spring

  12. Repetitive transpositions of mitochondrial DNA sequences to the nucleus during the radiation of horseshoe bats (Rhinolophus, Chiroptera).

    Science.gov (United States)

    Shi, Huizhen; Dong, Ji; Irwin, David M; Zhang, Shuyi; Mao, Xiuguang

    2016-05-01

    Transposition of mitochondrial DNA into the nucleus, which gives rise to nuclear mitochondrial DNAs (NUMTs), has been well documented in eukaryotes. However, very few studies have assessed the frequency of these transpositions during the evolutionary history of a specific taxonomic group. Here we used the horseshoe bats (Rhinolophus) as a case study to determine the frequency and relative timing of nuclear transfers of mitochondrial control region sequences. For this, phylogenetic and coalescent analyzes were performed on NUMTs and authentic mtDNA sequences generated from eight horseshoe bat species. Our results suggest at least three independent transpositions, including two ancient and one more recent, during the evolutionary history of Rhinolophus. The two ancient transpositions are represented by the NUMT-1 and -2 clades, with each clade consisting of NUMTs from almost all studied species but originating from different portions of the mtDNA genome. Furthermore, estimates of the most recent common ancestor for each clade corresponded to the time of the initial diversification of this genus. The recent transposition is represented by NUMT-3, which was discovered only in a specific subgroup of Rhinolophus and exhibited a close relationship to its mitochondrial counterpart. Our similarity searches of mtDNA in the R. ferrumequinum genome confirmed the presence of NUMT-1 and NUMT-2 clade sequences and, for the first time, assessed the extent of NUMTs in a bat genome. To our knowledge, this is the first study to report on the frequency of transpositions of mtDNA occurring before the common ancestry of a genus. PMID:26809101

  13. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  14. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  15. ALE: AES-based lightweight authenticated encryption

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Mendel, Florian; Regazzoni, Francesco;

    2014-01-01

    In this paper, we propose a new Authenticated Lightweight Encryption algorithm coined ALE. The basic operation of ALE is the AES round transformation and the AES-128 key schedule. ALE is an online single-pass authenticated encryption algorithm that supports optional associated data. Its security...... is at least 2.5 times more performant than the alternatives in their smallest implementations by requiring only about 4 AES rounds to both encrypt and authenticate a 128-bit data block for longer messages. When using the AES-NI instructions, ALE outperforms AES-GCM, AES-CCM and ASC-1 by a...

  16. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... can recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All...

  17. Authentication planning for XOR network coding

    CERN Document Server

    Jaffres-Runser, Katia

    2011-01-01

    This paper formulates the authentication planning problem when network coding is implemented in a wireless sensor network. The planning problem aims at minimizing the energy consumed by the security application which is guarantied using message authentication codes. This paper proposes a binary non-linear optimization formulation for this planning problem whose decision variables are the authentication decision of the nodes and the MAC modes of operation. It is illustrated for a butterfly topology. Results show that there is a real trade-off between energy efficiency and message throughput in this context.

  18. Authentication Systems in Internet of Things

    Directory of Open Access Journals (Sweden)

    Tuhin Borgohain

    2015-01-01

    Full Text Available This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.

  19. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  20. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  1. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  2. Understanding Malaria: Fighting an Ancient Scourge

    Science.gov (United States)

    Understanding Malaria Fighting an Ancient Scourge U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Institute of Allergy and Infectious Diseases Understanding Malaria Fighting an Ancient Scourge U.S. DEPARTMENT OF HEALTH ...

  3. Acupuncture: From Ancient Practice to Modern Science

    Science.gov (United States)

    ... Section CAM Acupuncture From Ancient Practice to Modern Science Past Issues / Winter 2009 Table of Contents For ... of Progress / Acupuncture From Ancient Practice to Modern Science / Low Back Pain and CAM / Time to Talk / ...

  4. The eye and its diseases in Ancient Egypt

    DEFF Research Database (Denmark)

    Andersen, S. Ry

    1997-01-01

    Ophthalmology, History of ophthalmology, eyes in the Ancient Egypt, eye disease in Ancient Egypt, porotic hyperostosis, mummification......Ophthalmology, History of ophthalmology, eyes in the Ancient Egypt, eye disease in Ancient Egypt, porotic hyperostosis, mummification...

