WorldWideScience

Sample records for base mismatch detection

  1. Heterodyne detection with mismatch correction base on array detector

    Science.gov (United States)

    Hongzhou, Dong; Guoqiang, Li; Ruofu, Yang; Chunping, Yang; Mingwu, Ao

    2016-07-01

    Based on an array detector, a new heterodyne detection system, which can correct the mismatches of amplitude and phase between signal and local oscillation (LO) beams, is presented in this paper. In the light of the fact that, for a heterodyne signal, there is a certain phase difference between the adjacent two samples of analog-to-digital converter (ADC), we propose to correct the spatial phase mismatch by use of the time-domain phase difference. The corrections can be realized by shifting the output sequences acquired from the detector elements in the array, and the steps of the shifting depend on the quantity of spatial phase mismatch. Numerical calculations of heterodyne efficiency are conducted to confirm the excellent performance of our system. Being different from previous works, our system needs not extra optical devices, so it provides probably an effective means to ease the problem resulted from the mismatches.

  2. Heterodyne detection with mismatch correction based on array detector

    Science.gov (United States)

    Dong, Hongzhou; Li, Guoqiang; Yang, Ruofu; Yang, Chunping; Ao, Mingwu

    2016-07-01

    Based on an array detector, a new heterodyne detection system, which can correct the mismatches of amplitude and phase between signal and local oscillation (LO) beams, is presented in this paper. In the light of the fact that, for a heterodyne signal, there is a certain phase difference between the adjacent two samples of analog-to-digital converter (ADC), we propose to correct the spatial phase mismatch by use of the time-domain phase difference. The corrections can be realized by shifting the output sequences acquired from the detector elements in the array, and the steps of the shifting depend on the quantity of spatial phase mismatch. Numerical calculations of heterodyne efficiency are conducted to confirm the excellent performance of our system. Being different from previous works, our system needs not extra optical devices, so it provides probably an effective means to ease the problem resulted from the mismatches.

  3. Single-base mismatch detection based on charge transduction through DNA.

    OpenAIRE

    Kelley, S O; Boon, E M; Barton, J K; Jackson, N M; Hill, M. G.

    1999-01-01

    High-throughput DNA sensors capable of detecting single-base mismatches are required for the routine screening of genetic mutations and disease. A new strategy for the electrochemical detection of single-base mismatches in DNA has been developed based upon charge transport through DNA films. Double-helical DNA films on gold surfaces have been prepared and used to detect DNA mismatches electrochemically. The signals obtained from redox-active intercalators bound to DNA-modified gold surfaces d...

  4. Reactivity of potassium permanganate and tetraethylammonium chloride with mismatched bases and a simple mutation detection protocol.

    OpenAIRE

    Lambrinakos, A; Humphrey, K E; Babon, J J; Ellis, T P; Cotton, R G

    1999-01-01

    Many mutation detection techniques rely upon recognition of mismatched base pairs in DNA hetero-duplexes. Potassium permanganate in combination with tetraethylammonium chloride (TEAC) is capable of chemically modifying mismatched thymidine residues. The DNA strand can then be cleaved at that point by treatment with piperidine. The reactivity of potassium permanganate (KMnO4) in TEAC toward mismatches was investigated in 29 different mutations, representing 58 mismatched base pairs and 116 mis...

  5. Blind Decorrelating Detection Based on Particle Swarm Optimization under Spreading Code Mismatch

    Institute of Scientific and Technical Information of China (English)

    Jhih-Chung Chang; Chih-Chang Shen

    2014-01-01

    A way of resolving spreading code mismatches in blind multiuser detection with a particle swarm optimization (PSO) approach is proposed. It has been shown that the PSO algorithm incorporating the linear system of the decorrelating detector, which is termed as decorrelating PSO (DPSO), can significantly improve the bit error rate (BER) and the system capacity. As the code mismatch occurs, the output BER performance is vulnerable to degradation for DPSO. With a blind decorrelating scheme, the proposed blind DPSO (BDPSO) offers more robust capabilities over existing DPSO under code mismatch scenarios.

  6. Gold-based optical biosensor for single-mismatched DNA detection using salt-induced hybridization

    DEFF Research Database (Denmark)

    Zhan, Zongrui; Ma, Xingyi; Cao, Cuong;

    2011-01-01

    In this study, a gold nanoparticle (Au-NP)-based detection method for sensitive and specific DNA-based diagnostic applications is described. A sandwich format consisting of Au-NPs/DNA/PMP (Streptavidin-coated MagnetSphere Para-Magnetic Particles) was fabricated. PMPs captured and separated target...

  7. Chimeric Proteins to Detect DNA Damage and Mismatches

    Energy Technology Data Exchange (ETDEWEB)

    McCutchen-Maloney, S; Malfatti, M; Robbins, K M

    2002-01-14

    The goal of this project was to develop chimeric proteins composed of a DNA mismatch or damage binding protein and a nuclease, as well as methods to detect DNA mismatches and damage. We accomplished this through protein engineering based on using polymerase chain reactions (PCRs) to create chimeras with novel functions for damage and mismatch detection. This project addressed fundamental questions relating to disease susceptibility and radiation-induced damage in cells. It also supported and enhanced LLNL's competency in the emerging field of proteomics. In nature, DNA is constantly being subjected to damaging agents such as exposure to ultraviolet (UV) radiation and various environmental and dietary carcinogens. If DNA damage is not repaired however, mutations in DNA result that can eventually manifest in cancer and other diseases. In addition to damage-induced DNA mutations, single nucleotide polymorphisms (SNPs), which are variations in the genetic sequence between individuals, may predispose some to disease. As a result of the Human Genome Project, the integrity of a person's DNA can now be monitored. Therefore, methods to detect DNA damage, mutations, and SNPs are useful not only in basic research but also in the health and biotechnology industries. Current methods of detection often use radioactive labeling and rely on expensive instrumentation that is not readily available in many research settings. Our methods to detect DNA damage and mismatches employ simple gel electrophoresis and flow cytometry, thereby alleviating the need for radioactive labeling and expensive equipment. In FY2001, we explored SNP detection by developing methods based on the ability of the chimeric proteins to detect mismatches. Using multiplex assays with flow cytometry and fluorescent beads to which the DNA substrates where attached, we showed that several of the chimeras possess greater affinity for damaged and mismatched DNA than for native DNA. This affinity was

  8. Advanced radar detection schemes under mismatched signal models

    CERN Document Server

    Bandiera, Francesco

    2009-01-01

    Adaptive detection of signals embedded in correlated Gaussian noise has been an active field of research in the last decades. This topic is important in many areas of signal processing such as, just to give some examples, radar, sonar, communications, and hyperspectral imaging. Most of the existing adaptive algorithms have been designed following the lead of the derivation of Kelly's detector which assumes perfect knowledge of the target steering vector. However, in realistic scenarios, mismatches are likely to occur due to both environmental and instrumental factors. When a mismatched signal

  9. Mismatched feature detection with finer granularity for emotional speaker recognition

    Institute of Scientific and Technical Information of China (English)

    Li CHEN; Ying-chun YANG; Zhao-hui WU

    2014-01-01

    The shapes of speakers’ vocal organs change under their different emotional states, which leads to the deviation of the emotional acoustic space of short-time features from the neutral acoustic space and thereby the degradation of the speaker recognition performance. Features deviating greatly from the neutral acoustic space are considered as mismatched features, and they negatively affect speaker recognition systems. Emotion variation produces different feature deformations for different phonemes, so it is reasonable to build a fi ner model to detect mismatched features under each phoneme. However, given the difficulty of phoneme recognition, three sorts of acoustic class recognition- phoneme classes, Gaussian mixture model (GMM) tokenizer, and probabilistic GMM tokenizer- are proposed to replace phoneme recognition. We propose feature pruning and feature regulation methods to process the mismatched features to improve speaker recognition performance. As for the feature regulation method, a strategy of maximizing the between-class distance and minimizing the within-class distance is adopted to train the transformation matrix to regulate the mismatched features. Experiments conducted on the Mandarin affective speech corpus (MASC) show that our feature pruning and feature regulation methods increase the identifi cation rate (IR) by 3.64% and 6.77%, compared with the baseline GMM-UBM (universal background model) algorithm. Also, corresponding IR increases of 2.09% and 3.32% can be obtained with our methods when applied to the state-of-the-art algorithm i-vector.

  10. Energy Detection of Multilevel PAM Signals with Systematic Threshold Mismatch

    Directory of Open Access Journals (Sweden)

    Antti Anttonen

    2009-01-01

    Full Text Available We address a symbol decision problem with spectrally efficient energy detected multilevel pulse amplitude modulated (PAM signals. First, we analytically quantify the relationship between a systematic threshold mismatch and the required increase of the average signal-to-noise ratio to preserve a desired symbol error rate. For the case in which such an increase is not tolerable, we present a novel near-optimal multilevel threshold selection scheme, which is accurate for a wide range of system parameters.

  11. Detection of single base mismatches of thymine and cytosine residues by potassium permanganate and hydroxylamine in the presence of tetralkylammonium salts.

    OpenAIRE

    Gogos, J.A.; Karayiorgou, M; Aburatani, H; Kafatos, F C

    1990-01-01

    In the presence of tetramethylammonium chloride, potassium permanganate specifically modifies mismatched thymines. Similarly, the modification of mismatched cytosines by hydroxylamine was enhanced by tetraethylammonium chloride. Modification followed by piperidine cleavage permits specific identification of the T and C mismatches and by extension, when the opposite DNA strand is analyzed, of A and G mismatches as well. These reactions can be performed conveniently with DNA immobilized on Hybo...

  12. The effect of base pair mismatch on DNA strand displacement

    CERN Document Server

    Broadwater, Bo

    2016-01-01

    DNA strand displacement is a key reaction in DNA homologous recombination and DNA mismatch repair and is also heavily utilized in DNA-based computation and locomotion. Despite its ubiquity in science and engineering, sequence-dependent effects of displacement kinetics have not been extensively characterized. Here, we measured toehold-mediated strand displacement kinetics using single-molecule fluorescence in the presence of a single base pair mismatch. The apparent displacement rate varied significantly when the mismatch was introduced in the invading DNA strand. The rate generally decreased as the mismatch in the invader was encountered earlier in displacement. Our data indicate that a single base pair mismatch in the invader stalls branch migration, and displacement occurs via direct dissociation of the destabilized incumbent strand from the substrate strand. We combined both branch migration and direct dissociation into a model, which we term, the concurrent displacement model, and used the first passage t...

  13. Technical aspects of typing for HLA-DP alleles using allele-specific DNA in vitro amplification and sequence-specific oligonucleotide probes. Detection of single base mismatches

    DEFF Research Database (Denmark)

    Fugger, L; Morling, N; Ryder, L P;

    1990-01-01

    The polymerase chain reaction (PCR) is an effective method for in vitro DNA amplification which combined with probing with synthetic oligonucleotides can be used for, e.g., HLA-typing. We have studied the technical aspects of HLA-DP typing with the technique. DNA from mononuclear nucleated cells...... be carefully titrated for each primer pair in the PCR. The influence of mismatches between the primer and the DNA template were studied and we found that, by using primers differing only from each other at the 3' end, cross-amplification of closely homologous alleles could be avoided. Thus, single base...... was extracted with either a simple salting out method or phenol/chloroform. Both DNAs could be readily used for PCR. The MgC2 concentration of the PCR buffer and the annealing temperature of the thermal cycle of the PCR were the two most important variables. The MgCl2 concentration and the temperature must...

  14. Mismatch oxidation assay: detection of DNA mutations using a standard UV/Vis microplate reader.

    Science.gov (United States)

    Tabone, Tania; Sallmann, Georgina; Cotton, Richard G H

    2009-01-01

    Simple, low-cost mutation detection assays that are suitable for low-throughput analysis are essential for diagnostic applications where the causative mutation may be different in every family. The mismatch oxidation assay is a simple optical absorbance assay to detect nucleotide substitutions, insertions, and deletions in heteroduplex DNA. The method relies on detecting the oxidative modification products of mismatched thymine and cytosine bases by potassium permanganate as it is reduced to manganese dioxide. This approach, unlike other methods commonly used to detect sequence variants, does not require costly labeled probes or primers, toxic chemicals, or a time-consuming electrophoretic separation step. The oxidation rate, and hence the presence of a sequence variant, is detected by measuring the formation of the potassium permanganate reduction product (hypomanganate diester), which absorbs at the 420-nm visible wavelength, using a standard UV/vis microplate reader. PMID:19768598

  15. The contrasting structures of mismatched DNA sequences containing looped-out bases (bulges) and multiple mismatches (bubbles).

    Science.gov (United States)

    Bhattacharyya, A; Lilley, D M

    1989-09-12

    We have studied the structure and reactivities of two kinds of mismatched DNA sequences--unopposed bases, or bulges, and multiple mismatched pairs of bases. These were generated in a constant sequence environment, in relatively long DNA fragments, using a technique based on heteroduplex formation between sequences cloned into single-stranded M13 phage. The mismatched sequences were studied from two points of view, viz 1. The mobility of the fragments on gel electrophoresis in polyacrylamide was studied in order to examine possible bending of the DNA due to the presence of the mismatch defect. Such bending would constitute a global effect on the conformation of the molecule. 2. Sequences in and around the mismatches were studied using enzyme and chemical probes of DNA structure. This would reveal more local structural effects of the mismatched sequences. We observed that the structures of the bulges and the multiple mismatches appear to be fundamentally different. The bulged sequences exhibited a large gel retardation, consistent with a significant bending of the DNA at the bulge, and whose magnitude depends on the number of mismatched bases. The larger bulges were sensitive to cleavage by single-strand specific nucleases, and modified by diethyl pyrocarbonate (adenines) or osmium tetroxide (thymines) in a non-uniform way, suggesting that the bulges have a precise structure that leads to exposure of some, but not all, of the bases. In contrast the multiple mismatches ('bubbles') cause very much less bending of the DNA fragment in which they occur, and uniform patterns of chemical reactivity along the length of the mismatched sequences, suggesting a less well defined, and possibly flexible, structure. The precise structure of the bulges suggests that such features may be especially significant for recognition by proteins.

  16. T-T mismatch-driven biosensor using triple functional DNA-protein conjugates for facile detection of Hg2+.

    Science.gov (United States)

    Wang, Ruoyu; Zhou, Xiaohong; Shi, Hanchang; Luo, Yi

    2016-04-15

    We report herein a T-T mismatch-driven biosensor using triple functional DNA-protein conjugates for facile detection of mercury ions (Hg(2+)) based on evanescent wave fluorescence excitation. Fluorescein-labeled DNA strands and streptavidin molecules were conjugated using heterobifunctional crosslinkers, and the obtained conjugates were named as "Hg(2+) dependent conjugates, HDCs". Initially hybridized with quencher-labeled DNA (Q-DNA) strands, HDCs showed low evanescent wave-induced fluorescence emission signals; however, in the presence of Hg(2+), the DNA moieties of HDCs tended to form hairpin structures stabilized by T-T mismatches, releasing Q-DNA strands, which was accompanied by increases in the fluorescent signals. The novel detection strategy enables the fluorescent detection of mercury ions with high specificity and a low detection limit of 1.06 nM in a facile way.

  17. Can Mismatch Negativity Be Linked to Synaptic Processes? A Glutamatergic Approach to Deviance Detection

    Science.gov (United States)

    Strelnikov, Kuzma

    2007-01-01

    This article aims to provide a theoretical framework to elucidate the neurophysiological underpinnings of deviance detection as reflected by mismatch negativity. A six-step model of the information processing necessary for deviance detection is proposed. In this model, predictive coding of learned regularities is realized by means of long-term…

  18. Detecting mismatches of bird migration stopover and tree phenology in response to changing climate

    Science.gov (United States)

    Kellermann, Jherime L.; Van Riper, Charles, III

    2015-01-01

    Migratory birds exploit seasonal variation in resources across latitudes, timing migration to coincide with the phenology of food at stopover sites. Differential responses to climate in phenology across trophic levels can result in phenological mismatch; however, detecting mismatch is sensitive to methodology. We examined patterns of migrant abundance and tree flowering, phenological mismatch, and the influence of climate during spring migration from 2009 to 2011 across five habitat types of the Madrean Sky Islands in southeastern Arizona, USA. We used two metrics to assess phenological mismatch: synchrony and overlap. We also examined whether phenological overlap declined with increasing difference in mean event date of phenophases. Migrant abundance and tree flowering generally increased with minimum spring temperature but depended on annual climate by habitat interactions. Migrant abundance was lowest and flowering was highest under cold, snowy conditions in high elevation montane conifer habitat while bird abundance was greatest and flowering was lowest in low elevation riparian habitat under the driest conditions. Phenological synchrony and overlap were unique and complementary metrics and should both be used when assessing mismatch. Overlap declined due to asynchronous phenologies but also due to reduced migrant abundance or flowering when synchrony was actually maintained. Overlap declined with increasing difference in event date and this trend was strongest in riparian areas. Montane habitat specialists may be at greatest risk of mismatch while riparian habitat could provide refugia during dry years for phenotypically plastic species. Interannual climate patterns that we observed match climate change projections for the arid southwest, altering stopover habitat condition.

  19. Detection of cognitive impairment in patients with obstructive sleep apnea hypopnea syndrome using mismatch negativity

    Institute of Scientific and Technical Information of China (English)

    Xiaohui Wen; Ningyu Wang; Jinfeng Liu; Zhanfeng Yan; Zhonghai Xin

    2012-01-01

    In this experiment, 97 patients with obstructive sleep apnea hypopnea syndrome were divided into three groups (mild, moderate, severe) according to minimum oxygen saturation, and 35 healthy subjects were examined as controls. Cognitive function was determined using the mismatch negativity paradigm and the Montreal Cognitive Assessment. The results revealed that as the disease worsened, the mismatch negativity latency was gradually extended, and the amplitude gradually declined in patients with obstructive sleep apnea hypopnea syndrome. Importantly, mismatch negativity latency in severe patients with a persistent time of minimum oxygen saturation 60 seconds. Correlation analysis revealed a negative correlation between minimum oxygen saturation latency and Montreal Cognitive Assessment scores. These findings indicate that intermittent night-time hypoxemia affects mismatch negativity waveforms and Montreal Cognitive Assessment scores. As indicators for detecting the cognitive functional status of obstructive sleep apnea hypopnea syndrome patients, the sensitivity of mismatch negativity is 82.93%, the specificity is 73.33%, the accuracy rate is 81.52%, the positive predictive value is 85.00%, the negative predictive value is 70.21%, the positive likelihood ratio is 3, and the negative likelihood ratio is 0.23. These results indicate that mismatch negativity can be used as an effective tool for diagnosis of cognitive dysfunction in obstructive sleep apnea hypopnea syndrome patients.

  20. Single-molecule multiparameter fluorescence spectroscopy reveals directional MutS binding to mismatched bases in DNA

    NARCIS (Netherlands)

    M. Cristovao (Michele); E. Sisamakis (Evangelos); M.M. Hingorani (Manju); A.D. Marx (Andreas); C.P. Jung (Caroline); P.J. Rothwell (Paul); C.A.M. Seidel (Claus A.); P. Friedhoff (Peter)

    2012-01-01

    textabstractMismatch repair (MMR) corrects replication errors such as mismatched bases and loops in DNA. The evolutionarily conserved dimeric MMR protein MutS recognizes mismatches by stacking a phenylalanine of one subunit against one base of the mismatched pair. In all crystal structures of G:T mi

  1. Emotional intelligence and mismatching expressive and verbal messages: a contribution to detection of deception.

    Directory of Open Access Journals (Sweden)

    Jerzy Wojciechowski

    Full Text Available Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI. However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception.

  2. A simple and rapid quantitative method of detection of the common achondroplasia mutation: Analysis in mismatch repair deficient cells

    Directory of Open Access Journals (Sweden)

    Grewal Raji

    2004-01-01

    Full Text Available Achondroplasia is the most common form of dwarfism and has an incidence of approximately 1/7,500. In more than 97% of cases, it is caused by a recurrent point mutation, a G to A substitution at nucleotide position 1138 (G1138A of the fibroblast growth factor receptor 3 gene. Although this is an autosomal dominant condition, more than 90% of all mutations occur sporadically making this one of the most mutagenic sites in the human genome. The reasons for the high spontaneous G1138A mutation rate are not known. This investigation was performed by developing a simple and rapid semi-quantitative allele specific PCR based assay capable of reliably detecting more than 25 mutant G1138A copies in a pool of 300,000 wild type molecules. Using this assay, the G1138A mutation frequency was measured in cell lines deficient in mismatch repair (LoVo, SW48 and comparing it with controls. No differences were found in the frequency of this point mutation between the mismatch repair deficient and wild type cell lines.

  3. Automatic Change Detection to Facial Expressions in Adolescents: Evidence from Visual Mismatch Negativity Responses

    Directory of Open Access Journals (Sweden)

    Tongran eLiu

    2016-03-01

    Full Text Available Adolescence is a critical period for the neurodevelopment of social-emotional processing, wherein the automatic detection of changes in facial expressions is crucial for the development of interpersonal communication. Two groups of participants (an adolescent group and an adult group were recruited to complete an emotional oddball task featuring on happy and one fearful condition. The measurement of event-related potential (ERP was carried out via electroencephalography (EEG and electrooculography (EOG recording, to detect visual mismatch negativity (vMMN with regard to the automatic detection of changes in facial expressions between the two age groups. The current findings demonstrated that the adolescent group featured more negative vMMN amplitudes than the adult group in the fronto-central region during the 120-200 ms interval. During the time window of 370-450 ms, only the adult group showed better automatic processing on fearful faces than happy faces. The present study indicated that adolescents posses stronger automatic detection of changes in emotional expression relative to adults, and sheds light on the neurodevelopment of automatic processes concerning social-emotional information.

  4. Automatic Change Detection to Facial Expressions in Adolescents: Evidence from Visual Mismatch Negativity Responses

    Science.gov (United States)

    Liu, Tongran; Xiao, Tong; Shi, Jiannong

    2016-01-01

    Adolescence is a critical period for the neurodevelopment of social-emotional processing, wherein the automatic detection of changes in facial expressions is crucial for the development of interpersonal communication. Two groups of participants (an adolescent group and an adult group) were recruited to complete an emotional oddball task featuring on happy and one fearful condition. The measurement of event-related potential was carried out via electroencephalography and electrooculography recording, to detect visual mismatch negativity (vMMN) with regard to the automatic detection of changes in facial expressions between the two age groups. The current findings demonstrated that the adolescent group featured more negative vMMN amplitudes than the adult group in the fronto-central region during the 120–200 ms interval. During the time window of 370–450 ms, only the adult group showed better automatic processing on fearful faces than happy faces. The present study indicated that adolescent’s posses stronger automatic detection of changes in emotional expression relative to adults, and sheds light on the neurodevelopment of automatic processes concerning social-emotional information. PMID:27065927

  5. Optimization of single-base-pair mismatch discrimination in oligonucleotide microarrays

    NARCIS (Netherlands)

    Urakawa, H.; Fantroussi, El S.; Smidt, H.; Smoot, J.C.; Tribou, E.H.; Kelly, J.J.; Noble, P.A.; Stahl, D.A.

    2003-01-01

    The discrimination between perfect-match and single-base-pair-mismatched nucleic acid duplexes was investigated by using oligonucleotide DNA microarrays and nonequilibrium dissociation rates (melting profiles). DNA and RNA versions of two synthetic targets corresponding to the 16S rRNA sequences of

  6. Evolving approach and clinical significance of detecting DNA mismatch repair deficiency in colorectal carcinoma

    Science.gov (United States)

    Shia, Jinru

    2016-01-01

    The last two decades have seen significant advancement in our understanding of colorectal tumors with DNA mismatch repair (MMR) deficiency. The ever-emerging revelations of new molecular and genetic alterations in various clinical conditions have necessitated constant refinement of disease terminology and classification. Thus, a case with the clinical condition of hereditary non-polyposis colorectal cancer as defined by the Amsterdam criteria may be one of Lynch syndrome characterized by a germline defect in one of the several MMR genes, one of the yet-to-be-defined “Lynch-like syndrome” if there is evidence of MMR deficiency in the tumor but no detectable germline MMR defect or tumor MLH1 promoter methylation, or “familial colorectal cancer type X” if there is no evidence of MMR deficiency. The detection of these conditions carries significant clinical implications. The detection tools and strategies are constantly evolving. The Bethesda guidelines symbolize a selective approach that uses clinical information and tumor histology as the basis to select high-risk individuals. Such a selective approach has subsequently been found to have limited sensitivity, and is thus gradually giving way to the alternative universal approach that tests all newly diagnosed colorectal cancers. Notably, the universal approach also has its own limitations; its cost-effectiveness in real practice, in particular, remains to be determined. Meanwhile, technological advances such as the next-generation sequencing are offering the promise of direct genetic testing for MMR deficiency at an affordable cost probably in the near future. This article reviews the up-to-date molecular definitions of the various conditions related to MMR deficiency, and discusses the tools and strategies that have been used in detecting these conditions. Special emphasis will be placed on the evolving nature and the clinical importance of the disease definitions and the detection strategies. PMID:25716099

  7. Impacts of Refraction Index Mismatch on Performance of Target Detection and Imaging by Using Flat LHM Lens

    Institute of Scientific and Technical Information of China (English)

    FANG Jie-Ran; GONG Yu; DONG Xiao-Ting; WANG Gang

    2008-01-01

    Refraction index mismatch between flat left-handed metamaterial(LHM)lens and its surrounding medium generally destroys the focusing of flat LHM lens and degrades the performance of near-field target detection by usingflat LHM lens.For LHM lens of refraction index mismatch within±30%,numerical simulations demonstrate that lenses with large refraction index may suffer less resolution degradation than lenses with small refraction index,and the enhancement of refocused microwave backscattered from target can be subsided bly up to approximately 5.5 dB.The refraction index mismatch will also shift the target position in the reconstructed image so that theoretical prediction of target position needs to be modified.

  8. A polymerization-based method to construct a plasmid containing clustered DNA damage and a mismatch.

    Science.gov (United States)

    Takahashi, Momoko; Akamatsu, Ken; Shikazono, Naoya

    2016-10-01

    Exposure of biological materials to ionizing radiation often induces clustered DNA damage. The mutagenicity of clustered DNA damage can be analyzed with plasmids carrying a clustered DNA damage site, in which the strand bias of a replicating plasmid (i.e., the degree to which each of the two strands of the plasmid are used as the template for replication of the plasmid) can help to clarify how clustered DNA damage enhances the mutagenic potential of comprising lesions. Placement of a mismatch near a clustered DNA damage site can help to determine the strand bias, but present plasmid-based methods do not allow insertion of a mismatch at a given site in the plasmid. Here, we describe a polymerization-based method for constructing a plasmid containing clustered DNA lesions and a mismatch. The presence of a DNA lesion and a mismatch in the plasmid was verified by enzymatic treatment and by determining the relative abundance of the progeny plasmids derived from each of the two strands of the plasmid. PMID:27449134

  9. The mismatch negativity as an index of cognitive decline for the early detection of Alzheimer's disease.

    Science.gov (United States)

    Ruzzoli, Manuela; Pirulli, Cornelia; Mazza, Veronica; Miniussi, Carlo; Brignani, Debora

    2016-01-01

    Evidence suggests that Alzheimer's disease (AD) is part of a continuum, characterized by long preclinical phases before the onset of clinical symptoms. In several cases, this continuum starts with a syndrome, defined as mild cognitive impairment (MCI), in which daily activities are preserved despite the presence of cognitive decline. The possibility of having a reliable and sensitive neurophysiological marker that can be used for early detection of AD is extremely valuable because of the incidence of this type of dementia. In this study, we aimed to investigate the reliability of auditory mismatch negativity (aMMN) as a marker of cognitive decline from normal ageing progressing from MCI to AD. We compared aMMN elicited in the frontal and temporal locations by duration deviant sounds in short (400 ms) and long (4000 ms) inter-trial intervals (ITI) in three groups. We found that at a short ITI, MCI showed only the temporal component of aMMN and AD the frontal component compared to healthy elderly who presented both. At a longer ITI, aMMN was elicited only in normal ageing subjects at the temporal locations. Our study provides empirical evidence for the possibility to adopt aMMN as an index for assessing cognitive decline in pathological ageing. PMID:27616726

  10. An optimized pentaplex PCR for detecting DNA mismatch repair-deficient colorectal cancers.

    Directory of Open Access Journals (Sweden)

    Ajay Goel

    Full Text Available PURPOSE: Microsatellite instability (MSI is used to screen colorectal cancers (CRC for Lynch Syndrome, and to predict outcome and response to treatment. The current technique for measuring MSI requires DNA from normal and neoplastic tissues, and fails to identify tumors with specific DNA mismatch repair (MMR defects. We tested a panel of five quasi-monomorphic mononucleotide repeat markers amplified in a single multiplex PCR reaction (pentaplex PCR to detect MSI. EXPERIMENTAL DESIGN: We investigated a cohort of 213 CRC patients, comprised of 114 MMR-deficient and 99 MMR-proficient tumors. Immunohistochemical (IHC analysis evaluated the expression of MLH1, MSH2, PMS2 and MSH6. MSI status was defined by differences in the quasi-monomorphic variation range (QMVR from a pool of normal DNA samples, and measuring differences in allele lengths in tumor DNA. RESULTS: Amplification of 426 normal alleles allowed optimization of the QMVR at each marker, and eliminated the requirement for matched reference DNA to define MSI in each sample. Using > or = 2/5 unstable markers as the criteria for MSI resulted in a sensitivity of 95.6% (95% CI = 90.1-98.1% and a positive predictive value of 100% (95% CI = 96.6%-100%. Detection of MSH6-deficiency was limited using all techniques. Data analysis with a three-marker panel (BAT26, NR21 and NR27 was comparable in sensitivity (97.4% and positive predictive value (96.5% to the five marker panel. Both approaches were superior to the standard approach to measuring MSI. CONCLUSIONS: An optimized pentaplex (or triplex PCR offers a facile, robust, very inexpensive, highly sensitive, and specific assay for the identification of MSI in CRC.

  11. Phase Error Caused by Speed Mismatch Analysis in the Line-Scan Defect Detection by Using Fourier Transform Technique

    Directory of Open Access Journals (Sweden)

    Eryi Hu

    2015-01-01

    Full Text Available The phase error caused by the speed mismatch issue is researched in the line-scan images capturing 3D profile measurement. The experimental system is constructed by a line-scan CCD camera, an object moving device, a digital fringe pattern projector, and a personal computer. In the experiment procedure, the detected object is moving relative to the image capturing system by using a motorized translation stage in a stable velocity. The digital fringe pattern is projected onto the detected object, and then the deformed patterns are captured and recorded in the computer. The object surface profile can be calculated by the Fourier transform profilometry. However, the moving speed mismatch error will still exist in most of the engineering application occasion even after an image system calibration. When the moving speed of the detected object is faster than the expected value, the captured image will be compressed in the moving direction of the detected object. In order to overcome this kind of measurement error, an image recovering algorithm is proposed to reconstruct the original compressed image. Thus, the phase values can be extracted much more accurately by the reconstructed images. And then, the phase error distribution caused by the speed mismatch is analyzed by the simulation and experimental methods.

  12. The impact of mismatch on the performance of coded narrow-band FM with limiter/discriminator detection

    Science.gov (United States)

    Simon, M. K.

    1983-01-01

    An examination of the impact of mismatch on the performance of convolutionally encoded/Viterbi decoded narrow-band FM with limiter/discriminator detection is presented. Attention was given to the potential gain available by the combination of this type of system in terms of hard and soft decision decoding. Soft decision decoding was demonstrated to offer only approximately 0.3 dB better performance than hard decision coding. It was also shown, through a technique involving the number of clicks occurring in each detection interval, that both soft and hard decision decoding bit error probability performance could be improved. It is concluded that the mismatch between the coding channel and the decoding metric of the Viterbi algorithm is responsible for reducing the difference between hard and soft decoding metrics.

  13. Cortical mapping of mismatch negativity with deviance detection property in rat.

    Directory of Open Access Journals (Sweden)

    Tomoyo Isoguchi Shiramatsu

    Full Text Available Mismatch Negativity (MMN is an N-methyl-d-aspartic acid (NMDA-mediated, negative deflection in human auditory evoked potentials in response to a cognitively discriminable change. MMN-like responses have been extensively investigated in animal models, but the existence of MMN equivalent is still controversial. In this study, we aimed to investigate how closely the putative MMN (MMNp in rats exhibited the comparable properties of human MMN. We used a surface microelectrode array with a grid of 10 × 7 recording sites within an area of 4.5 × 3.0 mm to densely map evoked potentials in the auditory cortex of anesthetized rats under the oddball paradigm. Firstly, like human MMN, deviant stimuli elicited negative deflections in auditory evoked potentials following the positive middle-latency response, termed P1. Secondly, MMNp exhibited deviance-detecting property, which could not be explained by simple stimulus specific adaptation (SSA. Thirdly, this MMNp occurred focally in the auditory cortex, including both the core and belt regions, while P1 activation focus was obtained in the core region, indicating that both P1 and MMNp are generated in the auditory cortex, yet the sources of these signals do not completely overlap. Fourthly, MMNp significantly decreased after the application of AP5 (D-(--2-amino-5-phosphonopentanoic acid, an antagonist at NMDA receptors. In stark contrast, AP5 affected neither P1 amplitude nor SSA of P1. These results provide compelling evidence that the MMNp we have examined in rats is functionally comparable to human MMN. The present work will stimulate translational research into MMN, which may help bridge the gap between electroencephalography (EEG/magnetoencephalography (MEG studies in humans and electrophysiological studies in animals.

  14. Maximum Likelihood A Priori Knowledge Interpolation-Based Handset Mismatch Compensation for Robust Speaker Identification

    Institute of Scientific and Technical Information of China (English)

    LIAO Yuanfu; ZHUANG Zhixian; YANG Jyhher

    2008-01-01

    Unseen handset mismatch is the major source of performance degradation in speaker identifica-tion in telecommunication environments.To alleviate the problem,a maximum likelihood a priori knowledge interpolation (ML-AKI)-based handset mismatch compensation approach is proposed.It first collects a set of handset characteristics of seen handsets to use as the a priori knowledge for representing the space of handsets.During evaluation the characteristics of an unknown test handset are optimally estimated by in-terpolation from the set of the a pdod knowledge.Experimental results on the HTIMIT database show that the ML-AKI method can improve the average speaker identification rate from 60.0% to 74.6% as compared with conventional maximum a posteriori-adapted Gaussian mixture models.The proposed ML-AKI method is a promising method for robust speaker identification.

  15. Statistical weighting of model-based optoacoustic reconstruction for minimizing artefacts caused by strong acoustic mismatch

    Science.gov (United States)

    Deán-Ben, X. Luís; Razansky, Daniel; Ntziachristos, Vasilis

    2011-03-01

    A modified quantitative inversion algorithm is presented that minimizes the effects of internal acoustic reflections or scattering in tomographic optoacoustic images. The inversion procedure in our model-based algorithm consists in solving a linear system of equations in which each individual equation corresponds to a given position of the acoustic transducer and to a given time instant. Thus, the modification that we propose in this work consists in weighting each equation of the linear system with the probability that the measured wave is not distorted by reflection or scattering phenomena. We show that the probability that a reflected or scattered wave is detected at a given position and at a given instant is approximately proportional to the size of the area in which the original wave could have been generated, which is dependent on the position of the transducer and on the time instant, so that such probability can be used to weight each equation of the linear system. Thereby, the contribution of the waves that propagate directly to the transducer to the reconstructed images is emphasized. We experimentally test the proposed inversion algorithm with tissue-mimicking agar phantoms in which air-gaps are included to cause reflections of the acoustic waves. The tomographic reconstructions obtained with the modification proposed herein show a clear reduction of the artefacts due to these acoustic phenomena with respect to the reconstructions yielded with the original algorithm. This performance is directly related to in-vivo small animal imaging applications involving imaging in the presence of bones, lungs, and other highly mismatched organs.

  16. Mismatch responses and deviance detection in N-methyl-D-aspartate (NMDA) receptor hypofunction and developmental models of schizophrenia.

    Science.gov (United States)

    Harms, Lauren

    2016-04-01

    Reductions in the size of the mismatch negativity (MMN), an event-related potential component elicited in response to unexpected stimuli, are arguably the most robust neurophysiological findings in schizophrenia. Several studies have now demonstrated that 'true' human-like deviance detection mismatch responses (MMRs) can be generated in the rodent brain and therefore that animal models can be used to examine the neurobiology of schizophrenia-like MMR impairments and investigate the efficacy of new treatments in addressing underlying neurobiological mechanisms. Two broad categories of animal models have been examined for schizophrenia-like MMRs: models involving N-methyl-D-aspartate receptor hypofunction, and models involving an insult or exposure during development. While these models have been shown to exhibit reductions in MMRs, it is still unclear whether or not these reductions involve changes to neural adaptation to repetitive stimuli or whether they reflect impairments in the response to unexpected deviations in regular patterns. PMID:26159809

  17. A Review for Model Plant Mismatch Measures in Process Monitoring

    Institute of Scientific and Technical Information of China (English)

    王洪; 谢磊; 宋执环

    2012-01-01

    Model is usually necessary for the design of a control loop. Due to simplification and unknown dynamics, model plant mismatch is inevitable in the control loop. In process monitoring, detection of mismatch and evaluation of its influences are demanded. In this paper several mismatch measures are presented based on different model descriptions. They are categorized into different groups from different perspectives and their potential in detection and diagnosis is evaluated. Two case studies on mixing process and distillation process demonstrate the efficacy of the framework of mismatch monitoring.

  18. The effect of primer-template mismatches on the detection and quantification of nucleic acids using the 5′ nuclease assay

    NARCIS (Netherlands)

    R. Stadhouders (Ralph); S.D. Pas (Suzan); J. Anber (Jeer); J. Voermans (Jolanda); T.H.M. Mes; M. Schutten (Martin)

    2010-01-01

    textabstractReal-time polymerase chain reaction (PCR) is the current method of choice for detection and quantification of nucleic acids, especially for molecular diagnostics. Complementarity between primers and template is often crucial for PCR applications, as mismatches can severely reduce priming

  19. DREMECELS: A Curated Database for Base Excision and Mismatch Repair Mechanisms Associated Human Malignancies.

    Science.gov (United States)

    Shukla, Ankita; Moussa, Ahmed; Singh, Tiratha Raj

    2016-01-01

    DNA repair mechanisms act as a warrior combating various damaging processes that ensue critical malignancies. DREMECELS was designed considering the malignancies with frequent alterations in DNA repair pathways, that is, colorectal and endometrial cancers, associated with Lynch syndrome (also known as HNPCC). Since lynch syndrome carries high risk (~40-60%) for both cancers, therefore we decided to cover all three diseases in this portal. Although a large population is presently affected by these malignancies, many resources are available for various cancer types but no database archives information on the genes specifically for only these cancers and disorders. The database contains 156 genes and two repair mechanisms, base excision repair (BER) and mismatch repair (MMR). Other parameters include some of the regulatory processes that have roles in these disease progressions due to incompetent repair mechanisms, specifically BER and MMR. However, our unique database mainly provides qualitative and quantitative information on these cancer types along with methylation, drug sensitivity, miRNAs, copy number variation (CNV) and somatic mutations data. This database would serve the scientific community by providing integrated information on these disease types, thus sustaining diagnostic and therapeutic processes. This repository would serve as an excellent accompaniment for researchers and biomedical professionals and facilitate in understanding such critical diseases. DREMECELS is publicly available at http://www.bioinfoindia.org/dremecels. PMID:27276067

  20. DREMECELS: A Curated Database for Base Excision and Mismatch Repair Mechanisms Associated Human Malignancies.

    Directory of Open Access Journals (Sweden)

    Ankita Shukla

    Full Text Available DNA repair mechanisms act as a warrior combating various damaging processes that ensue critical malignancies. DREMECELS was designed considering the malignancies with frequent alterations in DNA repair pathways, that is, colorectal and endometrial cancers, associated with Lynch syndrome (also known as HNPCC. Since lynch syndrome carries high risk (~40-60% for both cancers, therefore we decided to cover all three diseases in this portal. Although a large population is presently affected by these malignancies, many resources are available for various cancer types but no database archives information on the genes specifically for only these cancers and disorders. The database contains 156 genes and two repair mechanisms, base excision repair (BER and mismatch repair (MMR. Other parameters include some of the regulatory processes that have roles in these disease progressions due to incompetent repair mechanisms, specifically BER and MMR. However, our unique database mainly provides qualitative and quantitative information on these cancer types along with methylation, drug sensitivity, miRNAs, copy number variation (CNV and somatic mutations data. This database would serve the scientific community by providing integrated information on these disease types, thus sustaining diagnostic and therapeutic processes. This repository would serve as an excellent accompaniment for researchers and biomedical professionals and facilitate in understanding such critical diseases. DREMECELS is publicly available at http://www.bioinfoindia.org/dremecels.

  1. The γ/γ ' mismatch in Ni based superalloys: In situ measurements during a creep test

    Science.gov (United States)

    Diologent, F.; Caron, P.; d'Almeida, T.; Jacques, A.; Bastie, P.

    2003-01-01

    The lattice mismatch between the fcc γ matrix and the ordered γ ' cuboı̈dal precipitates in superalloys induces large internal stresses within the material. These stresses have a major effect on its mechanical behaviour and on the anisotropic evolution of the microstructure (rafting…) during its lifetime. The evolution of the effective lattice mismatch of the AM1 and MCNG superalloys was measured continuously during high temperature creep tests (1100 °C, 150 MPa) at the ID 15 (high energy) beamline of the ESRF. The bulk profiles of the 200 reflection (parallel to the tensile axis) were recorded using the triple crystal diffractometer. Both materials have a negative mismatch, and exhibit a transition between the initial wide γ ' peak to a two peaks profile during stage I of the creep curve, as rafting takes place. During stage II, the 200 mismatch decreases in magnitude. During stage III, as a microstructural transition (coalescence) occurs and the strain rate increases, the mismatch changes in the same direction, but at a faster rate, while the thickness of both peaks increases. Evolution of the MCNG specimen was the same as AM1 ones, but rafting and transition to stage II take place at a different rate.

  2. Optimization of energy window for {sup 90}Y bremsstrahlung SPECT imaging for detection tasks using the ideal observer with model-mismatch

    Energy Technology Data Exchange (ETDEWEB)

    Rong Xing; Ghaly, Michael; Frey, Eric C. [Department of Radiology, Johns Hopkins University, Baltimore, Maryland 21287-0859 (United States)

    2013-06-15

    Purpose: In yttrium-90 ({sup 90}Y) microsphere brachytherapy (radioembolization) of unresectable liver cancer, posttherapy {sup 90}Y bremsstrahlung single photon emission computed tomography (SPECT) has been used to document the distribution of microspheres in the patient and to help predict potential side effects. The energy window used during projection acquisition can have a significant effect on image quality. Thus, using an optimal energy window is desirable. However, there has been great variability in the choice of energy window due to the continuous and broad energy distribution of {sup 90}Y bremsstrahlung photons. The area under the receiver operating characteristic curve (AUC) for the ideal observer (IO) is a widely used figure of merit (FOM) for optimizing the imaging system for detection tasks. The IO implicitly assumes a perfect model of the image formation process. However, for {sup 90}Y bremsstrahlung SPECT there can be substantial model-mismatch (i.e., difference between the actual image formation process and the model of it assumed in reconstruction), and the amount of the model-mismatch depends on the energy window. It is thus important to account for the degradation of the observer performance due to model-mismatch in the optimization of the energy window. The purpose of this paper is to optimize the energy window for {sup 90}Y bremsstrahlung SPECT for a detection task while taking into account the effects of the model-mismatch. Methods: An observer, termed the ideal observer with model-mismatch (IO-MM), has been proposed previously to account for the effects of the model-mismatch on IO performance. In this work, the AUC for the IO-MM was used as the FOM for the optimization. To provide a clinically realistic object model and imaging simulation, the authors used a background-known-statistically and signal-known-statistically task. The background was modeled as multiple compartments in the liver with activity parameters independently following a

  3. Optimization of energy window for 90Y bremsstrahlung SPECT imaging for detection tasks using the ideal observer with model-mismatch

    International Nuclear Information System (INIS)

    Purpose: In yttrium-90 (90Y) microsphere brachytherapy (radioembolization) of unresectable liver cancer, posttherapy 90Y bremsstrahlung single photon emission computed tomography (SPECT) has been used to document the distribution of microspheres in the patient and to help predict potential side effects. The energy window used during projection acquisition can have a significant effect on image quality. Thus, using an optimal energy window is desirable. However, there has been great variability in the choice of energy window due to the continuous and broad energy distribution of 90Y bremsstrahlung photons. The area under the receiver operating characteristic curve (AUC) for the ideal observer (IO) is a widely used figure of merit (FOM) for optimizing the imaging system for detection tasks. The IO implicitly assumes a perfect model of the image formation process. However, for 90Y bremsstrahlung SPECT there can be substantial model-mismatch (i.e., difference between the actual image formation process and the model of it assumed in reconstruction), and the amount of the model-mismatch depends on the energy window. It is thus important to account for the degradation of the observer performance due to model-mismatch in the optimization of the energy window. The purpose of this paper is to optimize the energy window for 90Y bremsstrahlung SPECT for a detection task while taking into account the effects of the model-mismatch. Methods: An observer, termed the ideal observer with model-mismatch (IO-MM), has been proposed previously to account for the effects of the model-mismatch on IO performance. In this work, the AUC for the IO-MM was used as the FOM for the optimization. To provide a clinically realistic object model and imaging simulation, the authors used a background-known-statistically and signal-known-statistically task. The background was modeled as multiple compartments in the liver with activity parameters independently following a Gaussian distribution; the

  4. Electrical impedance tomography for assessing ventilation/perfusion mismatch for pulmonary embolism detection without interruptions in respiration.

    Science.gov (United States)

    Nguyen, Doan Trang; Thiagalingam, Aravinda; Bhaskaran, Abhishek; Barry, Michael A; Pouliopoulos, Jim; Jin, Craig; McEwan, Alistair L

    2014-01-01

    Recent studies have shown high correlation between pulmonary perfusion mapping with impedance contrast enhanced Electrical Impedance Tomography (EIT) and standard perfusion imaging methods such as Computed Tomography (CT) and Single Photon Emission Computerized Tomography (SPECT). EIT has many advantages over standard imaging methods as it is highly portable and non-invasive. Contrast enhanced EIT uses hypertonic saline bolus instead of nephrotoxic contrast medium that are utilized by CT and nuclear Ventilation/Perfusion (V/Q) scans. However, current implementation of contrast enhanced EIT requires induction of an apnea period for perfusion measurement, rendering it disadvantageous compared with current gold standard imaging modalities. In the present paper, we propose the use of a wavelet denoising algorithm to separate perfusion signal from ventilation signal such that no interruption in patient's ventilation would be required. Furthermore, right lung to left lung perfusion ratio and ventilation ratio are proposed to assess the mismatch between ventilation and perfusion for detection of Pulmonary Embolism (PE). The proposed methodology was validated on an ovine model (n=3, 83.7±7.7 kg) with artificially induced PE in the right lung. The results showed a difference in right lung to left lung perfusion ratio between baseline and diseased states in all cases with all paired t-tests between baseline and PE yielding p <; 0.01, while the right lung to left lung ventilation ratio remained unchanged in two out of three experiments. Statistics were pooled from multiple repetitions of measurements per experiment.

  5. Magnetostatic-Wave-Based Magneto-Optic Pulse Compression by Control of Phase Mismatching

    Institute of Scientific and Technical Information of China (English)

    WU Bao-Jian; GAO Xiang

    2008-01-01

    Microwave magnetostatic waves (MSWs) as moving gratings in magneto-optic (MO) film can lead to the Bragg diffraction of guided optical waves (GOWs). The MO coupling characteristics are responsible for the amplitude and phase frequency spectra of diffracted pulses and even result in the compression of chirped optical pulses in time domain. We theoretically investigate the noncollinear diffraction of linearly chirped Gaussian optical pulses by continuous magnetostatic forward volume waves in detail. For a given chirped optical pulse, with the increase of phase-mismatching slopes, the compression efficiency (CE) is gradually improved up to the maximum followed by the transition of diffracted pulses from single peak to multi peaks. The larger the chirp parameter is,the smaller the required phase-mismatching slope to achieve the maximal CE is. However, the rise of the chirp parameter or phase-mismatching slope reduces the relative peak intensity of the diffracted pulse. Lastly, it is pointed out that the phase-mismatching slope can be greatly increased by using the high-order modes of MSWs and GOWs.

  6. Sector-Based Analysis of the Education-Occupation Mismatch in the Turkish Labor Market

    Science.gov (United States)

    Mercan, Murat Anil; Karakas, Mesut; Citci, Sadettin Haluk; Babacan, Mehmet

    2015-01-01

    The aim of this study was to investigate the existence of sectorial undereducation and overeducation problems in the Turkish labor market. In order to cope with this issue, the 2009 Household Labor Force Survey (TurkStat), which covers 145,934 individuals within 27 sectors, was utilized. An objective measure of education-occupation mismatch based…

  7. Automated detection of residual cells after sex-mismatched stem-cell transplantation – evidence for presence of disease-marker negative residual cells

    Directory of Open Access Journals (Sweden)

    Johannes Tilman

    2009-05-01

    Full Text Available Abstract Background A new chimerism analysis based on automated interphase fluorescence in situ hybridization (FISH evaluation was established to detect residual cells after allogene sex-mismatched bone marrow or blood stem-cell transplantation. Cells of 58 patients were characterized as disease-associated due to presence of a bcr/abl-gene-fusion or a trisomy 8 and/or a simultaneous hybridization of gonosome-specific centromeric probes. The automatic slide scanning platform Metafer with its module MetaCyte was used to analyse 3,000 cells per sample. Results Overall 454 assays of 58 patients were analyzed. 13 of 58 patients showed residual recipient cells at one stage of more than 4% and 12 of 58 showed residual recipient cells less than 4%, respectively. As to be expected, patients of the latter group were associated with a higher survival rate (48 vs. 34 month. In only two of seven patients with disease-marker positive residual cells between 0.1–1.3% a relapse was observed. Besides, disease-marker negative residual cells were found in two patients without relapse at a rate of 2.8% and 3.3%, respectively. Conclusion The definite origin and meaning of disease-marker negative residual cells is still unclear. Overall, with the presented automatic chimerism analysis of interphase FISH slides, a sensitive method for detection of disease-marker positive residual cells is on hand.

  8. The Escherichia coli Methyl-Directed Mismatch Repair System Repairs Base Pairs Containing Oxidative Lesions

    OpenAIRE

    Wyrzykowski, Jennifer; Volkert, Michael R.

    2003-01-01

    A major role of the methyl-directed mismatch repair (MMR) system of Escherichia coli is to repair postreplicative errors. In this report, we provide evidence that MMR also acts on oxidized DNA, preventing mutagenesis. When cells deficient in MMR are grown anaerobically, spontaneous mutation frequencies are reduced compared with those of the same cells grown aerobically. In addition, we show that a dam mutant has an increased sensitivity to hydrogen peroxide treatment that can be suppressed by...

  9. Estimation of channel mismatches in time-interleaved analog-to-digital converters based on fractional delay and sine curve fitting.

    Science.gov (United States)

    Guo, Lianping; Tian, Shulin; Jiang, Jun

    2015-03-01

    This paper proposes an algorithm to estimate the channel mismatches in time-interleaved analog-to-digital converter (TIADC) based on fractional delay (FD) and sine curve fitting. Choose one channel as the reference channel and apply FD to the output samples of reference channel to obtain the ideal samples of non-reference channels with no mismatches. Based on least square method, the sine curves are adopted to fit the ideal and the actual samples of non-reference channels, and then the mismatch parameters can be estimated by comparing the ideal sine curves and the actual ones. The principle of this algorithm is simple and easily understood. Moreover, its implementation needs no extra circuits, lowering the hardware cost. Simulation results show that the estimation accuracy of this algorithm can be controlled within 2%. Finally, the practicability of this algorithm is verified by the measurement results of channel mismatch errors of a two-channel TIADC prototype. PMID:25832264

  10. Strategies for tuning phonon transport in multilayered structures using a mismatch-based particle model

    Science.gov (United States)

    Le, Nam Q.; Duda, John C.; English, Timothy S.; Hopkins, Patrick E.; Beechem, Thomas E.; Norris, Pamela M.

    2012-04-01

    The performance of many micro- and nanoscale devices depends on the ability to control interfacial thermal transport, which is predominantly mediated by phonons in semiconductor systems. The phonon transmissivity at an interface is therefore a quantity of interest. In this work, an empirical model, termed the thermal mismatch model, is developed to predict transmissivity at ideal interfaces between semiconductor materials, producing an excellent agreement with molecular dynamics simulations of wave packets. To investigate propagation through multilayered structures, this thermal mismatch model is then incorporated into a simulation scheme that represents wave packets as particles, showing a good agreement with a similar scheme that used molecular dynamics simulations as input [P. K. Schelling and S. R. Phillpot, J. Appl. Phys. 93, 5377 (2003)]. With these techniques validated for both single interfaces and superlattices, they are further used to identify ways to tune the transmissivity of multilayered structures. It is shown that by introducing intermediate layers of certain atomic masses, the total transmissivity can either be systematically enhanced or reduced compared to that of a single interface. Thus, this model can serve as a computationally inexpensive means of developing strategies to control phonon transmissivity in applications that may benefit from either enhancement (e.g., microelectronics) or reduction (e.g., thermoelectrics) in thermal transport.

  11. Strategy in clinical practice for classification of unselected colorectal tumours based on mismatch repair deficiency

    DEFF Research Database (Denmark)

    Jensen, Lars Henrik; Lindebjerg, J; Byriel, L;

    2007-01-01

    Objective Deficiency of DNA mismatch repair (MMR) causes microsatellite instability (MSI) in a subset of colorectal cancers. Patients with these tumours have a better prognosis and may have an altered response to chemotherapy. Some of the tumours are caused by hereditary mutations (hereditary non...... methylation or BRAF mutation analysis to distinguish sporadic patients from likely hereditary ones. MMR deficient patients with sporadic disease can be reassured of the better prognosis and the likely hereditary cases should receive genetic counselling.......Objective Deficiency of DNA mismatch repair (MMR) causes microsatellite instability (MSI) in a subset of colorectal cancers. Patients with these tumours have a better prognosis and may have an altered response to chemotherapy. Some of the tumours are caused by hereditary mutations (hereditary...... nonpolyposis colon cancer or Lynch syndrome), but most are epigenetic changes of sporadic origin. The aim of this study was to define a robust and inexpensive strategy for such classification in clinical practice. Method Tumours and blood samples from 262 successive patients with colorectal adenocarcinomas...

  12. Electrochemical Investigation of Interaction between a Bifunctional Probe and GG Mismatch Duplex.

    Science.gov (United States)

    Li, Jiao; He, Hanping; Peng, Xiaoqian; Huang, Min; Zhang, Xiuhua; Wang, Shengfu

    2015-01-01

    A bifunctional probe (FecNC), containing a recognition part and an electrochemical active center, was applied to electrochemical detection of GG mismatch duplexes. The preparation of gold electrodes modified by mismatch and complementatry duplexes was characterized by electrochemical impedance spectroscopy (EIS) and optimized for better detection in terms of self-assembly time, hybridization time, and incubation time. The interaction between FecNC and DNA duplexes modified on the surface of a gold electrode was explored by square wave voltammetry (SWV) and EIS. The results showed that the DNA duplexes with GG mismatch on the surface of a gold electrode was easily detected by the largest electrochemical signal of the bifunctional probe because of its selective binding to GG mismatches. The bifunctional probe could offer a simple, effective electrochemical detection of GG mismatches, and theoretical bases for development of electrochemical biosensors. Further, the method would be favorable for diagnosis of genetic diseases.