  5. Ancient medicine--a review.

    Science.gov (United States)

    Zuskin, Eugenija; Lipozencić, Jasna; Pucarin-Cvetković, Jasna; Mustajbegović, Jadranka; Schachter, Neil; Mucić-Pucić, Branka; Neralić-Meniga, Inja

    2008-01-01

    Different aspects of medicine and/or healing in several societies are presented. In the ancient times as well as today medicine has been closely related to magic, science and religion. Various ancient societies and cultures had developed different views of medicine. It was believed that a human being has two bodies: a visible body that belongs to the earth and an invisible body of heaven. In the earliest prehistoric days, a different kind of medicine was practiced in countries such as Egypt, Greece, Rome, Mesopotamia, India, Tibet, China, and others. In those countries, "medicine people" practiced medicine from the magic to modern physical practices. Medicine was magical and mythological, and diseases were attributed mostly to the supernatural forces. The foundation of modern medicine can be traced back to ancient Greeks. Tibetan culture, for instance, even today, combines spiritual and practical medicine. Chinese medicine developed as a concept of yin and yang, acupuncture and acupressure, and it has even been used in the modern medicine. During medieval Europe, major universities and medical schools were established. In the ancient time, before hospitals had developed, patients were treated mostly in temples. PMID:18812066

  6. Wisdom of an Ancient City

    Institute of Scientific and Technical Information of China (English)

    GE JIANXIONG

    2010-01-01

    @@ The famous painting,Along the River During Qingming Festival,impresses visitors at the China Pavilion not iust because of the animated figures in the electronic version of the painting but because it shows a prosperous view of Kaifeng,capital of the Northern Song Dynasty (960-1127).It also showcases the wisdom of city planning in ancient China.

  7. The ancient art of memory.

    Science.gov (United States)

    Hobson, Allan

    2013-12-01

    Revision of Freud's theory requires a new way of seeking dream meaning. With the idea of elaborative encoding, Sue Llewellyn has provided a method of dream interpretation that takes into account both modern sleep science and the ancient art of memory. Her synthesis is elegant and compelling. But is her hypothesis testable? PMID:24304762

  8. Discovering the Ancient Temperate Rainforest.

    Science.gov (United States)

    Lindsay, Anne

    1997-01-01

    Two activities for grades 3 through 8 explore species adaptation and forestry issues in the North American rainforests. In one activity, students create imaginary species of plants or animals that are adapted for life in an ancient temperate rainforest. In the second activity, students role play groups affected by plans to log an area of the…

  9. Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    OpenAIRE

    Karan Khare; Surbhi Rautji; Deepak Gaur

    2013-01-01

    Behaviouralbiometrics is a scientific study with the primary purpose of identifying the authenticity of auser based on the way they interact with an authentication mechanism. While Association based passwordauthentication is a cognitive model of authentication system.The work done shows the implementation of Keyboard Latency technique for Authentication,implementation of Association Based Password authentication and comparison among two. There areseveral forms of behavioural biometrics such a...

  10. Development of anti-counterfeit consumer product authentication system

    OpenAIRE

    Olena V. Narimanova

    2015-01-01

    Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for imp...

  11. Authenticity and Experience among Visitors at a Historic Village

    OpenAIRE

    Harvey, William Robert

    1998-01-01

    This study examines the concept of authenticity as applied at Appomattox Court House National Historical Park (ACHNHP). Based on past theoretical research, a functional definition of authenticity is used in an effort to test whether or not visitors to the park come for reasons relating to authenticity. Further analyses are used to determine the relative importance of authenticity to other motivational reasons for visiting the park, and how the level of authenticity experienced at ACHNHP aff...