  13. Effect of LNA- and OMeN-modified oligonucleotide probes on the stability and discrimination of mismatched base pairs of duplexes

    Indian Academy of Sciences (India)

    Ying Yan; Jing Yan; Xianyu Piao; Tianbiao Zhang; Yifu Guan

    2012-06-01

    Locked nucleic acid (LNA) and 2′--methyl nucleotide (OMeN) are the most extensively studied nucleotide analogues. Although both LNA and OMeN are characterized by the C3′-endo sugar pucker conformation, which is dominant in A-form DNA and RNA nucleotides, they demonstrate different binding behaviours. Previous studies have focused attention on their properties of duplex stabilities, hybridization kinetics and resistance against nuclease digestion; however, their ability to discriminate mismatched hybridizations has been explored much less. In this study, LNA- and OMeN-modified oligonucleotide probes have been prepared and their effects on the DNA duplex stability have been examined: LNA modifications can enhance the duplex stability, whereas OMeN modifications reduce the duplex stability. Next, we studied how the LNA:DNA and OMeN:DNA mismatches reduced the duplex stability. Melting temperature measurement showed that different LNA:DNA or OMeN:DNA mismatches indeed influence the duplex stability differently. LNA purines can discriminate LNA:DNA mismatches more effectively than LNA pyrimidines as well as DNA nucleotides. Furthermore, we designed five LNA- and five OMeN-modified oligonucleotide probes to simulate realistic situations where target–probe duplexes contain a complementary LNA:DNA or OMeN:DNA base pairs and a DNA:DNA mismatch simultaneously. The measured collective effect showed that the duplex stability was enhanced by the complementary LNA:DNA base pair but decreased by the DNA:DNA mismatch in a position-dependent manner regardless of the chemical identity and position of the complementary LNA:DNA base pair. On the other hand, the OMeN-modified probes also showed that the duplex stability was reduced by both the OMeN modification and the OMeN:DNA mismatch in a position-dependent manner.

  14. The {gamma}/{gamma}{sup '} mismatch in Ni based superalloys: In situ measurements during a creep test

    Energy Technology Data Exchange (ETDEWEB)

    Diologent, F.; Caron, P.; D' Almeida, T.; Jacques, A. E-mail: jacques@mines.u-nancy.fr; Bastie, P

    2003-01-01

    The lattice mismatch between the fcc {gamma} matrix and the ordered {gamma}{sup '} cuboiedal precipitates in superalloys induces large internal stresses within the material. These stresses have a major effect on its mechanical behaviour and on the anisotropic evolution of the microstructure (rafting...) during its lifetime. The evolution of the effective lattice mismatch of the AM1 and MCNG superalloys was measured continuously during high temperature creep tests (1100 deg. C, 150 MPa) at the ID 15 (high energy) beamline of the ESRF. The bulk profiles of the 200 reflection (parallel to the tensile axis) were recorded using the triple crystal diffractometer. Both materials have a negative mismatch, and exhibit a transition between the initial wide {gamma}{sup '} peak to a two peaks profile during stage I of the creep curve, as rafting takes place. During stage II, the 200 mismatch decreases in magnitude. During stage III, as a microstructural transition (coalescence) occurs and the strain rate increases, the mismatch changes in the same direction, but at a faster rate, while the thickness of both peaks increases. Evolution of the MCNG specimen was the same as AM1 ones, but rafting and transition to stage II take place at a different rate.

  15. Differential modes of DNA binding by mismatch uracil DNA glycosylase from Escherichia coli: implications for abasic lesion processing and enzyme communication in the base excision repair pathway

    OpenAIRE

    Grippon, Seden; Zhao, Qiyuan; Robinson, Tom; Marshall, Jacqueline J. T.; O’Neill, Rory J.; Manning, Hugh; Kennedy, Gordon; Dunsby, Christopher; Neil, Mark; Halford, Stephen E.; French, Paul M. W.; Baldwin, Geoff S.

    2010-01-01

    Mismatch uracil DNA glycosylase (Mug) from Escherichia coli is an initiating enzyme in the base-excision repair pathway. As with other DNA glycosylases, the abasic product is potentially more harmful than the initial lesion. Since Mug is known to bind its product tightly, inhibiting enzyme turnover, understanding how Mug binds DNA is of significance when considering how Mug interacts with downstream enzymes in the base-excision repair pathway. We have demonstrated differential binding modes o...

  16. Detecting scale violations in absence of mismatch requires music-syntactic analysis: a further look at the early right anterior negativity (ERAN).

    Science.gov (United States)

    Kalda, Tiina; Minati, Ludovico

    2012-07-01

    The purpose of this study was to determine whether infrequent scale violations in a sequence of in-key notes are detected when the deviants are matched for frequency of occurrence and preceding intervals with the control notes. We further investigated whether the detectability of scale violations is modulated by the presence of melodic context and by the level of musical training. Event related potentials were recorded from 14 musicians and 13 non-musicians. In non-musicians, the out-of-key notes elicited an early right anterior negativity (ERAN), which appeared prominently over right frontal sites only when presented within structured sequences; no effects were found when the out-of-key notes were presented within scrambled sequences. In musicians, the out-of-key notes elicited a similar bilateral ERAN in structured and scrambled sequences. Our findings suggest that scale information is processed at the level of music-syntactic analysis, and that the detection of deviants does not require activation of auditory sensory memory by mismatch effects. Scales are perceived as a broader context, not just as online interval relations. Additional melodic context information appears necessary to support the representation of scale deviants in non-musicians, but not in musically-trained individuals, likely as a consequence of stronger pre-existing representations. PMID:22080232

  17. NMR study of oligonucleotides containing base pair mismatches and a human growth hormone peptide for the determination of solution structures

    International Nuclear Information System (INIS)

    Formation of unusual basepairs in DNA for random mutations in DNA was proposed in the sixties. These mismatches arise due to errors in replication, and from deamination of the 5-methylcytosine. The author's interest in studying mismatches and other oligonucleotides has been two fold. One is related to 31P chemical shifts and the backbone structure of oligonucleotides. He wanted to find out the significance of the dispersion of 31p chemical shifts in oligonucleotides. He wished to address whether this dispersion in 31P chemical shifts is related to global structural parameters of oligonucleotides like helix twist and whether he can prove the relationship between 31P chemical shifts and the backbone torsional angles epsilon and zeta. How does a mismatch affect 31P chemical shifts and the backbone torsional angle? The second interest is related to solving the three dimensional structure of these biopolymers by using NMR data (NOESY distances) and computer simulations. His major study of these mismatches has been in the assignments of the protons resonances and the phosphorus resonances by 2D NMR. He has also tried to answer the question about the relationships between 31P chemical shifts and global parameters for DNA such as the helix twist. He has made substantial progress in determination of J(H3'-P) coupling constants by 2D NMR and also in determining the relationship between the SIP chemical shifts and the backbone torsional angles by using the mismatch dodecamer sequences and the tetradecamer sequences. The 2D NMR data for the GG and GT mismatch have been used to determine three dimensional structures by using distance restrained molecular dynamics. The second project involved studying a 28 residue synthetic peptide by NMR

  18. Temporal Processing Ability Is Related to Ear-Asymmetry for Detecting Time Cues in Sound: A Mismatch Negativity (MMN) Study

    Science.gov (United States)

    Todd, Juanita; Finch, Brayden; Smith, Ellen; Budd, Timothy W.; Schall, Ulrich

    2011-01-01

    Temporal and spectral sound information is processed asymmetrically in the brain with the left-hemisphere showing an advantage for processing the former and the right-hemisphere for the latter. Using monaural sound presentation we demonstrate a context and ability dependent ear-asymmetry in brain measures of temporal change detection. Our measure…

  19. Detection of CpG methylations in human mismatch repair gene hMLH1 promoter by denaturing high-performance liquid chromatography (DHPLC)

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Objectives: To develop a novel method to detect CpG methylation by DHPLC. Methods: After DNA was treated with sodium bisulfite, mismatch repair gene hMLH1 promoter was amplified by polymerase chain reaction (PCR). DHPLC was used to separate the PCR products at their partially denaturing temperatures. BstUI digestion assay was also used for comparison study. Results: A 294bp band was obtained by PCR from each DNA samples of colon cancer cell line RKO and gastric cancer cell line PACM82. These two bands could be separated completely by DHPLC at 53° C (retention time 6.7 min for RKO vs. 6.2 min for PACM82). We concluded that the hMLH1 promoter in RKO cells is methylated, while PACM82 is not methylated, since methylation can protect the conversion of C to T and keep higher C/G content after bisulfite treatment, leading to the delayed time. These results consistent with those from BstUI digestion assay. Conclusion: Methylation in CpG islands of hMLH1 could be detected conveniently by DHPLC after bisulfite modification.

  20. Diagnosis of Constitutional Mismatch Repair-Deficiency Syndrome Based on Microsatellite Instability and Lymphocyte Tolerance to Methylating Agents

    DEFF Research Database (Denmark)

    Bodo, Sahra; Colas, Chrystelle; Buhard, Olivier;

    2015-01-01

    BACKGROUND & AIMS: Patients with bi-allelic germline mutations in mismatch repair (MMR) genes (MLH1, MSH2, MSH6, or PMS2) develop a rare but severe variant of Lynch syndrome called constitutional MMR deficiency (CMMRD). This syndrome is characterized by early-onset colorectal cancers, lymphomas o...

  1. Native and non-native speech sound processing and the neural mismatch responses: A longitudinal study on classroom-based foreign language learning.

    Science.gov (United States)

    Jost, Lea B; Eberhard-Moscicka, Aleksandra K; Pleisch, Georgette; Heusser, Veronica; Brandeis, Daniel; Zevin, Jason D; Maurer, Urs

    2015-06-01

    Learning a foreign language in a natural immersion context with high exposure to the new language has been shown to change the way speech sounds of that language are processed at the neural level. It remains unclear, however, to what extent this is also the case for classroom-based foreign language learning, particularly in children. To this end, we presented a mismatch negativity (MMN) experiment during EEG recordings as part of a longitudinal developmental study: 38 monolingual (Swiss-) German speaking children (7.5 years) were tested shortly before they started to learn English at school and followed up one year later. Moreover, 22 (Swiss-) German adults were recorded. Instead of the originally found positive mismatch response in children, an MMN emerged when applying a high-pass filter of 3 Hz. The overlap of a slow-wave positivity with the MMN indicates that two concurrent mismatch processes were elicited in children. The children's MMN in response to the non-native speech contrast was smaller compared to the native speech contrast irrespective of foreign language learning, suggesting that no additional neural resources were committed to processing the foreign language speech sound after one year of classroom-based learning.

  2. Native and non-native speech sound processing and the neural mismatch responses: A longitudinal study on classroom-based foreign language learning.

    Science.gov (United States)

    Jost, Lea B; Eberhard-Moscicka, Aleksandra K; Pleisch, Georgette; Heusser, Veronica; Brandeis, Daniel; Zevin, Jason D; Maurer, Urs

    2015-06-01

    Learning a foreign language in a natural immersion context with high exposure to the new language has been shown to change the way speech sounds of that language are processed at the neural level. It remains unclear, however, to what extent this is also the case for classroom-based foreign language learning, particularly in children. To this end, we presented a mismatch negativity (MMN) experiment during EEG recordings as part of a longitudinal developmental study: 38 monolingual (Swiss-) German speaking children (7.5 years) were tested shortly before they started to learn English at school and followed up one year later. Moreover, 22 (Swiss-) German adults were recorded. Instead of the originally found positive mismatch response in children, an MMN emerged when applying a high-pass filter of 3 Hz. The overlap of a slow-wave positivity with the MMN indicates that two concurrent mismatch processes were elicited in children. The children's MMN in response to the non-native speech contrast was smaller compared to the native speech contrast irrespective of foreign language learning, suggesting that no additional neural resources were committed to processing the foreign language speech sound after one year of classroom-based learning. PMID:25934634

  3. Potential for DNA-based identification of Great Lakes fauna: Match and mismatch between taxa inventories and DNA barcode libraries

    Science.gov (United States)

    DNA-based identification of mixed-organism samples offers the potential to greatly reduce the need for resource-intensive morphological identification, which would be of value both to biotic condition assessment and non-native species early-detection monitoring. However, the abi...

  4. Zero energy buildings and mismatch compensation factors

    DEFF Research Database (Denmark)

    Lund, Henrik; Marszal, Anna Joanna; Heiselberg, Per

    2011-01-01

    individual buildings and an element of economy of scale. For these three reasons mismatches should be dealt with at the aggregated level and not at the individual level of each building. Instead, this paper suggests to compensate the mismatch of a building by increasing (or decreasing) the capacity...... of the energy production unit. Based on historical data for the electricity supply area in western Denmark, this paper makes a first attempt to quantify mismatch compensation factors. The results indicate that such compensation factors are a little below one for buildings with photovoltaics (PV) and a little...

  5. A Mismatch EndoNuclease Array-Based Methodology (MENA for Identifying Known SNPs or Novel Point Mutations

    Directory of Open Access Journals (Sweden)

    Josep M. Comeron

    2016-04-01

    Full Text Available Accurate and rapid identification or confirmation of single nucleotide polymorphisms (SNPs, point mutations and other human genomic variation facilitates understanding the genetic basis of disease. We have developed a new methodology (called MENA (Mismatch EndoNuclease Array pairing DNA mismatch endonuclease enzymology with tiling microarray hybridization in order to genotype both known point mutations (such as SNPs as well as identify previously undiscovered point mutations and small indels. We show that our assay can rapidly genotype known SNPs in a human genomic DNA sample with 99% accuracy, in addition to identifying novel point mutations and small indels with a false discovery rate as low as 10%. Our technology provides a platform for a variety of applications, including: (1 genotyping known SNPs as well as confirming newly discovered SNPs from whole genome sequencing analyses; (2 identifying novel point mutations and indels in any genomic region from any organism for which genome sequence information is available; and (3 screening panels of genes associated with particular diseases and disorders in patient samples to identify causative mutations. As a proof of principle for using MENA to discover novel mutations, we report identification of a novel allele of the beethoven (btv gene in Drosophila, which encodes a ciliary cytoplasmic dynein motor protein important for auditory mechanosensation.

  6. Research of China’s Credit Currency Mismatch

    OpenAIRE

    Rui Cui; Weiyi Wang

    2010-01-01

    Large positive current mismatch exists in China at present, and with the continual development of financial reform, the risk of the current mismatch will gradually diffuse from the micro layer to the macro layer, so it is very important to study China’s credit currency mismatch. Based on the theoretical research of the credit currency mismatch, the formula of AECM is used to measure the level of China’s credit currency mismatch, and the causes are analyzed, and corresponding policy advices ar...

  7. Detecting deletions, insertions, and single nucleotide substitutions in cloned β-globin genes and new polymorphic nucleotide substitutions in β-globin genes in a Japanese population using ribonuclease cleavage at mismatches in RNA: DNA duplexes

    International Nuclear Information System (INIS)

    The applicability of ribonuclease (RNase) cleavage at mismatches in RNA:DNA duplexes (the RNase cleavage method) for determining nucleotide variant rates was examined in a Japanese population. DNA segments of various lengths obtained from four different regions of one normal and three thalassemic cloned human β-globin genes were inserted into transcription vectors. Sense and antisense RNA probes uniformly labeled with 32P were prepared. When RNA probes of 771 nucleotides (nt) or less were hybridized with cloned DNAs and the resulting duplexes were treated with a mixture of RNases A and T1, the length of products agreed with theoretical values. Twelve possible mismatches were examined. Since both sense and antisense probes were used, uncleavable mismatches such as G:T and G:G which were made from one combination of RNA and DNA strands could be converted to the cleavable C:A and C:C mismatches, respectively, by using the opposite combination. Deletions and insertions of one (G), four(TTCT), five (ATTTT), and 10 (ATTTTATTTT) nt were easily detected. A polymorphic substitution of T to C at position 666 of the second intervening sequence (IVS2-666) of the β-globin gene was detected using genomic DNAs from cell lines established from the peripheral B lymphocytes of 59 unrelated Japanese from Hiroshima or those amplified by polymerase chain reaction (PCR). The frequency of the gene with C at the IVS2-666 (allele C) was 0.48 and that of the gene with T (allene T) was 0.52. Two new polymorphic substitutions of C to A and A to T were detected at nucleotide positions 1789 and 1945 from the capping site, respectively, using genomic DNAs amplified by PCR. We conclude that it would be feasible to use the RNase cleavage method combined with PCR for large-scale screening of variation in chromosomal DNA. (J.P.N.)

  8. Immunity Based Worm Detection System

    Institute of Scientific and Technical Information of China (English)

    HONG Zheng; WU Li-fa; WANG Yuan-yuan

    2007-01-01

    Current worm detection methods are unable to detect multi-vector polymorphic worms effectively.Based on negative selection mechanism of the immune system,a local network worm detection system that detects worms was proposed.Normal network service requests were represented by self-strings,and the detection system used self-strings to monitor the network for anomaly.According to the properties of worm propagation,a control center correlated the anomalies detected in the form of binary trees to ensure the accuracy of worm detection.Experiments show the system to be effective in detecting the traditional as well as multi-vector polymorphic worms.

  9. MutS recognition: Multiple mismatches and sequence context effects

    Indian Academy of Sciences (India)

    Amita Joshi; Basuthkar J Rao

    2001-12-01

    Escherichia coli MutS is a versatile repair protein that specifically recognizes not only various types of mismatches but also single stranded loops of up to 4 nucleotides in length. Specific binding, followed by the next step of tracking the DNA helix that locates hemi-methylated sites, is regulated by the conformational state of the protein as a function of ATP binding/hydrolysis. Here, we study how various molecular determinants of a heteroduplex regulate mismatch recognition by MutS, the critical first step of mismatch repair. Using classical DNase I footprinting assays, we demonstrate that the hierarchy of MutS binding to various types of mismatches is identical whether the mismatches are present singly or in multiples. Moreover, this unique hierarchy is indifferent both to the differential level of DNA helical flexibility and to the unpaired status of the mismatched bases in a heteroduplex. Surprisingly, multiple mismatches exhibit reduced affinity of binding to MutS, compared to that of a similar single mismatch. Such a reduction in the affinity might be due to sequence context effects, which we established more directly by studying two identical single mismatches in an altered sequence background. A mismatch, upon simply being flipped at the same location, elicits changes in MutS specific contacts, thereby underscoring the importance of sequence context in modulating MutS binding to mismatches.

  10. Strategic Mismatches in Competing Teams

    OpenAIRE

    Kräkel, Matthias

    1999-01-01

    This paper discusses the strategic role of mismatching, where players voluntarily form inefficient teams or forego the formation of efficient teams, respectively. Strategic mismatching can be rational when players realize a competitive advantage (e.g. harming other competitors). In addition, the results show that free riding can be beneficial for a team in combination with strategic mismatching and that the loser?s curse may be welfare improving by mitigating the problem of strategic mismatch...

  11. Human DNA mismatch repair: coupling of mismatch recognition to strand-specific excision

    OpenAIRE

    WANG Huixian; Hays, John B.

    2007-01-01

    Eukaryotic mismatch-repair (MMR) proteins MutSα and MutLα couple recognition of base mismatches to strand-specific excision, initiated in vivo at growing 3′ ends and 5′ Okazaki-fragment ends or, in human nuclear extracts, at nicks in exogenous circular substrates. We addressed five biochemical questions relevant to coupling models. Excision remained fully efficient at DNA:MutSα ratios of nearly 1 to 1 at various mismatch-nick distances, suggesting a requirement for only one MutSα molecule per...

  12. Ovarian cancer at young age: the contribution of mismatch-repair defects in a population-based series of epithelial ovarian

    DEFF Research Database (Denmark)

    Domanska, K; Malander, S; Måsbäck, A;

    2007-01-01

    At least one of ten patients with ovarian cancer is estimated to develop their tumor because of heredity with the breast and ovarian cancer syndrome due to mutations in the BRCA1 and BRCA2 genes and hereditary nonpolyposis colorectal cancer (HNPCC) being the major genetic causes. Cancer at young...... and endometrioid cancers were overrepresented and were diagnosed in 27% and 16% of the tumors, respectively. Immunostaining using antibodies against MLH1, PMS2, MSH2, and MSH6 was used to assess the mismatch-repair status and revealed loss of expression of MLH1/PMS2 in two cases, loss of MSH2/MSH6 in one case...... age is a hallmark of heredity, and ovarian cancers associated with HNPCC have been demonstrated to develop at a particularly early age. We used the Swedish Cancer Registry to identify a population-based series of 98 invasive epithelial ovarian cancers that developed before 40 years. Mucinous...

  13. The Eukaryotic Mismatch Recognition Complexes Track with the Replisome during DNA Synthesis.

    Directory of Open Access Journals (Sweden)

    Joanna E Haye

    2015-12-01

    Full Text Available During replication, mismatch repair proteins recognize and repair mispaired bases that escape the proofreading activity of DNA polymerase. In this work, we tested the model that the eukaryotic mismatch recognition complex tracks with the advancing replisome. Using yeast, we examined the dynamics during replication of the leading strand polymerase Polε using Pol2 and the eukaryotic mismatch recognition complex using Msh2, the invariant protein involved in mismatch recognition. Specifically, we synchronized cells and processed samples using chromatin immunoprecipitation combined with custom DNA tiling arrays (ChIP-chip. The Polε signal was not detectable in G1, but was observed at active origins and replicating DNA throughout S-phase. The Polε signal provided the resolution to track origin firing timing and efficiencies as well as replisome progression rates. By detecting Polε and Msh2 dynamics within the same strain, we established that the mismatch recognition complex binds origins and spreads to adjacent regions with the replisome. In mismatch repair defective PCNA mutants, we observed that Msh2 binds to regions of replicating DNA, but the distribution and dynamics are altered, suggesting that PCNA is not the sole determinant for the mismatch recognition complex association with replicating regions, but may influence the dynamics of movement. Using biochemical and genomic methods, we provide evidence that both MutS complexes are in the vicinity of the replisome to efficiently repair the entire spectrum of mutations during replication. Our data supports the model that the proximity of MutSα/β to the replisome for the efficient repair of the newly synthesized strand before chromatin reassembles.

  14. Metrology of ground-based satellite validation: co-location mismatch and smoothing issues of total ozone comparisons

    Directory of Open Access Journals (Sweden)

    T. Verhoelst

    2015-12-01

    Full Text Available Comparisons with ground-based correlative measurements constitute a key component in the validation of satellite data on atmospheric composition. The error budget of these comparisons contains not only the measurement errors but also several terms related to differences in sampling and smoothing of the inhomogeneous and variable atmospheric field. A versatile system for Observing System Simulation Experiments (OSSEs, named OSSSMOSE, is used here to quantify these terms. Based on the application of pragmatic observation operators onto high-resolution atmospheric fields, it allows a simulation of each individual measurement, and consequently, also of the differences to be expected from spatial and temporal field variations between both measurements making up a comparison pair. As a topical case study, the system is used to evaluate the error budget of total ozone column (TOC comparisons between GOME-type direct fitting (GODFITv3 satellite retrievals from GOME/ERS2, SCIAMACHY/Envisat, and GOME-2/MetOp-A, and ground-based direct-sun and zenith–sky reference measurements such as those from Dobsons, Brewers, and zenith-scattered light (ZSL-DOAS instruments, respectively. In particular, the focus is placed on the GODFITv3 reprocessed GOME-2A data record vs. the ground-based instruments contributing to the Network for the Detection of Atmospheric Composition Change (NDACC. The simulations are found to reproduce the actual measurements almost to within the measurement uncertainties, confirming that the OSSE approach and its technical implementation are appropriate. This work reveals that many features of the comparison spread and median difference can be understood as due to metrological differences, even when using strict co-location criteria. In particular, sampling difference errors exceed measurement uncertainties regularly at most mid- and high-latitude stations, with values up to 10 % and more in extreme cases. Smoothing difference errors only

  15. Metrology of ground-based satellite validation: co-location mismatch and smoothing issues of total ozone comparisons

    Science.gov (United States)

    Verhoelst, T.; Granville, J.; Hendrick, F.; Köhler, U.; Lerot, C.; Pommereau, J.-P.; Redondas, A.; Van Roozendael, M.; Lambert, J.-C.

    2015-12-01

    Comparisons with ground-based correlative measurements constitute a key component in the validation of satellite data on atmospheric composition. The error budget of these comparisons contains not only the measurement errors but also several terms related to differences in sampling and smoothing of the inhomogeneous and variable atmospheric field. A versatile system for Observing System Simulation Experiments (OSSEs), named OSSSMOSE, is used here to quantify these terms. Based on the application of pragmatic observation operators onto high-resolution atmospheric fields, it allows a simulation of each individual measurement, and consequently, also of the differences to be expected from spatial and temporal field variations between both measurements making up a comparison pair. As a topical case study, the system is used to evaluate the error budget of total ozone column (TOC) comparisons between GOME-type direct fitting (GODFITv3) satellite retrievals from GOME/ERS2, SCIAMACHY/Envisat, and GOME-2/MetOp-A, and ground-based direct-sun and zenith-sky reference measurements such as those from Dobsons, Brewers, and zenith-scattered light (ZSL-)DOAS instruments, respectively. In particular, the focus is placed on the GODFITv3 reprocessed GOME-2A data record vs. the ground-based instruments contributing to the Network for the Detection of Atmospheric Composition Change (NDACC). The simulations are found to reproduce the actual measurements almost to within the measurement uncertainties, confirming that the OSSE approach and its technical implementation are appropriate. This work reveals that many features of the comparison spread and median difference can be understood as due to metrological differences, even when using strict co-location criteria. In particular, sampling difference errors exceed measurement uncertainties regularly at most mid- and high-latitude stations, with values up to 10 % and more in extreme cases. Smoothing difference errors only play a role in the

  16. Current status of the Scandiatransplant acceptable mismatch program.

    Science.gov (United States)

    Weinreich, I D; Pedersen, F; Grunnet, N

    2013-04-01

    This article describes the Scandiatransplant Acceptable Mismatch Program (STAMP), which was set into action in 2009. The aim of STAMP is to define human leukocyte antigens (HLA) toward which the potential kidney recipient has not developed antibodies, as "acceptable mismatches" in the Scandiatransplant database. In many cases this may improve the probability for a highly immunized recipient to receive a suitable kidney graft from a deceased donor. Using data extracted from the Scandiatransplant database on the outcomes of the program after the first 3 years, 31/115 recipients included in the program have undergone transplantation. From 2008 to 2011 the mean waiting time for highly immunized patients has decreased from 42 to 37 months. Continuous evaluation and follow-up of the program is essential to improve the procedures and outcomes. Calculation of transplantability based on a given set of acceptable mismatches was added to the program in 2011, based on the historical deceased donor pool providing the possibility of a specific patient to receive a kidney through STAMP. It is still a challenge for the tissue typing laboratories to determine which detected HLA antibodies are clinical relevant. We concluded that STAMP has had the intended effects, however adjustments and improvements is an ongoing process. As an improvment of the program HLA-C was added to the STAMP search algorithm in September 2012.

  17. Metrology of ground-based satellite validation: co-location mismatch and smoothing issues of total ozone comparisons

    Directory of Open Access Journals (Sweden)

    T. Verhoelst

    2015-08-01

    Full Text Available Comparisons with ground-based correlative measurements constitute a key component in the validation of satellite data on atmospheric composition. The error budget of these comparisons contains not only the measurement uncertainties but also several terms related to differences in sampling and smoothing of the inhomogeneous and variable atmospheric field. A versatile system for Observing System Simulation Experiments (OSSEs, named OSSSMOSE, is used here to quantify these terms. Based on the application of pragmatic observation operators onto high-resolution atmospheric fields, it allows a simulation of each individual measurement, and consequently also of the differences to be expected from spatial and temporal field variations between both measurements making up a comparison pair. As a topical case study, the system is used to evaluate the error budget of total ozone column (TOC comparisons between on the one hand GOME-type direct fitting (GODFITv3 satellite retrievals from GOME/ERS2, SCIAMACHY/Envisat, and GOME-2/MetOp-A, and on the other hand direct-sun and zenith-sky reference measurements such as from Dobsons, Brewers, and zenith scattered light (ZSL-DOAS instruments respectively. In particular, the focus is placed on the GODFITv3 reprocessed GOME-2A data record vs. the ground-based instruments contributing to the Network for the Detection of Atmospheric Composition Change (NDACC. The simulations are found to reproduce the actual measurements almost to within the measurement uncertainties, confirming that the OSSE approach and its technical implementation are appropriate. This work reveals that many features of the comparison spread and median difference can be understood as due to metrological differences, even when using strict co-location criteria. In particular, sampling difference errors exceed measurement uncertainties regularly at most mid- and high-latitude stations, with values up to 10 % and more in extreme cases. Smoothing

  18. Mammalian mismatch repair

    DEFF Research Database (Denmark)

    Pena Diaz, Javier; Jiricny, Josef

    2012-01-01

    A considerable surge of interest in the mismatch repair (MMR) system has been brought about by the discovery of a link between Lynch syndrome, an inherited predisposition to cancer of the colon and other organs, and malfunction of this key DNA metabolic pathway. This review focuses on recent...... advances in our understanding of the molecular mechanisms of canonical MMR, which improves replication fidelity by removing misincorporated nucleotides from the nascent DNA strand. We also discuss the involvement of MMR proteins in two other processes: trinucleotide repeat expansion and antibody maturation...