  12. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  13. Single gene retrieval from thermally degraded DNA

    Indian Academy of Sciences (India)

    Lianwen Zhang; Lianwen Zhang

    2005-12-01

    To simulate single gene retrieval from ancient DNA, several related factors have been investigated. By monitoring a 889 bp polymerase chain reaction (PCR) product and genomic DNA degradation, we find that heat and oxygen (especially heat) are both crucial factors influencing DNA degradation. The heat influence, mainly represented by temperature and heating time, affects the DNA degradation via DNA depurination followed by cleavage of nearby phosphodiesters. The heating time influence is temperature-dependent. By reactive oxygen species (ROS) scavenging and 1,3-diphenyl-isobenzofuran (DPBF) bleaching experiments the influence of oxygen on DNA thermal degradation was shown to occur via a singlet oxygen pathway. A comparative study of the thermal degradation of cellular DNA and isolated DNA showed that cellular lipids can aggravate DNA thermal degradation. These results confirm the possibility of gene amplification from thermally degraded DNA. They can be used to evaluate the feasibility of the retrieval of single gene from ancient remains.

  14. Developing Listening Skills with Authentic Materials.

    Science.gov (United States)

    Miller, Lindsay

    2003-01-01

    Discusses how to help English-as-a-Second-Language learners develop effective listening skills. Suggests a process for helping ESL learners develop their listening skills and makes suggestions for how this might be achieved with authentic materials. (VWL)

  15. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying...... the correctness of queries answered by the server and ensuring the integrity of the stored data, is crucial because the server, lying outside the administrative control of the client, can be malicious. We design efficient and secure protocols for optimally authenticating membership queries on hash...... for authenticating a hash table with constant query cost and sublinear update cost. Our solution employs the RSA accumulator in a nested way over the stored data, strictly improving upon previous accumulator-based solutions. Our construction applies to two concrete data authentication models and lends...

  16. Authentication for Propulsion Test Streaming Video Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An application was developed that could enforce two-factor authentication for NASA access to the Propulsion Test Streaming Video System.  To gain access to the...

  17. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos;

    2008-01-01

    We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...... outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file......-system operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication...

  18. Hardware device binding and mutual authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  19. Authenticating Devices in Ubiquitous Computing Environment

    Directory of Open Access Journals (Sweden)

    Kamarularifin Abd Jalil

    2015-05-01

    Full Text Available The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of keeping their distance from such applications. For this reason, in this paper, we are proposing a new authentication protocol to be used in such environment. Unlike other authentication protocols which can be adopted to be used in such environment, our proposed protocol could avoid a single point of failures, implements trust level in granting access and also promotes decentralization. It is hoped that the proposed authentication protocol can reduce or eliminate the problems mentioned.

  20. AUTHENTIC ASSESSMENT OF LANGUAGE SKILLS IN SCHOOL

    OpenAIRE

    DENISENKO I.S.

    2015-01-01

    The article defines key features of Authentic Assessment as alternative to traditional forms of assessment evaluating language skills schools: core principles and forms, criteria and requirements to teachers, developers and a scale for students.

  1. Design of safeguards systems for authentication

    International Nuclear Information System (INIS)

    To permit valid conclusions to be drawn from safeguards data, it is essential that this data is known to be authentic. That is, it must be known that the data originated from the intended source, that the data was not changed in transit, and that it is not a repeat or delayed copy of previous data. Safeguards systems and equipment should be designed with authentication included, instead of attempting to add security later. Failure to integrate authentication measures early in the design results in systems that are expensive or possibly impossible to deploy securely. This paper gives some of the factors that should be considered and some of the methods that can be employed for ensuring high security while minimizing cost. The paper is a compilation of some of the lessons learned by the authors during many years of working with the authentication of these systems. (author)

  2. ESnet authentication services and trust federations

    International Nuclear Information System (INIS)

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  3. Energy Efficient Authentication Strategies for Network Coding

    OpenAIRE

    Apavatjrut, Anya; Znaidi, Wassim; Fraboulet, Antoine; Goursaud, Claire; Jaffrès-Runser, Katia; Lauradoux, Cédric; Minier, Marine

    2012-01-01

    Recent advances in information theory and networking, e.g. aggregation, network coding or rateless codes, have significantly modified data dissemination in wireless networks. These new paradigms create new threats for security such as pollution attacks and denial of services (DoS). These attacks exploit the difficulty to authenticate data in such contexts. The particular case of xor network coding is considered herein. We investigate different strategies based on message authentication codes ...