  19. An analytical study of mismatched complementary media

    CERN Document Server

    Zhu, Lin; Ma, Hongru

    2016-01-01

    Complementary media (CM) interacting with arbitrarily situated obstacles are usually less discussed. In this paper, an analytical framework based on multiple scattering theory is established for analyzing such a mismatched case. As examples, CM-based devices, i.e., a superlens and superscatterer, are discussed. From an analysis, the cancellation mechanism of the mismatched CM is studied. In addition, numerical results are provided for illustration. Moreover, further study shows that such cancellation effects might rely on specific conditions. Actually, the conclusions are not restricted to any specific frequencies; they could be extended to many other areas including applications to active cloaking, antennas, and wireless power transfer.

  20. Features Based Text Similarity Detection

    CERN Document Server

    Kent, Chow Kok

    2010-01-01

    As the Internet help us cross cultural border by providing different information, plagiarism issue is bound to arise. As a result, plagiarism detection becomes more demanding in overcoming this issue. Different plagiarism detection tools have been developed based on various detection techniques. Nowadays, fingerprint matching technique plays an important role in those detection tools. However, in handling some large content articles, there are some weaknesses in fingerprint matching technique especially in space and time consumption issue. In this paper, we propose a new approach to detect plagiarism which integrates the use of fingerprint matching technique with four key features to assist in the detection process. These proposed features are capable to choose the main point or key sentence in the articles to be compared. Those selected sentence will be undergo the fingerprint matching process in order to detect the similarity between the sentences. Hence, time and space usage for the comparison process is r...

  1. Mechanisms in E. coli and Human Mismatch Repair (Nobel Lecture).

    Science.gov (United States)

    Modrich, Paul

    2016-07-18

    DNA molecules are not completely stable, they are subject to chemical or photochemical damage and errors that occur during DNA replication resulting in mismatched base pairs. Through mechanistic studies Paul Modrich showed how replication errors are corrected by strand-directed mismatch repair in Escherichia coli and human cells. PMID:27198632

  2. Mechanisms in E. coli and Human Mismatch Repair (Nobel Lecture).

    Science.gov (United States)

    Modrich, Paul

    2016-07-18

    DNA molecules are not completely stable, they are subject to chemical or photochemical damage and errors that occur during DNA replication resulting in mismatched base pairs. Through mechanistic studies Paul Modrich showed how replication errors are corrected by strand-directed mismatch repair in Escherichia coli and human cells.

  3. The Mismatch between Students' Mental Models of Acids/Bases and their Sources and their Teacher's Anticipations thereof

    Science.gov (United States)

    Lin, Jing-Wen; Chiu, Mei-Hung

    2010-08-01

    The aim of this study is to compare the characteristics and sources of students' mental models of acids and bases with a teacher's anticipations and, based on this comparison, to explore some possible explanations why motivated students might fail to learn from a subject-knowledgeable chemistry teacher. The study involves a chemistry teacher and her 38 ninth graders and focuses on the mental models of three high achievers and three low achievers who were interviewed in depth. Four students' mental models of acid and base are identified. The mental models and sources of students' conceptions of acids and bases that influenced the high achievers are compared to those of the low achievers. We find that the teacher in the study made accurate anticipations of her students' mental models in the case of the high achievers but inaccurate anticipations of the low-achievers' mental models and the diverse sources influencing their mental models. In addition, the teacher incorrectly attributed the poor achievement of the low-achieving students to their intuition and underestimated the effects of her teaching on the achievement of these students. As a result, the teacher's instruction reinforced the low-achievers' incorrect mental models. Finally, the different approaches for teaching students with different achievements are emphasized according to the empirical data in this study.

  4. Nonlinear disturbance observer-based control for multi-input multi-output nonlinear systems subject to mismatching condition

    Science.gov (United States)

    Yang, Jun; Li, Shihua; Chen, Wen-Hua

    2012-08-01

    For a multi-input multi-output (MIMO) nonlinear system, the existing disturbance observer-based control (DOBC) only provides solutions to those whose disturbance relative degree (DRD) is higher than or equal to its input relative degree. By designing a novel disturbance compensation gain matrix, a generalised nonlinear DOBC method is proposed in this article to solve the disturbance attenuation problem of the MIMO nonlinear system with arbitrary DRD. It is shown that the disturbances are able to be removed from the output channels by the proposed method with appropriately chosen control parameters. The property of nominal performance recovery, which is the major merit of the DOBCs, is retained with the proposed method. The feasibility and effectiveness of the proposed method are demonstrated by simulation studies of both the numerical and application examples.

  5. Heterogenous mismatch-repair status in colorectal cancer

    DEFF Research Database (Denmark)

    Joost, Patrick; Veurink, Nynke; Holck, Susanne;

    2014-01-01

    BACKGROUND: Immunohistochemical staining for mismatch repair proteins is efficient and widely used to identify mismatch repair defective tumors. The tumors typically show uniform and widespread loss of MMR protein staining. We identified and characterized colorectal cancers with alternative......, heterogenous mismatch repair protein staining in order to delineate expression patterns and underlying mechanisms. METHODS: Heterogenous staining patterns that affected at least one of the mismatch repair proteins MLH1, PMS2, MSH2 and MSH6 were identified in 14 colorectal cancers. Based on alternative...... expression patterns macro-dissected and micro-dissected tumor areas were separately analyzed for microsatellite instability and MLH1 promoter methylation. RESULTS: Heterogenous retained/lost mismatch repair protein expression could be classified as intraglandular (within or in-between glandular formations...

  6. Design and analysis of mismatch probes for long oligonucleotide microarrays

    Energy Technology Data Exchange (ETDEWEB)

    Deng, Ye; He, Zhili; Van Nostrand, Joy D.; Zhou, Jizhong

    2008-08-15

    Nonspecific hybridization is currently a major concern with microarray technology. One of most effective approaches to estimating nonspecific hybridizations in oligonucleotide microarrays is the utilization of mismatch probes; however, this approach has not been used for longer oligonucleotide probes. Here, an oligonucleotide microarray was constructed to evaluate and optimize parameters for 50-mer mismatch probe design. A perfect match (PM) and 28 mismatch (MM) probes were designed for each of ten target genes selected from three microorganisms. The microarrays were hybridized with synthesized complementary oligonucleotide targets at different temperatures (e.g., 42, 45 and 50 C). In general, the probes with evenly distributed mismatches were more distinguishable than those with randomly distributed mismatches. MM probes with 3, 4 and 5 mismatched nucleotides were differentiated for 50-mer oligonucleotide probes hybridized at 50, 45 and 42 C, respectively. Based on the experimental data generated from this study, a modified positional dependent nearest neighbor (MPDNN) model was constructed to adjust the thermodynamic parameters of matched and mismatched dimer nucleotides in the microarray environment. The MM probes with four flexible positional mismatches were designed using the newly established MPDNN model and the experimental results demonstrated that the redesigned MM probes could yield more consistent hybridizations. Conclusions: This study provides guidance on the design of MM probes for long oligonucleotides (e.g., 50 mers). The novel MPDNN model has improved the consistency for long MM probes, and this modeling method can potentially be used for the prediction of oligonucleotide microarray hybridizations.

  7. A liquid-crystal-based DNA biosensor for pathogen detection

    Science.gov (United States)

    Khan, Mashooq; Khan, Abdur Rahim; Shin, Jae-Ho; Park, Soo-Young

    2016-03-01

    A liquid-crystal (LC)-filled transmission electron microscopy (TEM) grid cell coated with the cationic surfactant dodecyltrimethylammonium bromide (DTAB), to which a single-stranded deoxyribonucleic acid probe (ssDNAprobe) was adsorbed at the LC/aqueous interface (TEMDTAB/DNA), was applied for the highly specific detection of target DNA molecules. The DTAB-coated E7 (used LC mixture) in the TEM grid (TEMDTAB) exhibited a homeotropic orientation, and changed to a planar orientation upon adsorption of the ssDNAprobe. The TEMDTAB/DNA was then exposed to complementary (target) ssDNA, which resulted in a planar-to-homeotropic configurational change of E7 that could be observed through a polarized optical microscope under crossed polarizers. The optimum adsorption density (2 μM) of ssDNAprobe enabled the detection of ≥0.05 nM complementary ssDNA. This TEMDTAB/DNA biosensor could differentiate complementary ssDNA from mismatched ssDNA as well as double-stranded DNA. It also successfully detected the genomic DNAs of the bacterium Erwinia carotovora and the fungi Rhazictonia solani. Owe to the high specificity, sensitivity, and label-free detection, this biosensor may broaden the applications of LC-based biosensors to pathogen detection.

  8. Mismatch discrimination in fluorescent in situ hybridization using different types of nucleic acids

    DEFF Research Database (Denmark)

    Silvia, Fontenete; Joana, Barros; Pedro, Madureira;

    2015-01-01

    in biological targets, Helicobacter pylori and Helicobacter acinonychis. This is also the first study where unlocked nucleic acids (UNA) were used as chemistry modification in oligonucleotides for FISH methodologies. The effectiveness in detecting the specific target and in mismatch discrimination appears...... acid monomers might be crucial to the success of the analysis. To achieve the expected accuracy in detection, FISH probes should have high binding affinity towards their complementary strands and discriminate effectively the noncomplementary strands. In this study, we investigate the effect...... of different chemical modifications in fluorescent probes on their ability to successfully detect the complementary target and discriminate the mismatched base pairs by FISH. To our knowledge, this paper presents the first study where this analysis is performed with different types of FISH probes directly...

  9. Effects of Mismatched Parameter on Chaotic Synchronization

    Institute of Scientific and Technical Information of China (English)

    PENGJiang-hua; FANGJin-qing

    2003-01-01

    Chaos-based security communication has become one of the most interesting hot subjects for research of chaotic theory in real world since. In recent years, secure communication via synchronized chaos has been intensely studied. However, in practical application it is difficult to construct two complete identical chaotic systems since there are many reasons to induce parameter mismatch between two systems (response system and drive system).

  10. Bacteriophage-Based Pathogen Detection

    Science.gov (United States)

    Ripp, Steven

    Considered the most abundant organism on Earth, at a population approaching 1031, bacteriophage, or phage for short, mediate interactions with myriad bacterial hosts that has for decades been exploited in phage typing schemes for signature identification of clinical, food-borne, and water-borne pathogens. With over 5,000 phage being morphologically characterized and grouped as to susceptible host, there exists an enormous cache of bacterial-specific sensors that has more recently been incorporated into novel bio-recognition assays with heightened sensitivity, specificity, and speed. These assays take many forms, ranging from straightforward visualization of labeled phage as they attach to their specific bacterial hosts to reporter phage that genetically deposit trackable signals within their bacterial hosts to the detection of progeny phage or other uniquely identifiable elements released from infected host cells. A comprehensive review of these and other phage-based detection assays, as directed towards the detection and monitoring of bacterial pathogens, will be provided in this chapter.

  11. Optimisation of the CT h4S bioassay for detection of human interleukin-4 secreted by mononuclear cells stimulated by phytohaemaglutinin or by human leukocyte antigen mismatched mixed lymphocyte culture

    DEFF Research Database (Denmark)

    Petersen, Søren Lykke; Russell, Charlotte Astrid; Bendtzen, Klaus;

    2002-01-01

    bioassay with regards to specificity, sensitivity, detection limit, and reproducibility. We have found the optimal assay conditions to be 1 x 10 (4) CT.h4S cells/well deprived of IL-4 for 24 h and preincubated for 7 h followed by 18 h of incubation with tritiated methyl-thymidine. In this setting the CT.h4...... of IL-4 detection was not due to high amounts of soluble IL-4 receptor. With the use of 1x10(6) responder cells/well in HLA-mismatched MLC, we found limited IL-4 accumulation still increasing at day 12. We conclude that the CT.h4S bioassay is a reliable and specific method for quantification of IL-4......Limiting dilution analysis has been used in the context of allogeneic bone marrow transplantation to determine anti-recipient interleukin-2 (IL-2) producing helper T lymphocyte precursor (HTLp) frequencies, which in several studies have been predictive of graft-versus-host disease (GVHD). Recently...

  12. Application of detecting algorithm based on network

    Institute of Scientific and Technical Information of China (English)

    张凤斌; 杨永田; 江子扬; 孙冰心

    2004-01-01

    Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively,according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithms into an intrusion detection system, and a detection algorithm based on network traffic is proposed. This algorithm is a real-time and self-study algorithm and can detect undefined intrusion behaviors effectively.

  13. Visible light communication based motion detection.

    Science.gov (United States)

    Sewaiwar, Atul; Tiwari, Samrat Vikramaditya; Chung, Yeon-Ho

    2015-07-13

    In this paper, a unique and novel visible light communication based motion detection is presented. The proposed motion detection is performed based on white light LEDs and an array of photodetectors from existing visible light communication (VLC) links, thus providing VLC with three functionalities of illumination, communication and motion detection. The motion is detected by observing the pattern created by intentional obstruction of the VLC link. Experimental and simulation results demonstrate the validity of the proposed VLC based motion detection technique. The VLC based motion detection can benefit smart devices control in VLC based smart home environments. PMID:26191937

  14. Detection of 100% of mutations in 124 individuals using a standard UV/Vis microplate reader: a novel concept for mutation scanning

    OpenAIRE

    Tabone, Tania; Sallmann, Georgina; Webb, Elizabeth; Cotton, Richard G.H.

    2006-01-01

    We report the development of a simple and inexpensive assay for the detection of DNA polymorphisms and mutations that is based on the modification of mismatched bases by potassium permanganate. Unlike the chemical cleavage of mismatch assay, which also exploits the reactivity of potassium permanganate to detect genomic variants, the assay we describe here does not require a cleavage manipulation and therefore does not require expensive or toxic chemicals or a separation step, as mismatches ar...

  15. Elastic-plastic fracture mechanics of strength-mismatching

    Energy Technology Data Exchange (ETDEWEB)

    Parks, D.M.; Ganti, S.; McClintock, F.A. [Massachusetts Institute of Technology, Cambridge, MA (United States)

    1996-12-31

    Approximate solutions to stress-fields are provided for a strength-mismatched interface crack in small-scale yielding (SSY) for non-hardening and low hardening materials. Variations of local deformation intensities, characterized by a J-type contour integral, are proposed. The softer material experiences a higher deformation intensity level, J{sub S}, while the harder material sees a much lower deformation intensity level, J{sub H}, compared to that obtained from the applied J near the respective homogeneous crack-tips. For a low hardening material, the stress fields are obtained by scaling from an elastic/perfectly-plastic problem, based on an effective mismatch, M{sub eff}, which is a function of mismatch, M, and the hardening exponent, n. Triaxial stress build-up is discussed quantitatively in terms of M. The influence of strength-mismatch on cleavage fracture is discussed using Weibull statistics.

  16. Pairing Mismatched ssDNA to dsDNA Studied with Reflectometric Interference Spectroscopy Sensor

    Institute of Scientific and Technical Information of China (English)

    Qing-Qing Wu; Kai-Ge Wang; Dan Sun; Shuang Wang; Chen Zhang; Wei Zhao

    2016-01-01

    The interaction between two single-stranded DNA (ssDNA) molecules as pairing to a double-stranded DNA (dsDNA) molecule is studied by the reflectometric interference spectroscopy (RIFS) technology.A nano-porous anode alumina membrane coated an Au layer is employed as the sensor substrate.The results indicate that when there are mismatched nucleotide bases,the effective optical thicknesses (OTeff) have obvious difference,and the changes of OTeff are connected with the sensor layer thickness and the effective refractive index.It is also demonstrated that the RIFS technique can be used to precisely detect the ssDNA molecules with individual base mismatched as pairing to dsDNA.

  17. Reverse ventilation--perfusion mismatch

    International Nuclear Information System (INIS)

    Patients having lobar airway obstruction or consolidation usually have decreases of both ventilation and perfusion on lung scans. We report three patients in whom hypoxic vasoconstriction was apparently incomplete, resulting in a ''reversed'' ventilation-perfusion mismatch. Perfusion of the hypoxic lobe on the radionuclide scan was associated with metabolic alkalosis, pulmonary venous and pulmonary arterial hypertension in these patients

  18. Zepto-molar electrochemical detection of Brucella genome based on gold nanoribbons covered by gold nanoblooms

    Science.gov (United States)

    Rahi, Amid; Sattarahmady, Naghmeh; Heli, Hossein

    2015-12-01

    Gold nanoribbons covered by gold nanoblooms were sonoelectrodeposited on a polycrystalline gold surface at -1800 mV (vs. AgCl) with the assistance of ultrasound and co-occurrence of the hydrogen evolution reaction. The nanostructure, as a transducer, was utilized to immobilize a Brucella-specific probe and fabrication of a genosensor, and the process of immobilization and hybridization was detected by electrochemical methods, using methylene blue as a redox marker. The proposed method for detection of the complementary sequence, sequences with base-mismatched (one-, two- and three-base mismatches), and the sequence of non-complementary sequence was assayed. The fabricated genosensor was evaluated for the assay of the bacteria in the cultured and human samples without polymerase chain reactions (PCR). The genosensor could detect the complementary sequence with a calibration sensitivity of 0.40 μA dm3 mol-1, a linear concentration range of 10 zmol dm-3 to 10 pmol dm-3, and a detection limit of 1.71 zmol dm-3.

  19. Detection Algorithm for LFM Echo of Underwater Moving Targets Based on Discrete Fractional Fourier Transform

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The mismatch between echo and replica caused by underwater moving target(UMT)'s radial velocity degrades the detection performance of the matched filter(MF) for the linear frequency modulation(LFM) signal. By using the focusing property of fractional Fourier transform(FRFT) to that signal, a detection algorithm for UMT's LFM echo based on the discrete fractional Fourier transform(DFRFT) is proposed. This algorithm is less affected by the target's radial velocity compared with the other MF detection algorithm utilizing zero radial velocity replica(ZRVR), and the mathematical relation between the output peak positions of these two algorithms exists in the case of existence of target echo. The algorithm can also estimate the target distance by using this relation. The simulation and experiment show that this algorithm's detection performance is better than or equivalent to that of the other MF algorithm utilizing ZRVR for the LFM echo of UMT with unknown radial velocity under reverberation noise background.

  20. Mismatch Negativity: Translating the Potential

    OpenAIRE

    JuanitaTodd

    2013-01-01

    The mismatch negativity (MMN) component of the auditory event-related potential has become a valuable tool in cognitive neuroscience. Its reduced size in persons with schizophrenia is of unknown origin but theories proposed include links to problems in experience-dependent plasticity reliant on N-methyl-d-aspartate glutamate receptors. In this review we address the utility of this tool in revealing the nature and time course of problems in perceptual inference in this illness together with it...

  1. Reverse ventilation--perfusion mismatch

    Energy Technology Data Exchange (ETDEWEB)

    Palmaz, J.C.; Barnett, C.A.; Reich, S.B.; Krumpe, P.E.; Farrer, P.A.

    1984-01-01

    Patients having lobar airway obstruction or consolidation usually have decreases of both ventilation and perfusion on lung scans. We report three patients in whom hypoxic vasoconstriction was apparently incomplete, resulting in a ''reversed'' ventilation-perfusion mismatch. Perfusion of the hypoxic lobe on the radionuclide scan was associated with metabolic alkalosis, pulmonary venous and pulmonary arterial hypertension in these patients.

  2. Educational Mismatch and Wait Unemployment

    OpenAIRE

    Patrizia Ordine; Giuseppe Rose

    2011-01-01

    This work investigates educational mismatch and its interrelationships with individual unemployment duration. By studying unemployment histories of Italian workers we show that overeducated have longer unemployment spells than well matched workers. Using duration models we show that hazard rates of graduates are higher than those of undergraduates only for transitions toward occupations that require the competencies provided by the universities. This process is strictly related to innate abil...

  3. Edge detection based on morphological amoebas

    CERN Document Server

    Lee, Won Yeol; Kim, Se Yun; Lim, Jae Young; Lim, Dong Hoon

    2011-01-01

    Detecting the edges of objects within images is critical for quality image processing. We present an edge-detecting technique that uses morphological amoebas that adjust their shape based on variation in image contours. We evaluate the method both quantitatively and qualitatively for edge detection of images, and compare it to classic morphological methods. Our amoeba-based edge-detection system performed better than the classic edge detectors.

  4. Bilayer thickness mismatch controls domain size in biomimetic membranes

    Science.gov (United States)

    Heberle, Frederick A.; Petruzielo, Robin S.; Pan, Jianjun; Drazba, Paul; Kučerka, Norbert; Standaert, Robert F.; Feigenson, Gerald W.; Katsara, John

    2013-03-01

    In order to promote functionality, cells may alter the spatial organization of membrane lipids and proteins, including separation of liquid phases into distinct domains. In model membranes, domain size and morphology depend strongly on composition and temperature, but the physicochemical mechanisms controlling them are poorly understood. Theoretical work suggests a role for interfacial energy at domain boundaries, which may be driven in part by thickness mismatch between a domain and its surrounding bilayer. However, no direct evidence linking thickness mismatch to domain size in free-standing bilayers has been reported. We describe the use of Small Angle Neutron Scattering (SANS) to detect domains in simplified lipid-only models that mimic the composition of plasma membrane. We find that domain size is controlled by the degree of acyl chain unsaturation of low-melting temperature lipids, and that this size transition is correlated to changes in the thickness mismatch between coexisting liquid phases.

  5. Mismatch-mediated error prone repair at the immunoglobulin genes.

    Science.gov (United States)

    Chahwan, Richard; Edelmann, Winfried; Scharff, Matthew D; Roa, Sergio

    2011-12-01

    The generation of effective antibodies depends upon somatic hypermutation (SHM) and class-switch recombination (CSR) of antibody genes by activation induced cytidine deaminase (AID) and the subsequent recruitment of error prone base excision and mismatch repair. While AID initiates and is required for SHM, more than half of the base changes that accumulate in V regions are not due to the direct deamination of dC to dU by AID, but rather arise through the recruitment of the mismatch repair complex (MMR) to the U:G mismatch created by AID and the subsequent perversion of mismatch repair from a high fidelity process to one that is very error prone. In addition, the generation of double-strand breaks (DSBs) is essential during CSR, and the resolution of AID-generated mismatches by MMR to promote such DSBs is critical for the efficiency of the process. While a great deal has been learned about how AID and MMR cause hypermutations and DSBs, it is still unclear how the error prone aspect of these processes is largely restricted to antibody genes. The use of knockout models and mice expressing mismatch repair proteins with separation-of-function point mutations have been decisive in gaining a better understanding of the roles of each of the major MMR proteins and providing further insight into how mutation and repair are coordinated. Here, we review the cascade of MMR factors and repair signals that are diverted from their canonical error free role and hijacked by B cells to promote genetic diversification of the Ig locus. This error prone process involves AID as the inducer of enzymatically-mediated DNA mismatches, and a plethora of downstream MMR factors acting as sensors, adaptors and effectors of a complex and tightly regulated process from much of which is not yet well understood.

  6. Linear feature detection based on ridgelet

    Institute of Scientific and Technical Information of China (English)

    HOU; Biao; (侯彪); LIU; Fang; (刘芳); JIAO; Licheng; (焦李成)

    2003-01-01

    Linear feature detection is very important in image processing. The detection efficiency will directly affect the perfomance of pattern recognition and pattern classification. Based on the idea of ridgelet, this paper presents a new discrete localized ridgelet transform and a new method for detecting linear feature in anisotropic images. Experimental results prove the efficiency of the proposed method.

  7. Image Edge Detection Based on Oscillation

    Institute of Scientific and Technical Information of China (English)

    FAN Hong; WANG Zhi-jie

    2005-01-01

    A new method for image edge detection based on a pulse neural network is proposed in this paper. The network is locally connected. The external input of each neuron of the network is gray value of the corresponding pixel. The synchrony of the neuron and its neighbors is detected by detection neurons. The edge of the image can be read off at minima of the total activity of the detection neurons.

  8. Signature Based Intrusion Detection System Using SNORT

    Directory of Open Access Journals (Sweden)

    Vinod Kumar

    2012-11-01

    Full Text Available Now a day’s Intrusion Detection systems plays very important role in Network security. As the use of internet is growing rapidly the possibility of attack is also increasing in that ratio. People are using signature based IDS’s. Snort is mostly used signature based IDS because of it is open source software. World widely it is used in intrusion detection and prevention domain. Basic analysis and security engine (BASE is also used to see the alerts generated by Snort. In the paper we have implementation the signature based intrusion detection using Snort. Our work will help to novel user to understand the concept of Snort based IDS.

  9. 基于DLL的RF CMOS振荡器中电荷泵电流源失配%Current Mismatches in Charge Pumps of DLL-Based RF CMOS Oscillators

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    研究了电荷泵中电流源失配造成的假频分量,推导出了一个用于计算假频分量的公式.提供了两个数表用于直观了解参数改变时假频变化情况.最后对设计基于DLL的RF CMOS振荡器提供了一些参考方法.%A research on the spurious tones due to the current mismatch in charge pumps of DLL (Delay Locked Loop) -based RF CMOS oscillators is performed. An equation for strength evaluation of the spurious tones is derived. Two tables are provided to make it obvious to understand for the characteristics of spurious tones changing with related parameters. Some suggestions are given for the design of a DLL-based RF CMOS oscillators.

  10. An electrochemiluminescent assay for high sensitive detection of mercury (II) based on isothermal rolling circular amplification

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Xiaoming; Su Qiang [MOE Key Laboratory of Laser Life Science and Institute of Laser Life Science, College of Biophotonics, South China Normal University, Guangzhou 510631 (China); Xing Da, E-mail: xingda@scnu.edu.cn [MOE Key Laboratory of Laser Life Science and Institute of Laser Life Science, College of Biophotonics, South China Normal University, Guangzhou 510631 (China)

    2012-02-03

    Highlights: Black-Right-Pointing-Pointer Bst DNA polymerase shows specific function on the T-Hg{sup 2+}-T biomimetic structure. Black-Right-Pointing-Pointer T-Hg{sup 2+}-T can be formed in the presence of Hg{sup 2+}, thus induces the RCA reaction. Black-Right-Pointing-Pointer Sub-nanomolar sensitivity and excellent selectivity were achieved for Hg{sup 2+} detection. - Abstract: In this study, we firstly demonstrated that Bst DNA polymerase shows specific recognition and function on the T-Hg{sup 2+}-T biomimetic structure. Based on this, a novel available electrochemiluminescence (ECL) sensor for Hg{sup 2+} has been developed. In this strategy, magnet beads tagged primer was designed to complementary to the region of the circular padlock probe but with two T-T mismatches at the 3 Prime end. The mismatched primers cannot be extended by Bst DNA polymerase in the absence of Hg{sup 2+}. Stable T-Hg{sup 2+}-T can be formed in the presence of Hg{sup 2+}, thus induces the elongation and amplification reaction by DNA polymerase with a rolling circular amplification (RCA) mechanism. Subsequently, the resulted RCA products are hybridized with the tris (bipyridine) ruthenium (TBR)-tagged probes and detected by ECL platform. Current method shows a sub-nanomolar sensitivity and excellent selectivity over a spectrum of interference metal ions.

  11. High fitness costs of climate change-induced camouflage mismatch.

    Science.gov (United States)

    Zimova, Marketa; Mills, L Scott; Nowak, J Joshua

    2016-03-01

    Anthropogenic climate change has created myriad stressors that threaten to cause local extinctions if wild populations fail to adapt to novel conditions. We studied individual and population-level fitness costs of a climate change-induced stressor: camouflage mismatch in seasonally colour molting species confronting decreasing snow cover duration. Based on field measurements of radiocollared snowshoe hares, we found strong selection on coat colour molt phenology, such that animals mismatched with the colour of their background experienced weekly survival decreases up to 7%. In the absence of adaptive response, we show that these mortality costs would result in strong population-level declines by the end of the century. However, natural selection acting on wide individual variation in molt phenology might enable evolutionary adaptation to camouflage mismatch. We conclude that evolutionary rescue will be critical for hares and other colour molting species to keep up with climate change. PMID:26799459

  12. Image edge detection based on beamlet transform

    Institute of Scientific and Technical Information of China (English)

    Li Jing; Huang Peikang; Wang Xiaohu; Pan Xudong

    2009-01-01

    Combining beamlet transform with steerable filters, a new edge detection method based on line gra-dient is proposed. Compared with operators based on point local properties, the edge-detection results with this method achieve higher SNR and position accuracy, and are quite helpful for image registration, object identification, etc. Some edge-detection experiments on optical and SAR images that demonstrate the significant improvement over classical edge operators are also presented. Moreover, the template matching result based on edge information of optical reference image and SAR image also proves the validity of this method.

  13. Preliminary Studies on Base Substitutions and Repair of DNA Mismatch Damage Stimulated by Low Energy N+ Ion Beam Implantation in Escherichia coli

    Institute of Scientific and Technical Information of China (English)

    谢传晓; 郭金华; 程备久; 余增亮

    2003-01-01

    Ever since the low energy N+ ion beam has been accepted that the mutation effectsof ionizing radiation are attributed mainly to direct or indirect damage to DNA. Evidences basedon naked DNA irradiation in support of a mutation spectrum appears to be consistent, but directproof of such results in vivo are limited. Using mutS, dam and/or dcm defective Eschericha colimutator strains, an preliminary experimental system on induction of in vivo mutation spectra oflow energy N+ ion beam has been established in this study. It was observed that the mutationrates of rifampicin resistance induced by N+ implantation were quite high, ranging from 9.2 ×10-8 to 4.9 × 10-5 at the dosage of 5.2 × 1014 ions/cm2. Strains all had more than 90-fold highermutation rate than its spontaneous mutation rate determined by this method. It reveals thatbase substitutions involve in induction of mutation of low energy nitrogen ion beam implantation.The mutation rates of mutator strains were nearly 500-fold (GM2929), 400-fold (GM5864) and6-fold larger than that of AB1157. The GM2929 and GM5864 both lose the ability of repair DNAmismatch damage by virtue of both dam and dcm pathways defective (GM2929) or failing toassemble the repair complex (GM5864) respectively. It may explain the both strains had a similarhigher mutation rate than GM124 did. It indicated that DNA cytosine methylase might play animportant role in mismatch repair of DNA damage induced by N+ implantation. The furtherrelated research were also discussed.

  14. Adaptive Endpoint Detection Based on Subband Speech

    Institute of Scientific and Technical Information of China (English)

    张文军; 谢剑英

    2003-01-01

    An adaptive endpoint detection algorithm based on band energy and adaptive smoothing algorithm is described.This algorithm utilizes the capability of adaptive smoothing algorithm that intensifies the discontinuity between local areas. The band energy features are selected because of their usefulness in detecting high energy regions (in the incoming signal) and making the distinction between speech and noise. Heuristic "edge-focusing" is used to endpoint detection to save the time in iteration.

  15. Immune based computer virus detection approaches

    Institute of Scientific and Technical Information of China (English)

    TAN Ying; ZHANG Pengtao

    2013-01-01

    The computer virus is considered one of the most horrifying threats to the security of computer systems worldwide.The rapid development of evasion techniques used in virus causes the signature based computer virus detection techniques to be ineffective.Many novel computer virus detection approaches have been proposed in the past to cope with the ineffectiveness,mainly classified into three categories:static,dynamic and heuristics techniques.As the natural similarities between the biological immune system (BIS),computer security system (CSS),and the artificial immune system (AIS) were all developed as a new prototype in the community of anti-virus research.The immune mechanisms in the BIS provide the opportunities to construct computer virus detection models that are robust and adaptive with the ability to detect unseen viruses.In this paper,a variety of classic computer virus detection approaches were introduced and reviewed based on the background knowledge of the computer virus history.Next,a variety of immune based computer virus detection approaches were also discussed in detail.Promising experimental results suggest that the immune based computer virus detection approaches were able to detect new variants and unseen viruses at lower false positive rates,which have paved a new way for the anti-virus research.

  16. Photonic crystal fiber based antibody detection

    DEFF Research Database (Denmark)

    Duval, A; Lhoutellier, M; Jensen, J B;

    2004-01-01

    An original approach for detecting labeled antibodies based on strong penetration photonic crystal fibers is introduced. The target antibody is immobilized inside the air-holes of a photonic crystal fiber and the detection is realized by the means of evanescent-wave fluorescence spectroscopy...... and the use of a transversal illumination setup....

  17. Collaborative regression-based anatomical landmark detection

    Science.gov (United States)

    Gao, Yaozong; Shen, Dinggang

    2015-12-01

    Anatomical landmark detection plays an important role in medical image analysis, e.g. for registration, segmentation and quantitative analysis. Among the various existing methods for landmark detection, regression-based methods have recently attracted much attention due to their robustness and efficiency. In these methods, landmarks are localised through voting from all image voxels, which is completely different from the classification-based methods that use voxel-wise classification to detect landmarks. Despite their robustness, the accuracy of regression-based landmark detection methods is often limited due to (1) the inclusion of uninformative image voxels in the voting procedure, and (2) the lack of effective ways to incorporate inter-landmark spatial dependency into the detection step. In this paper, we propose a collaborative landmark detection framework to address these limitations. The concept of collaboration is reflected in two aspects. (1) Multi-resolution collaboration. A multi-resolution strategy is proposed to hierarchically localise landmarks by gradually excluding uninformative votes from faraway voxels. Moreover, for informative voxels near the landmark, a spherical sampling strategy is also designed at the training stage to improve their prediction accuracy. (2) Inter-landmark collaboration. A confidence-based landmark detection strategy is proposed to improve the detection accuracy of ‘difficult-to-detect’ landmarks by using spatial guidance from ‘easy-to-detect’ landmarks. To evaluate our method, we conducted experiments extensively on three datasets for detecting prostate landmarks and head & neck landmarks in computed tomography images, and also dental landmarks in cone beam computed tomography images. The results show the effectiveness of our collaborative landmark detection framework in improving landmark detection accuracy, compared to other state-of-the-art methods.

  18. Ontology-Based Textual Emotion Detection

    OpenAIRE

    Mohamed Haggag; Samar Fathy; Nahla Elhaggar

    2015-01-01

    Emotion Detection from text is a very important area of natural language processing. This paper shows a new method for emotion detection from text which depends on ontology. This method is depending on ontology extraction from the input sentence by using a triplet extraction algorithm by the OpenNLP parser, then make an ontology matching with the ontology base that we created by similarity and word sense disambiguation. This ontology base consists of ontologies and the emotion label related t...

  19. Biotoxin Detection Using Cell-Based Sensors

    OpenAIRE

    Pratik Banerjee; Spyridon Kintzios; Balabhaskar Prabhakarpandian

    2013-01-01

    Cell-based biosensors (CBBs) utilize the principles of cell-based assays (CBAs) by employing living cells for detection of different analytes from environment, food, clinical, or other sources. For toxin detection, CBBs are emerging as unique alternatives to other analytical methods. The main advantage of using CBBs for probing biotoxins and toxic agents is that CBBs respond to the toxic exposures in the manner related to actual physiologic responses of the vulnerable subjects. The results ob...

  20. Power Consumption Based Android Malware Detection

    Directory of Open Access Journals (Sweden)

    Hongyu Yang

    2016-01-01

    Full Text Available In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. Firstly, the mobile battery consumption status information was obtained, and the Gaussian mixture model (GMM was built by using Mel frequency cepstral coefficients (MFCC. Then, the GMM was used to analyze power consumption; malicious software can be classified and detected through classification processing. Experiment results demonstrate that the function of an application and its power consumption have a close relationship, and our method can detect some typical malicious application software accurately.

  1. Mode-mismatched confocal thermal-lens microscope with collimated probe beam

    Energy Technology Data Exchange (ETDEWEB)

    Cabrera, Humberto, E-mail: hcabrera@ictp.it [SPIE-ICTP Anchor Research Laboratory, International Centre for Theoretical Physics (ICTP), Strada Costiera 11, Trieste (Italy); Centro Multidisciplinartio de Ciencias, Instituto Venezolano de Investigaciones Científicas (IVIC), Mérida 5101 (Venezuela, Bolivarian Republic of); Korte, Dorota; Franko, Mladen [Laboratory for Environmental Research, University of Nova Gorica, Vipavska 13, 5000 Nova Gorica (Slovenia)

    2015-05-15

    We report a thermal lens microscope (TLM) based on an optimized mode-mismatched configuration. It takes advantage of the coaxial counter propagating tightly focused excitation and collimated probe beams, instead of both focused at the sample, as it is in currently known TLM setups. A simple mathematical model that takes into account the main features of the instrument is presented. The confocal detection scheme and the introduction of highly collimated probe beam allow enhancing the versatility, limit of detection (LOD), and sensitivity of the instrument. The theory is experimentally verified measuring ethanol’s absorption coefficient at 532.8 nm. Additionally, the presented technique is applied for detection of ultra-trace amounts of Cr(III) in liquid solution. The achieved LOD is 1.3 ppb, which represents 20-fold enhancement compared to transmission mode spectrometric techniques and a 7.5-fold improvement compared to previously reported methods for Cr(III) based on thermal lens effect.

  2. Grey-theory based intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    Qin Boping; Zhou Xianwei; Yang Jun; Song Cunyi

    2006-01-01

    To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling.With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.

  3. Metamer mismatching in practice versus theory.

    Science.gov (United States)

    Zhang, Xiandou; Funt, Brian; Mirzaei, Hamidreza

    2016-03-01

    Metamer mismatching (the phenomenon that two objects matching in color under one illuminant may not match under a different illuminant) potentially has important consequences for color perception. Logvinenko et al. [PLoS ONE10, e0135029 (2015)] show that in theory the extent of metamer mismatching can be very significant. This paper examines metamer mismatching in practice by computing the volumes of the empirical metamer mismatch bodies and comparing them to the volumes of the theoretical mismatch bodies. A set of more than 25 million unique reflectance spectra is assembled using datasets from several sources. For a given color signal (e.g., CIE XYZ) recorded under a given first illuminant, its empirical metamer mismatch body for a change to a second illuminant is computed as follows: the reflectances having the same color signal when lit by the first illuminant (i.e., reflect metameric light) are computationally relit by the second illuminant, and the convex hull of the resulting color signals then defines the empirical metamer mismatch body. The volume of these bodies is shown to vary systematically with Munsell value and chroma. The empirical mismatch bodies are compared to the theoretical mismatch bodies computed using the algorithm of Logvinenko et al. [IEEE Trans. Image Process.23, 34 (2014)]. There are three key findings: (1) the empirical bodies are found to be substantially smaller than the theoretical ones; (2) the sizes of both the empirical and theoretical bodies show a systematic variation with Munsell value and chroma; and (3) applied to the problem of color-signal prediction, the centroid of the empirical metamer mismatch body is shown to be a better predictor of what a given color signal might become under a specified illuminant than state-of-the-art methods. PMID:26974929

  4. Single-stranded DNA detection by solvent-induced assemblies of a metallo-peptide-based complex

    Science.gov (United States)

    Das, Priyadip; Reches, Meital

    2016-05-01

    DNA detection is highly important for the sensitive sensing of different pathogenic bacteria and viruses. The major challenge is to create a sensor that can selectively detect very small concentrations of DNA without the need for amplification or complicated equipment. Different technologies such as optical, electrochemical and microgravimetric approaches can detect DNA fragments. Here we show, for the first time, the use of self-assembled nanostructures generated by a metallo-peptide as an optical sensing platform for DNA detection. The system can selectively detect single stranded DNA fragments by fluorescence measurements as it can discriminate even one base mismatch and can perform in the presence of other interfering proteins. This system may be useful in lab-on-a-chip applications.DNA detection is highly important for the sensitive sensing of different pathogenic bacteria and viruses. The major challenge is to create a sensor that can selectively detect very small concentrations of DNA without the need for amplification or complicated equipment. Different technologies such as optical, electrochemical and microgravimetric approaches can detect DNA fragments. Here we show, for the first time, the use of self-assembled nanostructures generated by a metallo-peptide as an optical sensing platform for DNA detection. The system can selectively detect single stranded DNA fragments by fluorescence measurements as it can discriminate even one base mismatch and can perform in the presence of other interfering proteins. This system may be useful in lab-on-a-chip applications. Electronic supplementary information (ESI) available: Peptide and receptor synthesis, characterization of the final and intermediate products, experimental details and additional figures including SEM, TEM, DLS, XRD, UV analysis and AFM topographic analysis. See DOI: 10.1039/c5nr07714a

  5. Discriminating DNA mismatches by electrochemical and gravimetric techniques.

    Science.gov (United States)

    Mazouz, Zouhour; Fourati, Najla; Zerrouki, Chouki; Ommezine, Asma; Rebhi, Lamia; Yaakoubi, Nourdin; Kalfat, Rafik; Othmane, Ali

    2013-10-15

    A silicon nitride functionalized electrode and a 104 MHz lithium tantalate (LiTaO₃) surface acoustic wave (SAW) sensor have been used to investigate target-probe recognition processes. Electrochemical and gravimetric measurements have been considered to monitor hybridization of single base mismatch (SBM) in synthetic oligonucleotides and single-nucleotide polymorphisms ApoE in real clinical genotypes. Obvious discrimination of SBM in nucleotides has been shown by both gravimetric and electrochemical techniques, without labeling nor amplification. Investigations on mismatches nature and position have also been considered. For guanine-adenine (GA), guanine-thymine (GT) and guanine-guanine (GG) mismatches, the sensors responses present a dependence upon positions. Considering the capacitance variations and hybridization rates, results showed that gravimetric transduction is more sensitive than electrochemical one. Moreover, the highest value of GT hybridization rate (in the middle position) was found in accordance with the nearest-neighbor model, where the considered configuration appears as the most thermodynamically stable. For the real samples, where the electrochemical transduction, by combining capacitance and flat-band potential measurements, were found more sensitive, the results show that the realized sensor permits an unambiguous discrimination of recognition between fully complementary, non-complementary and single base mismatched targets, and even between the combination of differently matched strands.

  6. Web Based Cross Language Plagiarism Detection

    CERN Document Server

    Kent, Chow Kok

    2009-01-01

    As the Internet help us cross language and cultural border by providing different types of translation tools, cross language plagiarism, also known as translation plagiarism are bound to arise. Especially among the academic works, such issue will definitely affect the student's works including the quality of their assignments and paper works. In this paper, we propose a new approach in detecting cross language plagiarism. Our web based cross language plagiarism detection system is specially tuned to detect translation plagiarism by implementing different techniques and tools to assist the detection process. Google Translate API is used as our translation tool and Google Search API, which is used in our information retrieval process. Our system is also integrated with the fingerprint matching technique, which is a widely used plagiarism detection technique. In general, our proposed system is started by translating the input documents from Malay to English, followed by removal of stop words and stemming words, ...

  7. Dictionary based Approach to Edge Detection

    CERN Document Server

    Chandra, Nitish

    2015-01-01

    Edge detection is a very essential part of image processing, as quality and accuracy of detection determines the success of further processing. We have developed a new self learning technique for edge detection using dictionary comprised of eigenfilters constructed using features of the input image. The dictionary based method eliminates the need of pre or post processing of the image and accounts for noise, blurriness, class of image and variation of illumination during the detection process itself. Since, this method depends on the characteristics of the image, the new technique can detect edges more accurately and capture greater detail than existing algorithms such as Sobel, Prewitt Laplacian of Gaussian, Canny method etc which use generic filters and operators. We have demonstrated its application on various classes of images such as text, face, barcodes, traffic and cell images. An application of this technique to cell counting in a microscopic image is also presented.

  8. Recent advances in biosensor based endotoxin detection.

    Science.gov (United States)

    Das, A P; Kumar, P S; Swain, S

    2014-01-15

    Endotoxins also referred to as pyrogens are chemically lipopolysaccharides habitually found in food, environment and clinical products of bacterial origin and are unavoidable ubiquitous microbiological contaminants. Pernicious issues of its contamination result in high mortality and severe morbidities. Standard traditional techniques are slow and cumbersome, highlighting the pressing need for evoking agile endotoxin detection system. The early and prompt detection of endotoxin assumes prime importance in health care, pharmacological and biomedical sectors. The unparalleled recognition abilities of LAL biosensors perched with remarkable sensitivity, high stability and reproducibility have bestowed it with persistent reliability and their possible fabrication for commercial applicability. This review paper entails an overview of various trends in current techniques available and other possible alternatives in biosensor based endotoxin detection together with its classification, epidemiological aspects, thrust areas demanding endotoxin control, commercially available detection sensors and a revolutionary unprecedented approach narrating the influence of omics for endotoxin detection. PMID:23934306

  9. Mismatching Perspectives and Pacific Transculturality

    Directory of Open Access Journals (Sweden)

    Anne Holden Rønning

    2013-01-01

    Full Text Available Increased critical consciousness and awareness of interculturality in a global and glocal context at the beginning of the twenty-first century has increasingly used the concept of transculturation when discussing modernities. Politically transculturation can be used to describe processes of negotiation in contemporary society that lead to social awareness and solidarity, as well as ensuring the continuity of societies. The fusing of cultural forms leads to a mismatching of perspectives, hence some critics have preferred to use the terms translation and/or transliteracy to describe this concept. Transculturation is related to the “normal processes of artistic borrowing and influence, by which any culture makes part of its contribution to the conversation of mankind,” as Les Murray maintained, and “it engages multiple lines of difference simultaneously” with overlapping boundaries (Rogers 491. Referring to various authors and linking it to cultural appropriation and border crossings, this article examines how the narrative expression of Both Sides of the Moon, to cite the title of Alan Duff’s book, is a key feature of Pacific writing, in an area where centuries of migration from near and far have exposed different cultures to each other on social, political, linguistic and aesthetic levels. These ‘contact zones’, to use Mary Pratt’s words, provide the reader with constantly moving translated identities, cultural hybridity and a use of language that has a highly local significance in a global context.

  10. Web Based Cross Language Plagiarism Detection

    OpenAIRE

    Kent, Chow Kok; Salim, Naomie

    2009-01-01

    As the Internet help us cross language and cultural border by providing different types of translation tools, cross language plagiarism, also known as translation plagiarism are bound to arise. Especially among the academic works, such issue will definitely affect the student's works including the quality of their assignments and paper works. In this paper, we propose a new approach in detecting cross language plagiarism. Our web based cross language plagiarism detection system is specially t...

  11. Verification-based Software-fault Detection

    OpenAIRE

    Gladisch, Christoph David

    2011-01-01

    Software is used in many safety- and security-critical systems. Software development is, however, an error-prone task. In this dissertation new techniques for the detection of software faults (or software "bugs") are described which are based on a formal deductive verification technology. The described techniques take advantage of information obtained during verification and combine verification technology with deductive fault detection and test generation in a very unified way.

  12. Plagiarism Detection Based on SCAM Algorithm

    DEFF Research Database (Denmark)

    Anzelmi, Daniele; Carlone, Domenico; Rizzello, Fabio;

    2011-01-01

    Plagiarism is a complex problem and considered one of the biggest in publishing of scientific, engineering and other types of documents. Plagiarism has also increased with the widespread use of the Internet as large amount of digital data is available. Plagiarism is not just direct copy but also...... paraphrasing, rewording, adapting parts, missing references or wrong citations. This makes the problem more difficult to handle adequately. Plagiarism detection techniques are applied by making a distinction between natural and programming languages. Our proposed detection process is based on natural language...... document. Our plagiarism detection system, like many Information Retrieval systems, is evaluated with metrics of precision and recall....

  13. Spatio-activity based object detection

    CERN Document Server

    Springett, Jarrad

    2008-01-01

    We present the SAMMI lightweight object detection method which has a high level of accuracy and robustness, and which is able to operate in an environment with a large number of cameras. Background modeling is based on DCT coefficients provided by cameras. Foreground detection uses similarity in temporal characteristics of adjacent blocks of pixels, which is a computationally inexpensive way to make use of object coherence. Scene model updating uses the approximated median method for improved performance. Evaluation at pixel level and application level shows that SAMMI object detection performs better and faster than the conventional Mixture of Gaussians method.

  14. Oblique effect in visual mismatch negativity

    Directory of Open Access Journals (Sweden)

    Endre eTakács

    2013-09-01

    Full Text Available We investigated whether visual orientation anisotropies (known as oblique effect exist in non-attended visual changes using event-related potentials (ERP. We recorded visual mismatch negativity (vMMN which signals violation of sequential regularities. In the visual periphery unattended, task-irrelevant Gábor patches were displayed in an oddball sequence while subjects performed a tracking task in the central field. A moderate change (50° in the orientation of stimuli revealed no consistent change-related components. However we found orientation-related differences around 170 ms in occipito-temporal areas in the amplitude of the ERPs evoked by standard stimuli. In a supplementary experiment we determined the amount of orientation difference that is needed for change detection in an active, attended paradigm. Results exhibited the classical oblique effect; subjects detected 10° deviations from cardinal directions, while threshold from oblique directions was 17°. These results provide evidence that perception of change could be accomplished at significantly smaller thresholds, than what elicits vMMN. In Experiment2 we increased the orientation change to 90°. Deviant-minus-standard difference was negative in occipito-parietal areas, between 120-200 ms after stimulus onset. VMMNs to changes from cardinal angles were larger and more sustained than vMMNs evoked by changes from oblique angles. Changes from cardinal orientations represent a more detectable signal for the automatic change detection system than changes from oblique angles, thus increased vMMN to these larger deviances might be considered a variant of the magnitude of deviance effect rarely observed in vMMN studies.

  15. Speedy Object Detection Based on Shape

    Directory of Open Access Journals (Sweden)

    Y. Jayanta Singh

    2013-07-01

    Full Text Available This study is a part of design of an audio system for in-house object detection system for visually impaired,low vision personnel by birth or by an accident ordue to old age. The input of the system will be scene andoutput as audio. Alert facility is provided based on severity levels of the objects (snake, broke glass etc andalso during difficulties. The study proposed techniques to provide speedy detection of objects based onshapes and its scale. Features are extraction to have minimum spaces using dynamic scaling. From ascene, clusters of objects are formed based on thescale and shape. Searching is performed among theclusters initially based on the shape, scale, meancluster value and index of object(s. The minimumoperation to detect the possible shape of the object is performed. In case the object does not have alikelymatching shape, scale etc, then the several operations required for an object detection will not perform;instead, it will declared as a new object. In suchway, this study finds a speedy way of detecting objects.

  16. SPEEDY OBJECT DETECTION BASED ON SHAPE

    Directory of Open Access Journals (Sweden)

    Y. Jayanta Singh

    2013-06-01

    Full Text Available This study is a part of design of an audio system for in-house object detection system for visually impaired, low vision personnel by birth or by an accident or due to old age. The input of the system will be scene and output as audio. Alert facility is provided based on severity levels of the objects (snake, broke glass etc and also during difficulties. The study proposed techniques to provide speedy detection of objects based on shapes and its scale. Features are extraction to have minimum spaces using dynamic scaling. From a scene, clusters of objects are formed based on the scale and shape. Searching is performed among the clusters initially based on the shape, scale, mean cluster value and index of object(s. The minimum operation to detect the possible shape of the object is performed. In case the object does not have a likely matching shape, scale etc, then the several operations required for an object detection will not perform; instead, it will declared as a new object. In such way, this study finds a speedy way of detecting objects.

  17. DNA Mismatch Repair and Oxidative DNA Damage: Implications for Cancer Biology and Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Bridge, Gemma; Rashid, Sukaina; Martin, Sarah A., E-mail: sarah.martin@qmul.ac.uk [Centre for Molecular Oncology, Barts Cancer Institute, Queen Mary University of London, Charterhouse Square, London EC1M 6BQ (United Kingdom)

    2014-08-05

    Many components of the cell, including lipids, proteins and both nuclear and mitochondrial DNA, are vulnerable to deleterious modifications caused by reactive oxygen species. If not repaired, oxidative DNA damage can lead to disease-causing mutations, such as in cancer. Base excision repair and nucleotide excision repair are the two DNA repair pathways believed to orchestrate the removal of oxidative lesions. However, recent findings suggest that the mismatch repair pathway may also be important for the response to oxidative DNA damage. This is particularly relevant in cancer where mismatch repair genes are frequently mutated or epigenetically silenced. In this review we explore how the regulation of oxidative DNA damage by mismatch repair proteins may impact on carcinogenesis. We discuss recent studies that identify potential new treatments for mismatch repair deficient tumours, which exploit this non-canonical role of mismatch repair using synthetic lethal targeting.

  18. DNA Mismatch Repair and Oxidative DNA Damage: Implications for Cancer Biology and Treatment

    International Nuclear Information System (INIS)

    Many components of the cell, including lipids, proteins and both nuclear and mitochondrial DNA, are vulnerable to deleterious modifications caused by reactive oxygen species. If not repaired, oxidative DNA damage can lead to disease-causing mutations, such as in cancer. Base excision repair and nucleotide excision repair are the two DNA repair pathways believed to orchestrate the removal of oxidative lesions. However, recent findings suggest that the mismatch repair pathway may also be important for the response to oxidative DNA damage. This is particularly relevant in cancer where mismatch repair genes are frequently mutated or epigenetically silenced. In this review we explore how the regulation of oxidative DNA damage by mismatch repair proteins may impact on carcinogenesis. We discuss recent studies that identify potential new treatments for mismatch repair deficient tumours, which exploit this non-canonical role of mismatch repair using synthetic lethal targeting

  19. Compensation of IQ mismatch in optical PDM-OFDM coherent receivers

    Science.gov (United States)

    Chung, Hwan Seok; Chang, Sun Hyok; Kim, Kwangjoon

    2010-10-01

    The performance enhancements based on Gram-Schmidt orthogonalization procedure (GSOP) for compensating IQ mismatch in coherent optical orthogonal frequency division multiplexing (CO-OFDM) systems are investigated. We analytically explore IQ mismatch in optical OFDM systems and investigate the impacts of phase and amplitude IQ mismatch on required optical signal-to-noise ratio (OSNR) for the different values of data mapping and polarization multiplexing. The impacts of analog-to-digital converter (ADC) resolution and the number of samples in GSOP are also evaluated. The results show that the GSOP operation efficiently compensate IQ mismatch induced performance degradations regardless of the amount of IQ phase mismatch, density of data mapping, and polarization multiplexing.

  20. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  1. Mismatch repair and treatment resistance in ovarian cancer

    International Nuclear Information System (INIS)

    The treatment of ovarian cancer is hindered by intrinsic or acquired resistance to platinum-based chemotherapy. The aim of this study is to determine the frequency of mismatch repair (MMR) inactivation in ovarian cancer and its association with resistance to platinum-based chemotherapy. We determined, microsatellite instability (MSI) as a marker for MMR inactivation (analysis of BAT25 and BAT26), MLH1 promoter methylation status (methylation specific PCR on bisulfite treated DNA) and mRNA expression of MLH1, MSH2, MSH3, MSH6 and PMS2 (quantitative RT-PCR) in 75 ovarian carcinomas and eight ovarian cancer cell lines MSI was detected in three of the eight cell lines i.e. A2780 (no MLH1 mRNA expression due to promoter methylation), SKOV3 (no MLH1 mRNA expression) and 2774 (no altered expression of MMR genes). Overall, there was no association between cisplatin response and MMR status in these eight cell lines. Seven of the 75 ovarian carcinomas showed MLH1 promoter methylation, however, none of these showed MSI. Forty-six of these patients received platinum-based chemotherapy (11 non-responders, 34 responders, one unknown response). The resistance seen in the eleven non-responders was not related to MSI and therefore also not to MMR inactivation. No MMR inactivation was detected in 75 ovarian carcinoma specimens and no association was seen between MMR inactivation and resistance in the ovarian cancer cell lines as well as the ovarian carcinomas. In the discussion, the results were compared to that of twenty similar studies in the literature including in total 1315 ovarian cancer patients. Although no association between response and MMR status was seen in the primary tumor the possible role of MMR inactivation in acquired resistance deserves further investigation

  2. Parametric Adaptive Radar Detector with Enhanced Mismatched Signals Rejection Capabilities

    Directory of Open Access Journals (Sweden)

    Liu Bin

    2010-01-01

    Full Text Available We consider the problem of adaptive signal detection in the presence of Gaussian noise with unknown covariance matrix. We propose a parametric radar detector by introducing a design parameter to trade off the target sensitivity with sidelobes energy rejection. The resulting detector merges the statistics of Kelly's GLRT and of the Rao test and so covers Kelly's GLRT and the Rao test as special cases. Both invariance properties and constant false alarm rate (CFAR behavior for this detector are studied. At the analysis stage, the performance of the new receiver is assessed and compared with several traditional adaptive detectors. The results highlight better rejection capabilities of this proposed detector for mismatched signals. Further, we develop two two-stage detectors, one of which consists of an adaptive matched filter (AMF followed by the aforementioned detector, and the other is obtained by cascading a GLRT-based Subspace Detector (SD and the proposed adaptive detector. We show that the former two-stage detector outperforms traditional two-stage detectors in terms of selectivity, and the latter yields more robustness.