  4. Mobile Fingerprint Authentication System with Enhanced Security

    OpenAIRE

    Li, Yi

    2016-01-01

    Abstract—Although use of fingerprint is highly effective in user authentication of networked services such as electronic payment, there are some problems in conventional systems, including high cost due to need for specialized fingerprint readers and limited usability. To resolve these problems, we propose a new system which incorporates a web-based fingerprint authentication using a smartphone as a fingerprint input device. Additionally, awatermark-based encryption solution is used to enhance sy...

  5. Applying Keystroke Dynamics for Personal Authentication

    OpenAIRE

    Gagbla, George Kofi

    2005-01-01

    With the establishment of the information society, security had become the greatest concern for Institutions transacting business over the Internet. Home banking and on-line brokerage applications currently, use basic software-only security functions for the internet such as server authentications and Secure Sockets layer. Higher levels of protections are being achieved with Smart card based authentication schemes and transaction protocols. Password based security identifies users based on wh...

  6. Comparison of authentication methods and tools

    OpenAIRE

    Kocmur, Matej

    2012-01-01

    We started this thesis with the review in area of many different authenticational protocols, more detailed description of the three most important authenticational protocols (RADIUS, LDAP and KERBEROS) follow, also cryptographic methods, hash functions and PKI infrastructure are described. We concluded the theoretical part of the thesis with safety aspects of protocols RADIUS and LDAP and also vulnerability of KERBEROS protocol, where we obtained proper quotes, which we also commented. The ne...

  7. Trait and state authenticity across cultures

    OpenAIRE

    Slabu, L; Lenton, A.; Sedikides, Constantine; Bruder, Martin

    2014-01-01

    We examined the role of culture in both trait and state authenticity, asking whether the search for and experience of the “true self” is a uniquely Western phenomenon or is relevant cross-culturally. We tested participants from the United States, China, India, and Singapore. U.S. participants reported higher average levels of trait authenticity than those from Eastern cultures (i.e., China, India, Singapore), but this effect was partially explained by cultural differences in self-construal an...

  8. Keystroke Dynamics Authentication For Collaborative Systems

    OpenAIRE

    Giot, Romain; El-Abed, Mohamad; Rosenberger, Christophe

    2009-01-01

    International audience We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this paper on biometric based solutions that do not necessitate any additional ...

  9. Image Based Authentication Using Steganography Technique

    OpenAIRE

    Satish Kumar Sonker; Sanjeev Kumar; Amit Kumar; Dr. Pragya Singh

    2013-01-01

    In the world of Information Security we are generally using Traditional (Text based) or multi factor Authentication Approach. Through which we are facing a lot of problems and it’s also less secure too. In these types conventional method attacks like brute-force attack, Dictionary Attack etc., are possible. This paper proposes the Image Based Authentication Using Steganography Technique considering the advantage of steganography technique along with the image. Including steganography in image...

  10. Quantum Authentication Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Penghao, Niu; Yuan, Chen; Chong, Li

    2016-01-01

    Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other's validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.

  11. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  12. Study on Anti-seismic Strengthening of the Ancient Stone Archway

    Directory of Open Access Journals (Sweden)

    Zhang Ding

    2016-01-01

    Full Text Available Chinese ancient stone archways are in flat structure. And joints of their members are of half tenons and mortises. Under the influence of the earthquake, the resisting ability of archway’s uneven sides is relatively poor and the relevant members have little reliable joints. This paper is to analyze seismic strengthening feasibility of Tiantai mountain stone archway which is damaged from the earthquake and to research on the aspects of the loading mode, structure layout and soundness. On the premise of guaranteeing the authenticity and beauty, we use earthquake damaging mechanism of stone archways and the modern anti-seismic structure designing theory and modern building materials. We also follow the way of the modern construction technology and ancient construction and strengthen the anti-seismic way of the resisting ability of Tiantai mountain stone archway’s uneven sides and joints of tenons and mortises. The best anti-seismic strengthening schemes are put forward as well.