  3. Seizure detection algorithms based on EMG signals

    DEFF Research Database (Denmark)

    Conradsen, Isa

    Background: the currently used non-invasive seizure detection methods are not reliable. Muscle fibers are directly connected to the nerves, whereby electric signals are generated during activity. Therefore, an alarm system on electromyography (EMG) signals is a theoretical possibility. Objective......: to show whether medical signal processing of EMG data is feasible for detection of epileptic seizures. Methods: EMG signals during generalised seizures were recorded from 3 patients (with 20 seizures in total). Two possible medical signal processing algorithms were tested. The first algorithm was based...... the frequency-based algorithm was efficient for detecting the seizures in the third patient. Conclusion: Our results suggest that EMG signals could be used to develop an automatic seizuredetection system. However, different patients might require different types of algorithms /approaches....

  4. SKILLS MISMATCH OF THE YOUNG PEOPLE AT THE EUROPEAN LEVEL

    Directory of Open Access Journals (Sweden)

    Hatos Roxana

    2015-07-01

    Full Text Available Transition from school to work is a main issue with many fields of study. Studies on transition from school to work, have highlight the importance of two categories of factors at the level of the individual formal proceedings which may affect how easy it is to graduate to integrate into the labor market: 1 so far as the educational systems are transmitting specific competences as compared with those general and 2 so far as there are direct links between employers and the education system. In this way, are reduced the costs of selection and allocation for employers. A poor articulation between educational institutions and the labor market produce a high level of unmatched competences of assimilated by formal education and competencies required of the labor market (skill mismatch (Parodi et al., 2012. The surveys with European employers reflect particular difficulties that they are experiencing in employment vacancies. Investigation on the European companies in the spring of 2013 found that 40% of the firms in the EU have difficulty in finding employees with suitable qualification (CEDEFOP-European Center for the Development of the Vocational Training, 2014. Skills mismatch is a generic term that refers to various types of imbalances between skills and competences offered and those required in the labor market. Concept has become one intensely discussed and submitted to measurement in international research on the background concerns the under-utilization human resource. Numerous opinion polls with employers come to the same unexpected conclusion - that despite high unemployment many posts can't find occupants satisfactorily prepared and identify the causes: most of them criticized the lack of skills of the candidates or the absence of skills specific to the workplace. Based on the latest studies on international databases have built a set of questions that, through secondary analysis, we tried to find answers. Questions that we try to give answer

  5. Wavelength mismatch effect in electromagnetically induced absorption

    OpenAIRE

    Bharti, Vineet; Wasan, Ajay; Natarajan, Vasant

    2016-01-01

    We present a theoretical investigation of the phenomenon of electromagnetically induced absorption (EIA) in a 4-level system consisting of vee and ladder subsystems. The four levels are coupled using one weak probe field, and two strong control fields. We consider an experimental realization using energy levels of Rb. This necessitates dealing with different conditions of wavelength mismatch---near-perfect match where all three wavelengths are approximately equal; partial mismatch where the w...

  6. Measurement errors in multifrequency bioelectrical impedance analyzers with and without impedance electrode mismatch

    International Nuclear Information System (INIS)

    The purpose of this study is to compare measurement errors in two commercially available multi-frequency bioimpedance analyzers, a Xitron 4000B and an ImpediMed SFB7, including electrode impedance mismatch. The comparison was made using resistive electrical models and in ten human volunteers. We used three different electrical models simulating three different body segments: the right-side, leg and thorax. In the electrical models, we tested the effect of the capacitive coupling of the patient to ground and the skin–electrode impedance mismatch. Results showed that both sets of equipment are optimized for right-side measurements and for moderate skin–electrode impedance mismatch. In right-side measurements with mismatch electrode, 4000B is more accurate than SFB7. When an electrode impedance mismatch was simulated, errors increased in both bioimpedance analyzers and the effect of the mismatch in the voltage detection leads was greater than that in current injection leads. For segments with lower impedance as the leg and thorax, SFB7 is more accurate than 4000B and also shows less dependence on electrode mismatch. In both devices, impedance measurements were not significantly affected (p > 0.05) by the capacitive coupling to ground

  7. Community detection based on network communicability

    Science.gov (United States)

    Estrada, Ernesto

    2011-03-01

    We propose a new method for detecting communities based on the concept of communicability between nodes in a complex network. This method, designated as N-ComBa K-means, uses a normalized version of the adjacency matrix to build the communicability matrix and then applies K-means clustering to find the communities in a graph. We analyze how this method performs for some pathological cases found in the analysis of the detection limit of communities and propose some possible solutions on the basis of the analysis of the ratio of local to global densities in graphs. We use four different quality criteria for detecting the best clustering and compare the new approach with the Girvan-Newman algorithm for the analysis of two "classical" networks: karate club and bottlenose dolphins. Finally, we analyze the more challenging case of homogeneous networks with community structure, for which the Girvan-Newman completely fails in detecting any clustering. The N-ComBa K-means approach performs very well in these situations and we applied it to detect the community structure in an international trade network of miscellaneous manufactures of metal having these characteristics. Some final remarks about the general philosophy of community detection are also discussed.

  8. Microwave-Based Biosensor for Glucose Detection

    Science.gov (United States)

    Salim, N. S. M.; Khalid, K.; Yusof, N. A.

    2010-07-01

    In this project, microwave-based biosensor for glucose detection has been studied. The study is based on the dielectric properties changes at microwave frequency for glucose-enzyme reaction. Glucose interaction with glucose oxidase (GOD) produced gluconic acid and hydrogen peroxide. The reaction of the glucose solutions with an enzyme was carried out in 1:3 of glucose and enzyme respectively. The measurements were done using the Open Ended Coaxial Probe (OECP) coupled with computer controlled software automated network analyzer (ANA) with frequency range from 200MHz to 20GHz at room temperature (25 °C). The differences of enzyme and glucose-enzyme reaction were calculated and plotted. In the microwave interaction with the glucose-enzyme reaction, ionic conduction and dipole molecules was detected at 0.99GHz and 16.44GHz respectively based on changes of dielectric loss factor.

  9. Differential Search Algorithm Based Edge Detection

    Science.gov (United States)

    Gunen, M. A.; Civicioglu, P.; Beşdok, E.

    2016-06-01

    In this paper, a new method has been presented for the extraction of edge information by using Differential Search Optimization Algorithm. The proposed method is based on using a new heuristic image thresholding method for edge detection. The success of the proposed method has been examined on fusion of two remote sensed images. The applicability of the proposed method on edge detection and image fusion problems have been analysed in detail and the empirical results exposed that the proposed method is useful for solving the mentioned problems.

  10. Sensitive detection of enteropathogenic E. coli using a bfpA gene-based electrochemical sensor

    International Nuclear Information System (INIS)

    We have developed a sensitive assay for enteropathogenic E. coli (EPEC) by integrating DNA extraction, specific polymerase chain reaction (PCR) and DNA detection using an electrode modified with the bundle-forming pilus (bfpA) structural gene. The PCR amplified products are captured on the electrode and hybridized with biotinylated detection probes to form a sandwich hybrid containing two biotinylated detection probes. The sandwich hybridization structure significantly combined the numerous streptavidin alkaline phosphatase on the electrode by biotin-streptavidin connectors. Electrochemical readout is based on dual signal amplification by both the sandwich hybridization structure and the enzyme. The electrode can satisfactorily discriminate complementary and mismatched oligonucleotides. Under optimal conditions, synthetic target DNA can be detected in the 1 pM to 10 nM concentration range, with a detection limit of 0.3 pM. EPEC can be quantified in the 10 to 107 CFU mL−1 levels within 3.5 h. The method also is believed to present a powerful platform for the screening of pathogenic microorganisms in clinical diagnostics, food safety and environmental monitoring. (author)

  11. A Prior-based Transfer Learning Method for the Phishing Detection

    Directory of Open Access Journals (Sweden)

    Jianyi Zhang

    2012-08-01

    Full Text Available In this paper, we introduce a prior-based transfer  learning method for our statistical machine learning  classifier which based on the logistic regression to detect the  phishing sites that relies on our selected features of the  URLs. Because of the mismatched distributions of the  features in different phishing domains, we employ multiple  models for different regions. Since it is impossible for us to  collect enough data from a new region to rebuild the  detection model, we adjust the existing models by the  transfer learning algorithm to solve these problems. The  proposed algorithm was evaluated on a real-world task of  detecting the phishing websites. After a number of  experiments, our proposed transfer learning algorithm  achieves more than 97% accuracy. The result demonstrates  the use of this algorithm in the anti-phishing scenario is  feasible and ready for our large scale detection engine. 

  12. Nanomaterials based biosensors for cancer biomarker detection

    Science.gov (United States)

    Malhotra, Bansi D.; Kumar, Saurabh; Mouli Pandey, Chandra

    2016-04-01

    Biosensors have enormous potential to contribute to the evolution of new molecular diagnostic techniques for patients suffering with cancerous diseases. A major obstacle preventing faster development of biosensors pertains to the fact that cancer is a highly complex set of diseases. The oncologists currently rely on a few biomarkers and histological characterization of tumors. Some of the signatures include epigenetic and genetic markers, protein profiles, changes in gene expression, and post-translational modifications of proteins. These molecular signatures offer new opportunities for development of biosensors for cancer detection. In this context, conducting paper has recently been found to play an important role towards the fabrication of a biosensor for cancer biomarker detection. In this paper we will focus on results of some of the recent studies obtained in our laboratories relating to fabrication and application of nanomaterial modified paper based biosensors for cancer biomarker detection.

  13. DATA-MINING BASED FAULT DETECTION

    Institute of Scientific and Technical Information of China (English)

    Ma Hongguang; Han Chongzhao; Wang Guohua; Xu Jianfeng; Zhu Xiaofei

    2005-01-01

    This paper presents a fault-detection method based on the phase space reconstruction and data mining approaches for the complex electronic system. The approach for the phase space reconstruction of chaotic time series is a combination algorithm of multiple autocorrelation and Γ-test, by which the quasi-optimal embedding dimension and time delay can be obtained.The data mining algorithm, which calculates the radius of gyration of unit-mass point around the centre of mass in the phase space, can distinguish the fault parameter from the chaotic time series output by the tested system. The experimental results depict that this fault detection method can correctly detect the fault phenomena of electronic system.

  14. A Web Based Cardiovascular Disease Detection System.

    Science.gov (United States)

    Alshraideh, Hussam; Otoom, Mwaffaq; Al-Araida, Aseel; Bawaneh, Haneen; Bravo, José

    2015-10-01

    Cardiovascular Disease (CVD) is one of the most catastrophic and life threatening health issue nowadays. Early detection of CVD is an important solution to reduce its devastating effects on health. In this paper, an efficient CVD detection algorithm is identified. The algorithm uses patient demographic data as inputs, along with several ECG signal features extracted automatically through signal processing techniques. Cross-validation results show a 98.29 % accuracy for the decision tree classification algorithm. The algorithm has been integrated into a web based system that can be used at anytime by patients to check their heart health status. At one end of the system is the ECG sensor attached to the patient's body, while at the other end is the detection algorithm. Communication between the two ends is done through an Android application. PMID:26293754

  15. Ionizing particle detection based on phononic crystals

    Energy Technology Data Exchange (ETDEWEB)

    Aly, Arafa H., E-mail: arafa16@yahoo.com, E-mail: arafa.hussien@science.bsu.edu.eg; Mehaney, Ahmed; Eissa, Mostafa F. [Physics Department, Faculty of Science, Beni-Suef University, Beni-Suef (Egypt)

    2015-08-14

    Most conventional radiation detectors are based on electronic or photon collections. In this work, we introduce a new and novel type of ionizing particle detector based on phonon collection. Helium ion radiation treats tumors with better precision. There are nine known isotopes of helium, but only helium-3 and helium-4 are stable. Helium-4 is formed in fusion reactor technology and in enormous quantities during Big Bang nucleo-synthesis. In this study, we introduce a technique for helium-4 ion detection (sensing) based on the innovative properties of the new composite materials known as phononic crystals (PnCs). PnCs can provide an easy and cheap technique for ion detection compared with conventional methods. PnC structures commonly consist of a periodic array of two or more materials with different elastic properties. The two materials are polymethyl-methacrylate and polyethylene polymers. The calculations showed that the energies lost to target phonons are maximized at 1 keV helium-4 ion energy. There is a correlation between the total phonon energies and the transmittance of PnC structures. The maximum transmission for phonons due to the passage of helium-4 ions was found in the case of making polyethylene as a first layer in the PnC structure. Therefore, the concept of ion detection based on PnC structure is achievable.

  16. Ionizing particle detection based on phononic crystals

    Science.gov (United States)

    Aly, Arafa H.; Mehaney, Ahmed; Eissa, Mostafa F.

    2015-08-01

    Most conventional radiation detectors are based on electronic or photon collections. In this work, we introduce a new and novel type of ionizing particle detector based on phonon collection. Helium ion radiation treats tumors with better precision. There are nine known isotopes of helium, but only helium-3 and helium-4 are stable. Helium-4 is formed in fusion reactor technology and in enormous quantities during Big Bang nucleo-synthesis. In this study, we introduce a technique for helium-4 ion detection (sensing) based on the innovative properties of the new composite materials known as phononic crystals (PnCs). PnCs can provide an easy and cheap technique for ion detection compared with conventional methods. PnC structures commonly consist of a periodic array of two or more materials with different elastic properties. The two materials are polymethyl-methacrylate and polyethylene polymers. The calculations showed that the energies lost to target phonons are maximized at 1 keV helium-4 ion energy. There is a correlation between the total phonon energies and the transmittance of PnC structures. The maximum transmission for phonons due to the passage of helium-4 ions was found in the case of making polyethylene as a first layer in the PnC structure. Therefore, the concept of ion detection based on PnC structure is achievable.

  17. IMAGE ANALYSIS BASED ON EDGE DETECTION TECHNIQUES

    Institute of Scientific and Technical Information of China (English)

    纳瑟; 刘重庆

    2002-01-01

    A method that incorporates edge detection technique, Markov Random field (MRF), watershed segmentation and merging techniques was presented for performing image segmentation and edge detection tasks. It first applies edge detection technique to obtain a Difference In Strength (DIS) map. An initial segmented result is obtained based on K-means clustering technique and the minimum distance. Then the region process is modeled by MRF to obtain an image that contains different intensity regions. The gradient values are calculated and then the watershed technique is used. DIS calculation is used for each pixel to define all the edges (weak or strong) in the image. The DIS map is obtained. This help as priority knowledge to know the possibility of the region segmentation by the next step (MRF), which gives an image that has all the edges and regions information. In MRF model,gray level l, at pixel location i, in an image X, depends on the gray levels of neighboring pixels. The segmentation results are improved by using watershed algorithm. After all pixels of the segmented regions are processed, a map of primitive region with edges is generated. The edge map is obtained using a merge process based on averaged intensity mean values. A common edge detectors that work on (MRF) segmented image are used and the results are compared. The segmentation and edge detection result is one closed boundary per actual region in the image.

  18. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  19. Wavelet based detection of manatee vocalizations

    Science.gov (United States)

    Gur, Berke M.; Niezrecki, Christopher

    2005-04-01

    The West Indian manatee (Trichechus manatus latirostris) has become endangered partly because of watercraft collisions in Florida's coastal waterways. Several boater warning systems, based upon manatee vocalizations, have been proposed to reduce the number of collisions. Three detection methods based on the Fourier transform (threshold, harmonic content and autocorrelation methods) were previously suggested and tested. In the last decade, the wavelet transform has emerged as an alternative to the Fourier transform and has been successfully applied in various fields of science and engineering including the acoustic detection of dolphin vocalizations. As of yet, no prior research has been conducted in analyzing manatee vocalizations using the wavelet transform. Within this study, the wavelet transform is used as an alternative to the Fourier transform in detecting manatee vocalizations. The wavelet coefficients are analyzed and tested against a specified criterion to determine the existence of a manatee call. The performance of the method presented is tested on the same data previously used in the prior studies, and the results are compared. Preliminary results indicate that using the wavelet transform as a signal processing technique to detect manatee vocalizations shows great promise.

  20. Cluster Based Cost Efficient Intrusion Detection System For Manet

    OpenAIRE

    Kumarasamy, Saravanan; B, Hemalatha; P, Hashini

    2013-01-01

    Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historica...

  1. Circuit mismatch influence on performance of paralleling silicon carbide MOSFETs

    DEFF Research Database (Denmark)

    Li, Helong; Munk-Nielsen, Stig; Pham, Cam;

    2014-01-01

    This paper focuses on circuit mismatch influence on performance of paralleling SiC MOSFETs. Power circuit mismatch and gate driver mismatch influences are analyzed in detail. Simulation and experiment results show the influence of circuit mismatch and verify the analysis. This paper aims to give...

  2. A new islanding detection technique for multiple mini hydro based on rate of change of reactive power and load connecting strategy

    International Nuclear Information System (INIS)

    Highlights: • The requirement of DG interconnection with existing power system is discussed. • Various islanding detection techniques are discussed with their merits and demerits. • New islanding detection strategy is proposed for multiple mini hydro type DGs. • The proposed strategy is based on dq/dt and load connecting strategy. • The effectiveness of strategy is verified on various other cases. - Abstract: The interconnection of distributed generation (DG) into distribution networks is undergoing a rapid global expansion. It enhances the system’s reliability, while simultaneously reduces pollution problems related to the generation of electrical power. To fully utilize the benefits of DGs, certain technical issues need to be addressed. One of the most important issues in this context is islanding detection. This paper presents a new islanding detection technique that is suitable for multiple mini-hydro type DG units. The proposed strategy is based on the rate of change of reactive power and load connecting strategy to detect islanding within the system. For a large power mismatch, islanding is detected by rate of change of reactive power only. However, for a close power mismatch, the rate of change of reactive power initiates a load connecting strategy, which in turn alters the load on the distribution network. This load variation in the distribution network causes a variation in the rate of change of reactive power, which is utilized to distinguish islanding and other events. The simulation results show that the proposed strategy is effective in detecting islanding occurrence in a distribution network

  3. SKILL MISMATCH OF GRADUATES IN A LOCAL LABOUR MARKET

    OpenAIRE

    Enrico Marelli; Dario Sciulli; Marcello Signorelli

    2014-01-01

    In this paper we first review the (potential and actual) role of the Universities for the local economies in which they operate, especially considering the implications deriving from the degree of skill mismatch (over-education) in a local labour market. Then, in the second part of the paper, we realise an empirical investigation based on administrative information of an Italian University matched with the data of the job centres of the local (provincial) labour market in order to...

  4. Towards automatic identification of mismatched image pairs through loop constraints

    Science.gov (United States)

    Elibol, Armagan; Kim, Jinwhan; Gracias, Nuno; Garcia, Rafael

    2013-12-01

    Obtaining image sequences has become easier and easier thanks to the rapid progress on optical sensors and robotic platforms. Processing of image sequences (e.g., mapping, 3D reconstruction, Simultaneous Localisation and Mapping (SLAM)) usually requires 2D image registration. Recently, image registration is accomplished by detecting salient points in two images and nextmatching their descriptors. To eliminate outliers and to compute a planar transformation (homography) between the coordinate frames of images, robust methods (such as Random Sample Consensus (RANSAC) and Least Median of Squares (LMedS)) are employed. However, image registration pipeline can sometimes provide sufficient number of inliers within the error bounds even when images do not overlap. Such mismatches occur especially when the scene has repetitive texture and shows structural similarity. In this study, we present a method to identify the mismatches using closed-loop (cycle) constraints. The method exploits the fact that images forming a cycle should have identity mapping when all the homographies between images in the cycle multiplied. Cycles appear when the camera revisits an area that was imaged before, which is a common practice especially for mapping purposes. Our proposal extracts several cycles to obtain error statistics for each matched image pair. Then, it searches for image pairs that have extreme error histogram comparing to the other pairs. We present experimental results with artificially added mismatched image pairs on real underwater image sequences.

  5. Raman LIDAR Detection of Cloud Base

    Science.gov (United States)

    Demoz, Belay; Starr, David; Whiteman, David; Evans, Keith; Hlavka, Dennis; Peravali, Ravindra

    1999-01-01

    Advantages introduced by Raman lidar systems for cloud base determination during precipitating periods are explored using two case studies of light rain and virga conditions. A combination of the Raman lidar derived profiles of water vapor mixing ratio and aerosol scattering ratio, together with the Raman scattered signals from liquid drops, can minimize or even eliminate some of the problems associated with cloud boundary detection using elastic backscatter lidars.

  6. General SIC measurement-based entanglement detection

    Science.gov (United States)

    Chen, Bin; Li, Tao; Fei, Shao-Ming

    2015-06-01

    We study the quantum separability problem by using general symmetric informationally complete measurements and present separability criteria for both -dimensional bipartite and multipartite systems. The criterion for bipartite quantum states is effective in detecting several well-known classes of quantum states. For isotropic states, it becomes both necessary and sufficient. Furthermore, our criteria can be experimentally implemented, and the criterion for two-qudit states requires less local measurements than the one based on mutually unbiased measurements.

  7. Biotoxin Detection Using Cell-Based Sensors

    Directory of Open Access Journals (Sweden)

    Pratik Banerjee

    2013-11-01

    Full Text Available Cell-based biosensors (CBBs utilize the principles of cell-based assays (CBAs by employing living cells for detection of different analytes from environment, food, clinical, or other sources. For toxin detection, CBBs are emerging as unique alternatives to other analytical methods. The main advantage of using CBBs for probing biotoxins and toxic agents is that CBBs respond to the toxic exposures in the manner related to actual physiologic responses of the vulnerable subjects. The results obtained from CBBs are based on the toxin-cell interactions, and therefore, reveal functional information (such as mode of action, toxic potency, bioavailability, target tissue or organ, etc. about the toxin. CBBs incorporate both prokaryotic (bacteria and eukaryotic (yeast, invertebrate and vertebrate cells. To create CBB devices, living cells are directly integrated onto the biosensor platform. The sensors report the cellular responses upon exposures to toxins and the resulting cellular signals are transduced by secondary transducers generating optical or electrical signals outputs followed by appropriate read-outs. Examples of the layout and operation of cellular biosensors for detection of selected biotoxins are summarized.

  8. Biotoxin detection using cell-based sensors.

    Science.gov (United States)

    Banerjee, Pratik; Kintzios, Spyridon; Prabhakarpandian, Balabhaskar

    2013-12-01

    Cell-based biosensors (CBBs) utilize the principles of cell-based assays (CBAs) by employing living cells for detection of different analytes from environment, food, clinical, or other sources. For toxin detection, CBBs are emerging as unique alternatives to other analytical methods. The main advantage of using CBBs for probing biotoxins and toxic agents is that CBBs respond to the toxic exposures in the manner related to actual physiologic responses of the vulnerable subjects. The results obtained from CBBs are based on the toxin-cell interactions, and therefore, reveal functional information (such as mode of action, toxic potency, bioavailability, target tissue or organ, etc.) about the toxin. CBBs incorporate both prokaryotic (bacteria) and eukaryotic (yeast, invertebrate and vertebrate) cells. To create CBB devices, living cells are directly integrated onto the biosensor platform. The sensors report the cellular responses upon exposures to toxins and the resulting cellular signals are transduced by secondary transducers generating optical or electrical signals outputs followed by appropriate read-outs. Examples of the layout and operation of cellular biosensors for detection of selected biotoxins are summarized. PMID:24335754

  9. Nonspinning searches for spinning binaries in ground-based detector data: Amplitude and mismatch predictions in the constant precession cone approximation

    CERN Document Server

    Brown, D; O'Shaughnessy, R

    2012-01-01

    Current searches for compact binary mergers by ground-based gravitational-wave detectors assume for simplicity the two bodies are not spinning. If the binary contains compact objects with significant spin, then this can reduce the sensitivity of these searches, particularly for black hole--neutron star binaries. In this paper we investigate the effect of neglecting precession on the sensitivity of searches for spinning binaries using non-spinning waveform models. We demonstrate that in the sensitive band of Advanced LIGO, the angle between the binary's orbital angular momentum and its total angular momentum is approximately constant. Under this \\emph{constant precession cone} approximation, we show that the gravitational-wave phasing is modulated in two ways: a secular increase of the gravitational-wave phase due to precession and an oscillation around this secular increase. We show that this secular evolution occurs in precisely three ways, corresponding to physically different apparent evolutions of the bin...

  10. Use of a Mismatch Amplification Mutation Assay PCR Method to Detect the Complex Vertebral Malformation in Some Chinese Holstein Sires%部分中国荷斯坦种公牛脊柱畸形综合征携带状况的检测和分析

    Institute of Scientific and Technical Information of China (English)

    王帅; 赵学明; 朱化彬; 杜卫华; 王栋; 郝海生; 王宗礼

    2011-01-01

    摘本研究旨在对部分中国荷斯坦种公牛脊柱畸形综合征(Complex vertebral malformation,CVM)致病基因的携带状况进行筛查.应用错配PCR突变分析技术(PCR mismatch amplification mutation assay,PCR-MAMA)建立了针对CVM致病基因的特异性检测方法.利用PCR-MAMA法检测了154头荷斯坦种公牛,发现了24头CVM阳性个体,阳性率为15.58%.结果显示,应对中国荷斯坦种公牛进行全面的针对CVM的检测.%This experiment was conducted to test some Chinese Holstein sires for complex vertebral malformation (CVM). In this study, a simple, rapid PCR mismatch amplification mutation assay (PCR- MAMA) was developed to detect the mutation allele. Out of 154 tested Holstein sires, 24 sires (15. 58%) were identified to be CVM carriers by PCR- MAMA. The results indicate that all the Chinese Holstein sires should be tested for CVM.

  11. Cyclic mismatch binding ligand CMBL4 binds to the 5'-T-3'/5'-GG-3' site by inducing the flipping out of thymine base.

    Science.gov (United States)

    Mukherjee, Sanjukta; Dohno, Chikara; Asano, Kaori; Nakatani, Kazuhiko

    2016-09-01

    A newly designed cyclic bis-naphthyridine carbamate dimer CMBL4: with a limited conformational flexibility was synthesized and characterized. Absorption spectra revealed that two naphthyridines in CMBL4: were stacked on each other in aqueous solutions. The most efficient binding of CMBL4: to DNA was observed for the sequence 5'-T-3'/5'-GG-3' (T/GG) with the formation of a 1:1 complex, which is one of possible structural elements involved in the higher order structures of (TGG)n repeat DNA triggering the genome microdeletion. Surface plasmon resonance assay also showed the binding of CMBL4: with TGG repeat DNA. Potassium permanganate oxidation studies of CMBL4: -bound duplex containing the T/GG site showed that the CMBL4: -binding accelerated the oxidation of thymine at that site, which suggests the flipping out of the thymine base from a π-stack. Preferential binding was observed for CMBL4: compared with its acyclic variants, which suggests the marked significance of the macrocyclic structure for the recognition of the T/GG site.

  12. Title Based Duplicate Detection of Web Documents

    Directory of Open Access Journals (Sweden)

    Mrs. M. Kiruthika

    2012-09-01

    Full Text Available In recent times, the concept of web crawling has received remarkable significance owing to extreme development of the World Wide Web. Very large amounts of web documents are swarming the web making the search engines less appropriate to the users. Among the vast number of web documents are many duplicates and near duplicates i.e. variants derived from the same original web document due to which additional overheads are created for search engines by which their performance and quality is significantly affected. Web crawling research community has extensively recognized the need for detection of duplicate and near duplicate web pages. Providing the users with relevant results for their queries in the first page without duplicates and redundant results is a vital requisite. Also, this problem of duplication should be avoided to save storage as well as to improve search quality. The near duplicate web pages are detected followed by the storage of crawled web pages in to repositories. The detection of near duplicates conserves network bandwidth, brings down storage cost and enhances the quality of search engines. In this paper, we have discussed a feasible method for detection of near-duplicate web documents based on the title of the documents which will help to reduce the overhead of search engines and improve their performance.

  13. Fuzzy Backstepping Sliding Mode Control for Mismatched Uncertain System

    Directory of Open Access Journals (Sweden)

    H. Q. Hou

    2014-06-01

    Full Text Available Sliding mode controllers have succeeded in many control problems that the conventional control theories have difficulties to deal with; however it is practically impossible to achieve high-speed switching control. Therefore, in this paper an adaptive fuzzy backstepping sliding mode control scheme is derived for mismatched uncertain systems. Firstly fuzzy sliding mode controller is designed using backstepping method based on the Lyapunov function approach, which is capable of handling mismatched problem. Then fuzzy sliding mode controller is designed using T-S fuzzy model method, it can improve the performance of the control systems and their robustness. Finally this method of control is applied to nonlinear system as a case study; simulation results are also provided the performance of the proposed controller.

  14. Performance of Mismatched PV Systems With Submodule Integrated Converters

    Energy Technology Data Exchange (ETDEWEB)

    Olalla, C; Deline, C; Maksimovic, D

    2014-01-01

    Mismatch power losses in photovoltaic (PV) systems can be reduced by the use of distributed power electronics at the module or submodule level. This paper presents an experimentally validated numerical model that can be used to predict power production with distributed maximum power point tracking (DMPPT) down to the cell level. The model allows the investigations of different DMPPT architectures, as well as the impact of conversion efficiencies and power constraints. Results are presented for annual simulations of three representative partial shading scenarios and two scenarios where mismatches are due to aging over a period of 25 years. It is shown that DMPPT solutions that are based on submodule integrated converters offer 6.9-11.1% improvements in annual energy yield relative to a baseline centralized MPPT scenario.

  15. Chemiluminescence imaging for microRNA detection based on cascade exponential isothermal amplification machinery.

    Science.gov (United States)

    Xu, Yongjie; Li, Dandan; Cheng, Wei; Hu, Rong; Sang, Ye; Yin, Yibing; Ding, Shijia; Ju, Huangxian

    2016-09-14

    A novel G-quadruplex DNAzyme-driven chemiluminescence (CL) imaging method was developed for ultrasensitive and specific detection of miRNA based on the cascade exponential isothermal amplification reaction (EXPAR) machinery. A structurally tailored hairpin probe switch was designed to selectively recognise miRNA and form hybridisation products to trigger polymerase and nicking enzyme machinery, resulting in the generation of product I, which was complementary to a region of the functional linear template. Then, the response of the functional linear template to the generated product I further activated the exponential isothermal amplification machinery, leading to synthesis of numerous horseradish peroxidase mimicking DNAzyme units for CL signal transduction. The amplification paradigm generated a linear response from 10 fM to 100 pM, with a low detection limit of 2.91 fM, and enabled discrimination of target miRNA from a single-base mismatched target. The developed biosensing platform demonstrated the advantages of isothermal, homogeneous, visual detection for miRNA assays, offering a promising tool for clinical diagnosis. PMID:27566360

  16. Chemiluminescence imaging for microRNA detection based on cascade exponential isothermal amplification machinery.

    Science.gov (United States)

    Xu, Yongjie; Li, Dandan; Cheng, Wei; Hu, Rong; Sang, Ye; Yin, Yibing; Ding, Shijia; Ju, Huangxian

    2016-09-14

    A novel G-quadruplex DNAzyme-driven chemiluminescence (CL) imaging method was developed for ultrasensitive and specific detection of miRNA based on the cascade exponential isothermal amplification reaction (EXPAR) machinery. A structurally tailored hairpin probe switch was designed to selectively recognise miRNA and form hybridisation products to trigger polymerase and nicking enzyme machinery, resulting in the generation of product I, which was complementary to a region of the functional linear template. Then, the response of the functional linear template to the generated product I further activated the exponential isothermal amplification machinery, leading to synthesis of numerous horseradish peroxidase mimicking DNAzyme units for CL signal transduction. The amplification paradigm generated a linear response from 10 fM to 100 pM, with a low detection limit of 2.91 fM, and enabled discrimination of target miRNA from a single-base mismatched target. The developed biosensing platform demonstrated the advantages of isothermal, homogeneous, visual detection for miRNA assays, offering a promising tool for clinical diagnosis.

  17. Bacteriophage based probes for pathogen detection.

    Science.gov (United States)

    Singh, Amit; Arutyunov, Denis; Szymanski, Christine M; Evoy, Stephane

    2012-08-01

    Rapid and specific detection of pathogenic bacteria is important for the proper treatment, containment and prevention of human, animal and plant diseases. Identifying unique biological probes to achieve a high degree of specificity and minimize false positives has therefore garnered much interest in recent years. Bacteriophages are obligate intracellular parasites that subvert bacterial cell resources for their own multiplication and production of disseminative new virions, which repeat the cycle by binding specifically to the host surface receptors and injecting genetic material into the bacterial cells. The precision of host recognition in phages is imparted by the receptor binding proteins (RBPs) that are often located in the tail-spike or tail fiber protein assemblies of the virions. Phage host recognition specificity has been traditionally exploited for bacterial typing using laborious and time consuming bacterial growth assays. At the same time this feature makes phage virions or RBPs an excellent choice for the development of probes capable of selectively capturing bacteria on solid surfaces with subsequent quick and automatic detection of the binding event. This review focuses on the description of pathogen detection approaches based on immobilized phage virions as well as pure recombinant RBPs. Specific advantages of RBP-based molecular probes are also discussed.

  18. NO2 Detection Using Microcantilever Based Potentiometry

    Directory of Open Access Journals (Sweden)

    Goutam Koley

    2008-11-01

    Full Text Available A highly sensitive and novel sensor platform for gases and volatile chemicals using microcantilever based potentiometry is reported. A resonant cantilever is used to detect the changes in surface work functions of functionalized substrates caused by adsorption of target gas molecules. Surface work function (SWF changes were measured for different functionalization layers made of transition metal oxide thin films with the flow of NO2. The rate of change in SWF for In2O3 and SnO2 were found to be ~80 and ~100 μV/sec, respectively, for 70 ppm NO2. A sensitivity of 64 μV/sec for SWF change was also found for 70 ppm NO2 concentration for isolated clusters of ZnO nanowires, indicating that this technique is applicable even for nano-clusters of sensing materials where amperometric detection is impossible due to material discontinuity. NO2 detection as low as 400 ppb was possible using highly insulating In2O3 and SnO2 thin films (resistivity > 1 TΩ/⎕. Two different forms of nano scale graphite were compared with the transition oxide based functionalization layer for sensing sub-ppm NO2 sensing. It was observed that nanostructured graphite (NG shows much higher sensitivity and lower response time than transition metal oxides.

  19. In Situ Measurement of the γ/ γ' Lattice Mismatch Evolution of a Nickel-Based Single-Crystal Superalloy During Non-isothermal Very High-Temperature Creep Experiments

    Science.gov (United States)

    Le Graverend, Jean-Briac; Dirand, Laura; Jacques, Alain; Cormier, Jonathan; Ferry, Olivier; Schenk, Thomas; Gallerneau, Franck; Kruch, Serge; Mendez, José

    2012-11-01

    The evolution of the γ/ γ' lattice mismatch of the AM1 single-crystal superalloy was measured during in situ non-isothermal very high-temperature creep tests under X-ray synchrotron radiation. The magnitude of the effective lattice mismatch in the 1273 K to 1323 K (1000 °C to 1050 °C) temperature range always increased after overheatings performed at temperatures lower than 1403 K (1130 °C). In contrast, a decrease of its magnitude was observed after overheatings at temperatures greater than 1453 K (1180 °C) due to massive dislocation recovery processes occurring at very high temperature.

  20. Wavelength mismatch effect in electromagnetically induced absorption

    Science.gov (United States)

    Bharti, Vineet; Wasan, Ajay; Natarajan, Vasant

    2016-07-01

    We present a theoretical investigation of the phenomenon of electromagnetically induced absorption (EIA) in a 4-level system consisting of vee and ladder subsystems. The four levels are coupled using one weak probe field, and two strong control fields. We consider an experimental realization using energy levels of Rb. This necessitates dealing with different conditions of wavelength mismatch-near-perfect match where all three wavelengths are approximately equal; partial mismatch where the wavelength of one control field is less than the other fields; and complete mismatch where all three wavelengths are unequal. We present probe absorption profiles with Doppler averaging at room temperature to account for experiments in a room temperature Rb vapor cell. Our analysis shows that EIA resonances can be studied using Rydberg states excited with diode lasers.

  1. Wavelength mismatch effect in electromagnetically induced absorption

    CERN Document Server

    Bharti, Vineet; Natarajan, Vasant

    2016-01-01

    We present a theoretical investigation of the phenomenon of electromagnetically induced absorption (EIA) in a 4-level system consisting of vee and ladder subsystems. The four levels are coupled using one weak probe field, and two strong control fields. We consider an experimental realization using energy levels of Rb. This necessitates dealing with different conditions of wavelength mismatch---near-perfect match where all three wavelengths are approximately equal; partial mismatch where the wavelength of one control field is less than the other fields; and complete mismatch where all three wavelengths are unequal. We present probe absorption profiles with Doppler averaging at room temperature to account for experiments in a room temperature Rb vapor cell. Our analysis shows that EIA resonances can be studied using Rydberg states excited with diode lasers.

  2. A Microcontroller Based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Ewunonu Toochi

    2014-11-01

    Full Text Available A Microcontroller based Intrusion Detection System is designed and implemented. Rampant, Okintrusion to restricted zones have highlighted the need for embedded systems that can effectively monitor, instantly alert personnel of any breach in security and retrieve graphic evidence of any such activity in the secured area. At the heart of the intrusion detection system is the PIC 168F77A Microcontroller that transmits pulses at 38 KHz. It is suitably interfaced to a GSM modem that can send SMS on sight of infringement and a webcam that can take snapshots. The report also presents the system software which has been developed in two parts: one in C++ Language using MPLAB KIT and the other written in AT COMMAND resident in the GSM modem. The system is very cost-effective, uses easily available components and is adaptable to control systems.

  3. An immune based dynamic intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2005-01-01

    With the dynamic description method for self and antigen, and the concept of dynamic immune tolerance for lymphocytes in network-security domain presented in this paper, a new immune based dynamic intrusion detection model (Idid) is proposed. In Idid, the dynamic models and the corresponding recursive equations of the lifecycle of mature lymphocytes, and the immune memory are built. Therefore, the problem of the dynamic description of self and nonself in computer immune systems is solved, and the defect of the low efficiency of mature lymphocyte generating in traditional computer immune systems is overcome. Simulations of this model are performed, and the comparison experiment results show that the proposed dynamic intrusion detection model has a better adaptability than the traditional methods.

  4. Mismatch and noise in modern IC processes

    CERN Document Server

    Marshall, Andrew

    2009-01-01

    Component variability, mismatch, and various noise effects are major contributors to design limitations in most modern IC processes. Mismatch and Noise in Modern IC Processes examines these related effects and how they affect the building block circuits of modern integrated circuits, from the perspective of a circuit designer.Variability usually refers to a large scale variation that can occur on a wafer to wafer and lot to lot basis, and over long distances on a wafer. This phenomenon is well understood and the effects of variability are included in most integrated circuit design with the use

  5. Plagiarism Detection Using Graph-Based Representation

    CERN Document Server

    Osman, Ahmed Hamza; Binwahlan, Mohammed Salem

    2010-01-01

    Plagiarism of material from the Internet is a widespread and growing problem. Several methods used to detect the plagiarism and similarity between the source document and suspected documents such as fingerprint based on character or n-gram. In this paper, we discussed a new method to detect the plagiarism based on graph representation; however, Preprocessing for each document is required such as breaking down the document into its constituent sentences. Segmentation of each sentence into separated terms and stop word removal. We build the graph by grouping each sentence terms in one node, the resulted nodes are connected to each other based on order of sentence within the document, all nodes in graph are also connected to top level node "Topic Signature". Topic signature node is formed by extracting the concepts of each sentence terms and grouping them in such node. The main advantage of the proposed method is the topic signature which is main entry for the graph is used as quick guide to the relevant nodes. ...

  6. SVM multiuser detection based on heuristic kernel

    Institute of Scientific and Technical Information of China (English)

    Yang Tao; Hu Bo

    2007-01-01

    A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multiple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kernel sparsity approximation algorithm, which avoids the conventional costly quadratic programming (QP) procedure in SVM. Besides, the coefficient of the SV is attained through the solution to a generalized eigenproblem. Simulation results show that the proposed scheme has almost the same bit error rate (BER) as the standard SVM and is better than minimum mean square error (MMSE) scheme. Meanwhile, it has a low computation complexity.

  7. Mobile Recommendation Based on Link Community Detection

    Directory of Open Access Journals (Sweden)

    Kun Deng

    2014-01-01

    Full Text Available Since traditional mobile recommendation systems have difficulty in acquiring complete and accurate user information in mobile networks, the accuracy of recommendation is not high. In order to solve this problem, this paper proposes a novel mobile recommendation algorithm based on link community detection (MRLD. MRLD executes link label diffusion algorithm and maximal extended modularity (EQ of greedy search to obtain the link community structure, and overlapping nodes belonging analysis (ONBA is adopted to adjust the overlapping nodes in order to get the more accurate community structure. MRLD is tested on both synthetic and real-world networks, and the experimental results show that our approach is valid and feasible.

  8. The selective recognition of mismatched d(GCGAGC)2 by the cobalt(III) complex

    Institute of Scientific and Technical Information of China (English)

    CHEN; Huili; YANG; Pin

    2005-01-01

    We studied the binding of [Co(phen)2(HPIP)]Cl3 to mismatched d(GCGAGC)2 containing two sheared G:A mispairs by NMR. The result shows that the complex was intercalated into G:A region from the minor groove and extended to the major groove, and could selectively recognize the mispairs. 31P NMR indicates that the complex binding induced the change of the phosphate backbone in the mismatched base pairs region.

  9. DNA & Protein detection based on microbead agglutination

    KAUST Repository

    Kodzius, Rimantas

    2012-06-06

    We report a simple and rapid room temperature assay for point-of-care (POC) testing that is based on specific agglutination. Agglutination tests are based on aggregation of microparticles in the presence of a specific analyte thus enabling the macroscopic observation. Agglutination-based tests are most often used to explore the antibody-antigen reactions. Agglutination has been used for mode protein assays using a biotin/streptavidin two-component system, as well as a hybridization based two-component assay; however, as our work shows, two-component systems are prone to self-termination of the linking analyte and thus have a lower sensitivity. Three component systems have also been used with DNA hybridization, as in our work; however, their assay requires 48 hours for incubation, while our assay is performed in 5 minutes making it a real candidate for POC testing. We demonstrate three assays: a two-component biotin/streptavidin assay, a three-component hybridization assay using single stranded DNA (ssDNA) molecules and a stepped three-component hybridization assay. The comparison of these three assays shows our simple stepped three-component agglutination assay to be rapid at room temperature and more sensitive than the two-component version by an order of magnitude. An agglutination assay was also performed in a PDMS microfluidic chip where agglutinated beads were trapped by filter columns for easy observation. We developed a rapid (5 minute) room temperature assay, which is based on microbead agglutination. Our three-component assay solves the linker self-termination issue allowing an order of magnitude increase in sensitivity over two–component assays. Our stepped version of the three-component assay solves the issue with probe site saturation thus enabling a wider range of detection. Detection of the agglutinated beads with the naked eye by trapping in microfluidic channels has been shown.

  10. Overlapping Community Detection based on Network Decomposition

    Science.gov (United States)

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-04-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.

  11. Waveguide-Based Biosensors for Pathogen Detection

    Directory of Open Access Journals (Sweden)

    Nile Hartman

    2009-07-01

    Full Text Available Optical phenomena such as fluorescence, phosphorescence, polarization, interference and non-linearity have been extensively used for biosensing applications. Optical waveguides (both planar and fiber-optic are comprised of a material with high permittivity/high refractive index surrounded on all sides by materials with lower refractive indices, such as a substrate and the media to be sensed. This arrangement allows coupled light to propagate through the high refractive index waveguide by total internal reflection and generates an electromagnetic wave—the evanescent field—whose amplitude decreases exponentially as the distance from the surface increases. Excitation of fluorophores within the evanescent wave allows for sensitive detection while minimizing background fluorescence from complex, “dirty” biological samples. In this review, we will describe the basic principles, advantages and disadvantages of planar optical waveguide-based biodetection technologies. This discussion will include already commercialized technologies (e.g., Corning’s EPIC® Ô, SRU Biosystems’ BIND™, Zeptosense®, etc. and new technologies that are under research and development. We will also review differing assay approaches for the detection of various biomolecules, as well as the thin-film coatings that are often required for waveguide functionalization and effective detection. Finally, we will discuss reverse-symmetry waveguides, resonant waveguide grating sensors and metal-clad leaky waveguides as alternative signal transducers in optical biosensing.

  12. Point pattern match-based change detection in a constellation of previously detected objects

    Energy Technology Data Exchange (ETDEWEB)

    Paglieroni, David W.

    2016-06-07

    A method and system is provided that applies attribute- and topology-based change detection to objects that were detected on previous scans of a medium. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, detection strength, size, elongation, orientation, etc. The locations define a three-dimensional network topology forming a constellation of previously detected objects. The change detection system stores attributes of the previously detected objects in a constellation database. The change detection system detects changes by comparing the attributes and topological consistency of newly detected objects encountered during a new scan of the medium to previously detected objects in the constellation database. The change detection system may receive the attributes of the newly detected objects as the objects are detected by an object detection system in real time.

  13. Network Intrusion Detection based on GMKL Algorithm

    Directory of Open Access Journals (Sweden)

    Li Yuxiang

    2013-06-01

    Full Text Available According to the 31th statistical reports of China Internet network information center (CNNIC, by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing the information in the computer system or network we can detect any possible behaviors that can damage the availability, integrity and confidentiality of the computer resource, and make timely treatment to these behaviors which have important research significance to improve the operation environment of network and network service. At present, the Neural Network, Support Vector machine (SVM and Hidden Markov Model, Fuzzy inference and Genetic Algorithms are introduced into the research of network intrusion detection, trying to build a healthy and secure network operation environment. But most of these algorithms are based on the total sample and it also hypothesizes that the number of the sample is infinity. But in the field of network intrusion the collected data often cannot meet the above requirements. It often shows high latitudes, variability and small sample characteristics. For these data using traditional machine learning methods are hard to get ideal results. In view of this, this paper proposed a Generalized Multi-Kernel Learning method to applied to network intrusion detection. The Generalized Multi-Kernel Learning method can be well applied to large scale sample data, dimension complex, containing a large number of heterogeneous information and so on. The experimental results show that applying GMKL to network attack detection has high classification precision and low abnormal practical precision.

  14. Using stable MutS dimers and tetramers to quantitatively analyze DNA mismatch recognition and sliding clamp formation

    NARCIS (Netherlands)

    M.K. Groothuizen; A. Fish (Alexander); M.V. Petoukhov (Maxim); A. Reumer (Annet); L. Manelyte (Laura); H.H.K. Winterwerp (Herrie); M.G. Marinus (Martin); J.H.G. Lebbink (Joyce); D.I. Svergun (Dmitri); P. Friedhoff (Peter); T.K. Sixma (Titia)

    2013-01-01

    textabstractThe process of DNA mismatch repair is initiated when MutS recognizes mismatched DNA bases and starts the repair cascade. The Escherichia coli MutS protein exists in an equilibrium between dimers and tetramers, which has compromised biophysical analysis. To uncouple these states, we have

  15. Detection of a Specific Biomarker for Epstein-Barr Virus Using a Polymer-Based Genosensor

    Directory of Open Access Journals (Sweden)

    Renata P. A. Balvedi

    2014-05-01

    Full Text Available This paper describes methodology for direct and indirect detections of a specific oligonucleotide for Epstein-Barr virus (EBV using electrochemical techniques. The sequence of oligonucleotide probe (EBV1 revealed a high sequence identity (100% with the EBV genome. For the development of the genosensor, EBV1 was grafted to the platform sensitized with poly(4-aminothiophenol. After that, the hybridization reaction was carried out with the complementary target (EBV2 on the modified electrode surface using ethidium bromide as DNA intercalator. The oxidation peak currents of ethidium bromide increased linearly with the values of the concentration of the complementary sequences in the range from 3.78 to 756 µmol·L−1. In nonstringent experimental conditions, this genosensor can detect 17.32 nmol·L−1 (three independent experiments of oligonucleotide target, discriminating between complementary and non-complementary oligonucleotides, as well as differentiating one-base mismatch, as required for detection of genetic diseases caused by point mutations. The biosensor also displayed high specificity to the EBV target with elimination of interference from mix (alanine, glucose, uric acid, ascorbic acid, bovine serum albumin (BSA, glutamate and glycine and good stability (120 days. In addition, it was possible to observe differences between hybridized and non-hybridized surfaces through atomic force microscopy.

  16. Electrochemical detection of glutathione based on Hg(2+)-mediated strand displacement reaction strategy.

    Science.gov (United States)

    Lv, Yun; Yang, Lili; Mao, Xiaoxia; Lu, Mengjia; Zhao, Jing; Yin, Yongmei

    2016-11-15

    Glutathione (GSH) plays an important role in numerous cellular functions, and the abnormal GSH expression is closely related with many dangerous human diseases. In this work, we have proposed a simple but sensitive electrochemical method for quantitative detection of GSH based on an Hg(2+)-mediated strand displacement reaction. Owing to the specific binding of Hg(2+) with T-T mismatches, helper DNA can bind to 3' terminal of probe DNA 1 and initiate the displacement of probe DNA 2 immobilized on an electrode surface. However, Hg(2+)-mediated strand displacement reaction can be inhibited by the chelation of GSH with Hg(2+), thereby leading to an obvious electrochemical response obtained from methylene blue that is modified onto the probe DNA. Our method can sensitively detect GSH in a wide linear range from 0.5nM to 5μM with a low detection limit of 0.14nM, which can also easily distinguish target molecules in complex serum samples and even cell extractions. Therefore, this method may have great potential to monitor GSH in the physiological and pathological condition in the future. PMID:27240014

  17. Do anticodons of misacylated tRNAs preferentially mismatch codons coding for the misloaded amino acid?

    Directory of Open Access Journals (Sweden)

    Seligmann Hervé

    2010-05-01

    Full Text Available Abstract Background Accurate amino acid insertion during peptide elongation requires tRNAs loaded by cognate amino acids and that anticodons match codons. However, tRNA misloading does not necessarily cause misinsertions: misinsertion is avoided when anticodons mismatch codons coding for misloaded amino acids. Presentation of the hypothesis Occasional compensation of misacylation by codon-anticodon mismatch necessarily occurs. Putatively, occasional error compensation may be enhanced beyond the random combination of independent errors in tRNA loading and codon-anticodon interactions: tRNA misacylation might alter potentials for codon-anticodon mismatches, perhaps specifically increasing potentials for mismatching those codons coding for the misacylated non-cognate amino acid. This hypothetical phenomenon is called 'error coordination', in distinction from 'error compensation' that assumes independence between misacylation and mismatch. Testing the hypothesis Eventually, the hypothesis should be tested for each combination of amino acid misacylation and codon-anticodon mismatch, by comparing stabilities or frequencies of mismatched codon-anticodon duplexes formed by tRNAs loaded by their cognate amino acid with stabilities formed by that tRNA when misloaded with the amino acid coded by the mismatched codon. Competitive mismatching experiments between misloaded and correctly loaded tRNAs could also be useful, yet more sophisticated experiments. Implications of the hypothesis Detecting error coordination implies estimating error compensation, which also promotes protein synthesis accuracy. Hence even in the absence of evidence for error coordination, experiments would yield very useful insights into misacylation and mismatch processes. In case experiments consider post-transcriptional RNA modifications (especially at wobble positions, results on codon-anticodon mismatches would enable significant improvements and sophistications of secondary

  18. Velocity synchronization of multi-agent systems with mismatched parameters via sampled position data

    Science.gov (United States)

    Sun, Wen; Huang, Chunli; Lü, Jinhu; Li, Xiong; Chen, Shihua

    2016-02-01

    Power systems are special multi-agent systems with nonlinear coupling function and symmetric structures. This paper extends these systems to a class of multi-agent systems with mismatched parameters, linear coupling function, and asymmetric structures and investigates their velocity synchronization via sampled position data. The dynamics of the agents is adopted as that of generators with mismatched parameters, while the system structures are supposed to be complex. Two distributed linear consensus protocols are designed, respectively, for multi-agent systems without or with communication delay. Necessary and sufficient conditions based on the sampling period, the mismatched parameters, the delay, and the nonzero eigenvalues of the Laplacian matrix are established. It is shown that velocity synchronization of multi-agent systems with mismatched parameters can be achieved if the sampled period is chosen appropriately. Simulations are given to illustrate the effectiveness of the theoretical results.

  19. New Spectral Method for Halo Particle Definition in Intense Mis-matched Beams

    International Nuclear Information System (INIS)

    An advanced spectral analysis of a mis-matched charged particle beam propagating through a periodic focusing transport lattice is utilized in particle-in-cell (PIC) simulations. It is found that the betatron frequency distribution function of a mismatched space-charge-dominated beam has a bump-on-tail structure attributed to the beam halo particles. Based on this observation, a new spectral method for halo particle definition is proposed that provides the opportunity to carry out a quantitative analysis of halo particle production by a beam mismatch. In addition, it is shown that the spectral analysis of the mismatch relaxation process provides important insights into the emittance growth attributed to the halo formation and the core relaxation processes. Finally, the spectral method is applied to the problem of space-charge transport limits.

  20. Attribute and topology based change detection in a constellation of previously detected objects

    Energy Technology Data Exchange (ETDEWEB)

    Paglieroni, David W.; Beer, Reginald N.

    2016-01-19

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  1. Distributivity and Agreement mismatches in Serbian

    NARCIS (Netherlands)

    Bosnic, Ana

    2016-01-01

    This paper presents a truth value judgment study done on two types of numerals in the Serbian numerical system and corresponding verbal agreement mismatch that is characteristic for the numerals in question. Recent work on agreement and distributivity suggests that singular verbal marking promotes d

  2. Double-mismatched siRNAs enhance selective gene silencing of a mutant ALS-causing allele

    Institute of Scientific and Technical Information of China (English)

    Chang-ming GENG; Hong-liu DING

    2008-01-01

    Aim: Our previous study demonstrated an siRNA-mediated, allele-specific silenc-ing of mutant genes that cause amyotrophic lateral sclerosis. To improve siRNA design for better therapeutic use of RNA interference, we systematically tested the base-pairing mismatch strategy in the design of asymmetric siRNA. Methods: A naturally symmetric siRNA that targets the human Cu Zn superoxide dismutase G85R mutant allele was modified by placing either 1 or 2 mismatches at the end of the siRNA from position 1 to 4 at each time. The target preference and silencing efficacy of modified siRNA were measured using a modified dual luciferase system. Results: The modification of single base-pairing mismatch successfully achieved the conversion of the siRNA that was originally favored to the antisense of the mutant allele to the one that was favored to the sense strand of the gene. Com-pared to the single-mismatched siRNA, those with double-mismatch at one end demonstrated an increased asymmetry, and thus, an enhanced specificity and efficacy of gene silencing. In addition, the siRNA with double-mismatch at both ends remained in symmetry. Conclusion: Our results suggest the effectiveness of converting a symmetric siRNA to an asymmetric one by introducing mismatches into its structure, and the superiority of double-mismatched siRNA to single-mismatched siRNA in producing selective gene silencing resulting from the dis-ruption of siRNA symmetry. The double-mismatch strategy is an improvement of the single-mismatch method and could be useful in the design of effective siRNAs for the treatment of diseases caused by dominant, gain-of-function gene mutations, such as ALS.