  13. Genome-wide nucleosome map and cytosine methylation levels of an ancient human genome

    DEFF Research Database (Denmark)

    Pedersen, Jakob Skou; Valen, Eivind; Velazquez, Amhed Missael Vargas;

    2014-01-01

    Epigenetic information is available from contemporary organisms, but is difficult to track back in evolutionary time. Here, we show that genome-wide epigenetic information can be gathered directly from next-generation sequence reads of DNA isolated from ancient remains. Using the genome sequence...... expected signals at promoter regions, exon/intron boundaries, and CTCF sites. The top-scoring nucleosome calls revealed distinct DNA positioning biases, attesting to nucleotide-level accuracy. The ancient methylation levels exhibited high conservation over time, clustering closely with modern hair tissues...

  14. Messianic Judaism as a mode of fundamentalist authenticity : grammar of authenticity through ethnography of a contested identity

    OpenAIRE

    Dulin, John Christopher

    2010-01-01

    This paper considers how Messianic Jews understand their faith as a unique form of authenticity. On one level, both Messianic Jewish claims of authenticity and critics of Messianic authenticity reflect the same semiotic logic of what I call the "evaluative grammar of authenticity." The evaluative grammar of authenticity values causal/metonymic indexes over manipulated symbols and is undergirded by a suspicion that general appearances are symbolically manipulated in order to mask actual indexi...

  15. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  16. DNA profiling: Social, legal, or biological parentage

    OpenAIRE

    Sharma A

    2007-01-01

    DNA profiling in forensic casework is based on comparison of the results of biological evidence with direct reference samples of the individual concerned or with indirect references of his close blood relatives. The selection of reference samples for analysis is crucial to the success of a case; it not only depends on the authenticity of the reference samples, but also on the authenticity of the biological relation of the donors with the person in question. There are situations when the socia...

  17. Recovering mitochondrial DNA lineages of extinct Amerindian nations in extant homopatric Brazilian populations

    Directory of Open Access Journals (Sweden)

    Gonçalves Vanessa F

    2010-12-01

    Full Text Available Abstract Background Brazilian Amerindians have experienced a drastic population decrease in the past 500 years. Indeed, many native groups from eastern Brazil have vanished. However, their mitochondrial mtDNA haplotypes, still persist in Brazilians, at least 50 million of whom carry Amerindian mitochondrial lineages. Our objective was to test whether, by analyzing extant rural populations from regions anciently occupied by specific Amerindian groups, we could identify potentially authentic mitochondrial lineages, a strategy we have named 'homopatric targeting'. Results We studied 173 individuals from Queixadinha, a small village located in a territory previously occupied by the now extinct Botocudo Amerindian nation. Pedigree analysis revealed 74 unrelated matrilineages, which were screened for Amerindian mtDNA lineages by restriction fragment length polymorphism. A cosmopolitan control group was composed of 100 individuals from surrounding cities. All Amerindian lineages identified had their hypervariable segment HVSI sequenced, yielding 13 Amerindian haplotypes in Queixadinha, nine of which were not present in available databanks or in the literature. Among these haplotypes, there was a significant excess of haplogroup C (70% and absence of haplogroup A lineages, which were the most common in the control group. The novelty of the haplotypes and the excess of the C haplogroup suggested that we might indeed have identified Botocudo lineages. To validate our strategy, we studied teeth extracted from 14 ancient skulls of Botocudo Amerindians from the collection of the National Museum of Rio de Janeiro. We recovered mtDNA sequences from all the teeth, identifying only six different haplotypes (a low haplotypic diversity of 0.8352 ± 0.0617, one of which was present among the lineages observed in the extant individuals studied. Conclusions These findings validate the technique of homopatric targeting as a useful new strategy to study the peopling

  18. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  19. Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

    Institute of Scientific and Technical Information of China (English)

    Rajeev Singh; Teek Parval Sharma

    2015-01-01

    Authentication per frame is an implicit necessity for security in wireless local area networks (WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames. It utilizes the sequence number of the frame along with the authentication stream generators for authentication. Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.

  20. Authenticity in the Bureau-Enterprise Culture: The Struggle for Authentic Meaning

    Science.gov (United States)

    Woods, Philip A.

    2007-01-01

    This article emphasizes the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the organizational, social or cultural order in which leadership is situated. The overarching context for this exploration of authentic…