  3. Self-Oscillation-Based Frequency Tracking for the Drive and Detection of Resonance Magnetometers.

    Science.gov (United States)

    Tian, Zheng; Ren, Dahai; You, Zheng

    2016-05-21

    This paper reports a drive and detection method for Micro-Electro-Mechanical System (MEMS)-based Lorentz-force resonance magnetometers. Based on the proposed MEMS magnetometer, a drive and detection method was developed by using self-oscillation to adjust the mismatch between the mechanical resonance frequency and the coil drive frequency as affected by temperature fluctuations and vibration amplitude changes. Not only was the signal-to-noise ratio enhanced by the proposed method compared to the traditional method, but the test system automatically reached resonance frequency very rapidly when powered on. Moreover, the linearity and the measurement range were improved by the magnetic feedback generated by the coil. Test results indicated that the sensitivity of the proposed magnetometer is 59.6 mV/μT and its noise level is 0.25 μT. When operating in ±65 μT, its nonlinearity is 2.5‰-only one-tenth of the former prototype. Its power consumption is only about 250 mW and its size is only 28 mm × 28 mm × 10 mm, or about one-eighth of the original sensor; further, unlike the former device, it can distinguish both positive and negative magnetic fields. The proposed method can also be applied in other MEMS sensors such as gyroscopes and micromirrors to enhance their frequency tracking ability.

  4. Edge detection based on directional space

    Institute of Scientific and Technical Information of China (English)

    YUAN Wei-qi; LI De-sheng

    2006-01-01

    A new method for edge detection based on directional space is proposed.The principle is that:firstly,the directional differential space is set up in which the ridge edge pixels and valley edge pixels are abstracted with the help of the method of logical judgments along the direction of differential function,forming a directional roof edge map;secondly,step edge pixels are abstracted between the neighboring directional ridge edge and directional valley edge along the direction of differential function;finally,the ridge edge map,valley edge map and step edge map gained along different directions are combined into corresponding ridge edge map,valley edge map and step edge map.This method is different from classical algorithms in which the gray differential values of the mutual vertical direction are combined into one gradient value.The experiment of edge detection is made for the images of nature scenery,human body and accumulative raw material,whose result is compared with the one of classical algorithms and showing the robustness of the proposed method.

  5. Detecting Soft Errors in Stencil based Computations

    Energy Technology Data Exchange (ETDEWEB)

    Sharma, V. [Univ. of Utah, Salt Lake City, UT (United States); Gopalkrishnan, G. [Univ. of Utah, Salt Lake City, UT (United States); Bronevetsky, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-05-06

    Given the growing emphasis on system resilience, it is important to develop software-level error detectors that help trap hardware-level faults with reasonable accuracy while minimizing false alarms as well as the performance overhead introduced. We present a technique that approaches this idea by taking stencil computations as our target, and synthesizing detectors based on machine learning. In particular, we employ linear regression to generate computationally inexpensive models which form the basis for error detection. Our technique has been incorporated into a new open-source library called SORREL. In addition to reporting encouraging experimental results, we demonstrate techniques that help reduce the size of training data. We also discuss the efficacy of various detectors synthesized, as well as our future plans.

  6. Error detection based on MB types

    Institute of Scientific and Technical Information of China (English)

    FANG Yong; JEONG JeChang; WU ChengKe

    2008-01-01

    This paper proposes a method of error detection based on macroblock (MB) types for video transmission. For decoded inter MBs, the absolute values of received residues are accumulated. At the same time, the intra textural complexity of the current MB is estimated by that of the motion compensated reference block. We compare the inter residue with the intra textural complexity. If the inter residue is larger than the intra textural complexity by a predefined threshold, the MB is con-sidered to be erroneous and errors are concealed. For decoded intra MBs, the connective smoothness of the current MB with neighboring MBs is tested to find erroneous MBs. Simulation results show that the new method can remove those seriously-corrupted MBs efficiently. Combined with error concealment, the new method improves the recovered quality at the decoder by about 0.5-1 dB.

  7. Comic image understanding based on polygon detection

    Science.gov (United States)

    Li, Luyuan; Wang, Yongtao; Tang, Zhi; Liu, Dong

    2013-01-01

    Comic image understanding aims to automatically decompose scanned comic page images into storyboards and then identify the reading order of them, which is the key technique to produce digital comic documents that are suitable for reading on mobile devices. In this paper, we propose a novel comic image understanding method based on polygon detection. First, we segment a comic page images into storyboards by finding the polygonal enclosing box of each storyboard. Then, each storyboard can be represented by a polygon, and the reading order of them is determined by analyzing the relative geometric relationship between each pair of polygons. The proposed method is tested on 2000 comic images from ten printed comic series, and the experimental results demonstrate that it works well on different types of comic images.

  8. Smell Detection Agent Based Optimization Algorithm

    Science.gov (United States)

    Vinod Chandra S. S.

    2016-09-01

    In this paper, a novel nature-inspired optimization algorithm has been employed and the trained behaviour of dogs in detecting smell trails is adapted into computational agents for problem solving. The algorithm involves creation of a surface with smell trails and subsequent iteration of the agents in resolving a path. This algorithm can be applied in different computational constraints that incorporate path-based problems. Implementation of the algorithm can be treated as a shortest path problem for a variety of datasets. The simulated agents have been used to evolve the shortest path between two nodes in a graph. This algorithm is useful to solve NP-hard problems that are related to path discovery. This algorithm is also useful to solve many practical optimization problems. The extensive derivation of the algorithm can be enabled to solve shortest path problems.

  9. Biomolecular detection with a thin membrane transducer.

    Science.gov (United States)

    Cha, Misun; Shin, Jaeha; Kim, June-Hyung; Kim, Ilchaek; Choi, Junbo; Lee, Nahum; Kim, Byung-Gee; Lee, Junghoon

    2008-06-01

    We present a thin membrane transducer (TMT) that can detect nucleic acid based biomolecular reactions including DNA hybridization and protein recognition by aptamers. Specific molecular interactions on an extremely thin and flexible membrane surface cause the deflection of the membrane due to surface stress change which can be measured by a compact capacitive circuit. A gold-coated thin PDMS membrane assembled with metal patterned glass substrate is used to realize the capacitive detection. It is demonstrated that perfect match and mismatch hybridizations can be sharply discriminated with a 16-mer DNA oligonucleotide immobilized on the gold-coated surface. While the mismatched sample caused little capacitance change, the perfectly matched sample caused a well-defined capacitance decrease vs. time due to an upward deformation of the membrane by a compressive surface stress. Additionally, the TMT demonstrated the single nucleotide polymorphism (SNP) capabilities which enabled a detection of mismatching base pairs in the middle of the sequence. It is intriguing that the increase of capacitance, therefore a downward deflection due to tensile stress, was observed with the internal double mismatch hybridization. We further present the detection of thrombin protein through ligand-receptor type recognition with 15-mer thrombin aptamer as a receptor. Key aspects of this detection such as the effect of concentration variation are investigated. This capacitive thin membrane transducer presents a completely new approach for detecting biomolecular reactions with high sensitivity and specificity without molecular labelling and optical measurement. PMID:18497914

  10. Optimisation of the CT h4S bioassay for detection of human interleukin-4 secreted by mononuclear cells stimulated by phytohaemaglutinin or by human leukocyte antigen mismatched mixed lymphocyte culture

    DEFF Research Database (Denmark)

    Petersen, Søren Lykke; Russell, Charlotte Astrid; Bendtzen, Klaus;

    2002-01-01

    Limiting dilution analysis has been used in the context of allogeneic bone marrow transplantation to determine anti-recipient interleukin-2 (IL-2) producing helper T lymphocyte precursor (HTLp) frequencies, which in several studies have been predictive of graft-versus-host disease (GVHD). Recently...... high anti-recipient IL-4 producing HTLp frequencies have been reported and associated with a decreased risk of GVHD. The aim of the present study was to define the optimal conditions for combined determination of IL-2 and IL-4 producing anti-recipient HTLp frequencies. We have optimised the CT.h4S......S bioassay detects 5 pg/ml of human recombinant IL-4 with no detection of IL-2 in concentrations below 500 pg/ml. We have found 72 h of culture optimal for detection of IL-2 and IL-4 produced by human mononuclear cells (MNC) in response to stimulation with phytohaemaglutinin and for detection of IL...

  11. "Molecular beacon"-based fluorescent assay for selective detection of glutathione and cysteine.

    Science.gov (United States)

    Xu, Hui; Hepel, Maria

    2011-02-01

    We report on the development of a fluorescence turn-on "molecular beacon" probe for the detection of glutathione (GSH) and cysteine (Cys). The method is based on a competitive ligation of Hg(2+) ions by GSH/Cys and thymine-thymine (T-T) mismatches in a DNA strand of the self-hybridizing beacon strand. The assay relies on the distance-dependent optical properties of the fluorophore/quencher pair attached to the ends of the molecular beacon DNA strand. In a very selective coordination of Hg(2+) to GSH/Cys, the fluorophore/quencher distance increases concomitantly with the dehybridization and dissociation of the beacon stem T-Hg(2+)-T due to the extraction of Hg(2+) ions. This process results in switching the molecular beacon to the "on" state. The concentration range of the probe is 4-200 nM with the limit of detection (LOD) of 4.1 nM for GSH and 4.2 nM Cys. The probe tested satisfactorily against interference for a range of amino acids including sulfur-containing methionine.

  12. Cellular telephone-based radiation detection instrument

    Science.gov (United States)

    Craig, William W.; Labov, Simon E.

    2011-06-14

    A network of radiation detection instruments, each having a small solid state radiation sensor module integrated into a cellular phone for providing radiation detection data and analysis directly to a user. The sensor module includes a solid-state crystal bonded to an ASIC readout providing a low cost, low power, light weight compact instrument to detect and measure radiation energies in the local ambient radiation field. In particular, the photon energy, time of event, and location of the detection instrument at the time of detection is recorded for real time transmission to a central data collection/analysis system. The collected data from the entire network of radiation detection instruments are combined by intelligent correlation/analysis algorithms which map the background radiation and detect, identify and track radiation anomalies in the region.

  13. Education, Social Mobility, and Talent Mismatch

    OpenAIRE

    Yuki Uchida

    2015-01-01

    This study presents a two-class, overlapping-generation model featuring social mobility inhibited by the mismatch of talents. Mobility decreases as the private education gap between the two classes widens, whereas it increases with an increased public education spending. Within this framework, we consider the redistributive politics of public education and show that the private education gap provides the government with an incentive to increase public education. We also show that social mobil...

  14. Is it time to move mismatch negativity into the clinic?

    Science.gov (United States)

    Schall, Ulrich

    2016-04-01

    Since its inception in the 1970s, the mismatch negativity (MMN) event-related potential has improved our understanding of pre-attentive detection of rule violations, which is a fundamental cognitive process considered by some a form of "primitive intelligence". The body of research to date ranges from animal studies (i.e. when investigating the neural mechanisms and pharmacological properties of MMN generation) to researching the psychophysiological nature of human consciousness. MMN therefore offers the possibility to detect abnormal functioning in the neural system involved in MMN generation, such as it occurs in some neurodevelopmental disorders or patients in vegetative state. While the clinical research data holds considerable promise for translation into clinical practice, standardization and normative data of an optimized (i.e. disorder-specific) MMN recording algorithm is needed in order for MMN to become a valuable clinical investigation tool. PMID:26342995

  15. ADAPTIVE CALIBRATION OF I AND Q MISMATCH IN QUADRATURE RECEIVER

    Institute of Scientific and Technical Information of China (English)

    Yang Xuexian; Hou Zifeng; Zhang Qunying; Ning Yanqing

    2002-01-01

    The mismatch of in-phase and quadrature channels in quadrature receiver affects and constrains radar detection performance in coherent radar. It is necessary to keep the in-phase and quadrature branches symmetrical. In this letter, an adaptive method to detect imbalance parameters is derived by means of evaluating channel errors from the received signal sequences.No matter how the bias degree of the gain and phase errors in I/Q channels are, the proposed adaptive scheme can obtain good calibration results. And the required calculations are only a few multiplications and additions. No need of a special test signal, the introduced method is simple to implement and easy to operate.

  16. Is it time to move mismatch negativity into the clinic?

    Science.gov (United States)

    Schall, Ulrich

    2016-04-01

    Since its inception in the 1970s, the mismatch negativity (MMN) event-related potential has improved our understanding of pre-attentive detection of rule violations, which is a fundamental cognitive process considered by some a form of "primitive intelligence". The body of research to date ranges from animal studies (i.e. when investigating the neural mechanisms and pharmacological properties of MMN generation) to researching the psychophysiological nature of human consciousness. MMN therefore offers the possibility to detect abnormal functioning in the neural system involved in MMN generation, such as it occurs in some neurodevelopmental disorders or patients in vegetative state. While the clinical research data holds considerable promise for translation into clinical practice, standardization and normative data of an optimized (i.e. disorder-specific) MMN recording algorithm is needed in order for MMN to become a valuable clinical investigation tool.

  17. Surveillance Video Retrieval Based on Moving Objects Detection

    OpenAIRE

    Xuan Huang; Fernando Croquer; Wenhua Zeng

    2013-01-01

    In this article, we proposed a surveillance video retrieval method based on detection of moving objects and researched on key problems in surveillance video, such as moving objects detection, video segmentation, selection and description of key frames, and measurement of feature similarities. We detected moving objects via movement detection algorithm based on codebook, and realized automatic segmentation of surveillance video via calculating present Frame Movement Amount based on the foregro...

  18. Electrochemical detection of a Vibrio parahaemolyticus sequence-specific gene based on a gold electrode modified with a single stranded probe

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    An electrochemical DNA biosensor for specific-sequences detection of Vibrio parahaemolyticus (VP) was fabricated.A singlestranded 20-mer oligonucleotide (ssDNA) and 6-mercapto-1-hexanol (MCH) were immobilized via a thiol linker on gold disk electrodes by self-assembling.The ssDNA underwent hybridization in a hybridization solution containing complementary or non-complementary or single base pair mismatched DNA sequences of VP.Examination of changes in response to these three target DNAs showed that the developed biosensor had a high selectivity and sensitivity.

  19. Lagrangian based methods for coherent structure detection

    Energy Technology Data Exchange (ETDEWEB)

    Allshouse, Michael R., E-mail: mallshouse@chaos.utexas.edu [Center for Nonlinear Dynamics and Department of Physics, University of Texas at Austin, Austin, Texas 78712 (United States); Peacock, Thomas, E-mail: tomp@mit.edu [Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

    2015-09-15

    There has been a proliferation in the development of Lagrangian analytical methods for detecting coherent structures in fluid flow transport, yielding a variety of qualitatively different approaches. We present a review of four approaches and demonstrate the utility of these methods via their application to the same sample analytic model, the canonical double-gyre flow, highlighting the pros and cons of each approach. Two of the methods, the geometric and probabilistic approaches, are well established and require velocity field data over the time interval of interest to identify particularly important material lines and surfaces, and influential regions, respectively. The other two approaches, implementing tools from cluster and braid theory, seek coherent structures based on limited trajectory data, attempting to partition the flow transport into distinct regions. All four of these approaches share the common trait that they are objective methods, meaning that their results do not depend on the frame of reference used. For each method, we also present a number of example applications ranging from blood flow and chemical reactions to ocean and atmospheric flows.

  20. Biomimetic visual detection based on insect neurobiology

    Science.gov (United States)

    O'Carroll, David C.

    2001-11-01

    With a visual system that accounts for as much as 30% of the lifted mass, flying insects such as dragonflies and hoverflies invest more in vision than any other animal. Impressive visual performance is subserved by a surprisingly simple visual system. In a typical insect eye, between 2,000 and 30,000 pixels in the image are analyzed by fewer than 200,000 neurons in underlying neural circuits. The combination of sophisticated visual processing with an approachable level of complexity has made the insect visual system a leading model for biomimetic approaches to computer vision. Much neurobiological research has focused on neural circuits used for detection of moving patterns (e.g. optical flow during flight) and moving targets (e.g. prey). Research from several labs has led to great advances in our understanding of the neural mechanisms involved, and has spawned neuromorphic hardware based on key processes identified in neurobiological experiments. Despite its attractions, the highly non-linear nature of several key stages in insect visual processing presents a challenge to understanding. I will describe examples of adaptive elements of neural circuits in the fly visual system which analyze the direction and velocity of wide-field optical flow patterns and the result of experiments that suggest that these non-linearities may contribute to robust responses to natural image motion.

  1. Neutron detection based on superheated materials

    International Nuclear Information System (INIS)

    The environmental and radiation responses of the Active Personnel Dosimeter/Superheated Drop Detector (APD/SDD) combination have been evaluated at the Pacific Northwest Laboratory (PNL) for the US Department of Energy's Neutron Measurement and Evaluation Program. This paper provides results of the evaluation and discusses possible improvements for the current system. Radiation detection based on the radiation sensitivity of superheated liquids has been studied for some time. A liquid is superheated if it exists as a liquid at a temperature-pressure state normally associated with the vapor phase of that material. The liquid does not vaporize because there are no bubble nucleation sites in the sample. These sites usually exist (1) in microscopic cracks on solid container surfaces, (2) in crevices of imperfectly wetted solid particles suspended in the liquid, or (3) as a result of the radiation-matter interaction producing a microbubble that is large enough for bubble growth to be thermodynamically favorable. By suspending small drops of superheated liquid in an immiscible, inert, impurity-free medium, potential for bubble nucleation by the first two mechanisms is eliminated. Therefore, each drop becomes a miniature radiation detector

  2. Neutron detection based on superheated materials

    International Nuclear Information System (INIS)

    The environmental and radiation responses of the Active Personnel Dosimeter/Superheated Drop Detector (APD/SDD) combination have been evaluated at the Pacific Northwest Laboratory (PNL) for the U.S. Department of Energy's Neutron Measurement and Evaluation Program. This paper provides results of the evaluation and discusses possible improvements for the current system. Radiation detection based on the radiation sensitivity of superheated liquids has been studied for some time. A liquid is superheated if it exists as a liquid at a temperature-pressure state normally associated with the vapor phase of that material. The liquid does not vaporize because there are no bubble nucleation sits in the sample. These sites usually exist in microscopic cracks on solid container surfaces, in crevices of imperfectly wetted solid particles suspended in the liquid, or as a result of the radiation-matter interaction producing a microbubble that is large enough for bubble growth to be thermodynamically favorable. By suspending small drops of superheated liquid in an immiscible, inert, impurity-free medium, potential for bubble nucleation by the first two mechanisms is eliminated. Therefore, each drop becomes a miniature radiation detector

  3. Association of common variants in mismatch repair genes and breast cancer susceptibility: a multigene study

    International Nuclear Information System (INIS)

    MMR is responsible for the repair of base-base mismatches and insertion/deletion loops. Besides this, MMR is also associated with an anti-recombination function, suppressing homologous recombination. Losses of heterozygosity and/or microsatellite instability have been detected in a large number of skin samples from breast cancer patients, suggesting a potential role of MMR in breast cancer susceptibility. We carried out a hospital-based case-control study in a Caucasian Portuguese population (287 cases and 547 controls) to estimate the susceptibility to non-familial breast cancer associated with some polymorphisms in mismatch repair genes (MSH3, MSH4, MSH6, MLH1, MLH3, PMS1 and MUTYH). Using unconditional logistic regression we found that MLH3 (L844P, G>A) polymorphism GA (Leu/Pro) and AA (Pro/Pro) genotypes were associated with a decreased risk: OR = 0.65 (0.45-0.95) (p = 0.03) and OR = 0.62 (0.41-0.94) (p = 0.03), respectively. Analysis of two-way SNP interaction effects on breast cancer revealed two potential associations to breast cancer susceptibility: MSH3 Ala1045Thr/MSH6 Gly39Glu - AA/TC [OR = 0.43 (0.21-0.83), p = 0.01] associated with a decreased risk; and MSH4 Ala97Thr/MLH3 Leu844Pro - AG/AA [OR = 2.35 (1.23-4.49), p = 0.01], GG/AA [OR = 2.11 (1.12-3,98), p = 0.02], and GG/AG [adjusted OR = 1.88 (1.12-3.15), p = 0.02] all associated with an increased risk for breast cancer. It is possible that some of these common variants in MMR genes contribute significantly to breast cancer susceptibility. However, further studies with a large sample size will be needed to support our results

  4. Somatosensory mismatch response in young and elderly adults

    Directory of Open Access Journals (Sweden)

    Juho M. Strömmer

    2014-10-01

    Full Text Available Aging is associated with cognitive decline and alterations in early perceptual processes. Studies in the auditory and visual modalities have shown that the mismatch negativity (or the mismatch response, MMR, an event-related potential (ERP elicited by a deviant stimulus in a background of homogenous events, diminishes with aging and cognitive decline. However, the effects of aging on the somatosensory MMR are not known. In the current study, we recorded ERPs to electrical pulses to different fingers of the left hand in a passive oddball experiment in young (22–36 years and elderly (66–95 years adults engaged in a visual task. The MMR was found to deviants as compared to standards at two latency ranges: 180–220 ms and 250–290 ms post-stimulus onset. At 180–220 ms, within the young, the MMR was found at medial electrode sites, whereas aged did not show any amplitude difference between the stimulus types at the same latency range. At 250–290 ms, the MMR was evident with attenuated amplitude and narrowed scalp distribution among aged (Fz compared to young (fronto-centrally and lateral parietal sites. Hence, the results reveal that the somatosensory change detection mechanism is altered in aging. The somatosensory MMR can be used as a reliable measure of age-related changes in sensory-cognitive functions.

  5. Idiopathic pulmonary fibrosis. A rare cause of scintigraphic ventilation-perfusion mismatch

    International Nuclear Information System (INIS)

    A case of idiopathic pulmonary fibrosis with multiple areas of mismatch on ventilation-perfusion lung imaging in the absence of pulmonary embolism is presented. Idiopathic pulmonary fibrosis is one of the few nonembolic diseases producing a pulmonary ventilation-perfusion mismatch. In this condition, chest radiographs may not detect the full extent of disease, and xenon-133 ventilation imaging may be relatively insensitive to morbid changes in small airways. Thus, when examining patients with idiopathic pulmonary fibrosis, one should be aware that abnormal perfusion imaging patterns without matching ventilation abnormalities are not always due to embolism. In this setting, contrast pulmonary angiography is often needed for accurate differential diagnosis

  6. Effective Steganography Detection Based On Data Compression

    CERN Document Server

    Nechta, Ivan

    2011-01-01

    This article describes novel text steganalysis method. The archiver "Bzip2" used for detection stegotext generated by Texto stegosystem. Experiments show that proposed approach gets better performance than typical existing methods. The detection accuracy exceeds 99.98% for text segments with size 400 bytes.

  7. Network Anomaly Detection Based on Wavelet Analysis

    Science.gov (United States)

    Lu, Wei; Ghorbani, Ali A.

    2008-12-01

    Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  8. Network Anomaly Detection Based on Wavelet Analysis

    Directory of Open Access Journals (Sweden)

    Ali A. Ghorbani

    2008-11-01

    Full Text Available Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  9. Improving seroreactivity-based detection of glioma.

    Science.gov (United States)

    Ludwig, Nicole; Keller, Andreas; Heisel, Sabrina; Leidinger, Petra; Klein, Veronika; Rheinheimer, Stefanie; Andres, Claudia U; Stephan, Bernhard; Steudel, Wolf-Ingo; Graf, Norbert M; Burgeth, Bernhard; Weickert, Joachim; Lenhof, Hans-Peter; Meese, Eckart

    2009-12-01

    Seroreactivity profiling emerges as valuable technique for minimal invasive cancer detection. Recently, we provided first evidence for the applicability of serum profiling of glioma using a limited number of immunogenic antigens. Here, we screened 57 glioma and 60 healthy sera for autoantibodies against 1827 Escherichia coli expressed clones, including 509 in-frame peptide sequences. By a linear support vector machine approach, we calculated mean specificity, sensitivity, and accuracy of 100 repetitive classifications. We were able to differentiate glioma sera from sera of the healthy controls with a specificity of 90.28%, a sensitivity of 87.31% and an accuracy of 88.84%. We were also able to differentiate World Health Organization grade IV glioma sera from healthy sera with a specificity of 98.45%, a sensitivity of 80.93%, and an accuracy of 92.88%. To rank the antigens according to their information content, we computed the area under the receiver operator characteristic curve value for each clone. Altogether, we found 46 immunogenic clones including 16 in-frame clones that were informative for the classification of glioma sera versus healthy sera. For the separation of glioblastoma versus healthy sera, we found 91 informative clones including 26 in-frame clones. The best-suited in-frame clone for the classification glioma sera versus healthy sera corresponded to the vimentin gene (VIM) that was previously associated with glioma. In the future, autoantibody signatures in glioma not only may prove useful for diagnosis but also offer the prospect for a personalized immune-based therapy. PMID:20019846

  10. Improving Seroreactivity-Based Detection of Glioma

    Directory of Open Access Journals (Sweden)

    Nicole Ludwig

    2009-12-01

    Full Text Available Seroreactivity profiling emerges as valuable technique for minimal invasive cancer detection. Recently, we provided first evidence for the applicability of serum profiling of glioma using a limited number of immunogenic antigens. Here, we screened 57 glioma and 60 healthy sera for autoantibodies against 1827 Escherichia coli expressed clones, including 509 in-frame peptide sequences. By a linear support vector machine approach, we calculated mean specificity, sensitivity, and accuracy of 100 repetitive classifications. We were able to differentiate glioma sera from sera of the healthy controls with a specificity of 90.28%, a sensitivity of 87.31% and an accuracy of 88.84%. We were also able to differentiate World Health Organization grade IV glioma sera from healthy sera with a specificity of 98.45%, a sensitivity of 80.93%, and an accuracy of 92.88%. To rank the antigens according to their information content, we computed the area under the receiver operator characteristic curve value for each clone. Altogether, we found 46 immunogenic clones including 16 in-frame clones that were informative for the classification of glioma sera versus healthy sera. For the separation of glioblastoma versus healthy sera, we found 91 informative clones including 26 in-frame clones. The best-suited in-frame clone for the classification glioma sera versus healthy sera corresponded to the vimentin gene (VIM that was previously associated with glioma. In the future, autoantibody signatures in glioma not only may prove useful for diagnosis but also offer the prospect for a personalized immune-based therapy.

  11. Genome instability of mis-match repair and its role in carcinogenesis due to radiation

    Energy Technology Data Exchange (ETDEWEB)

    Munakata, Nobuo; Morohoshi, Fumiko [National Cancer Center, Tokyo (Japan). Research Inst

    1999-02-01

    Homologue genes, mutS and mutL have been known as a key gene for mismatch repair in E. coli. In this study, identification of such homologue genes in the nematode was attempted using caenorhabditis elegans and three kinds of mutS homologues (mshG, mshZ and mshF) and 2 kinds of mutL ones were identified. From after isolation of these genes, base sequences were analyzed. Then, an insertion mutant in which Tcl transposon is inserted in Exon 13 positioned at the center of mshF was screened and its homozygote where breakage of transposon in somatic cells occurred frequently was obtained and its morphological changes were not significant. In the nematoda, we detected a highly conserved domain in mutS family gene, which is commonly present in yeast and human genes. Based on the amino acid sequence of this domain, four kinds of primers were constructed for PCR reaction using the whole DNA from the nematoda as a template and four DNA fragments of which sizes were almost corresponding to the homologue proteins were produced. From screening of Tc1 insertion mutant for 8 mismatch repair genes, three strains; mshF, rqhW and RqhY were obtained and the gene structures and the positions of Tc1 insertion in these strains were determined. The sensitivities to ionizing radiation, UV and alkyl reagent of these strains were not significantly different from those of the wild strain. (M.N.)

  12. Kinetics and binding of the thymine-DNA mismatch glycosylase, Mig-Mth, with mismatch-containing DNA substrates.

    Science.gov (United States)

    Begley, Thomas J; Haas, Brian J; Morales, Juan C; Kool, Eric T; Cunningham, Richard P

    2003-01-01

    We have examined the removal of thymine residues from T-G mismatches in DNA by the thymine-DNA mismatch glycosylase from Methanobacterium thermoautrophicum (Mig-Mth), within the context of the base excision repair (BER) pathway, to investigate why this glycosylase has such low activity in vitro. Using single-turnover kinetics and steady-state kinetics, we calculated the catalytic and product dissociation rate constants for Mig-Mth, and determined that Mig-Mth is inhibited by product apyrimidinic (AP) sites in DNA. Electrophoretic mobility shift assays (EMSA) provide evidence that the specificity of product binding is dependent upon the base opposite the AP site. The binding of Mig-Mth to DNA containing the non-cleavable substrate analogue difluorotoluene (F) was also analyzed to determine the effect of the opposite base on Mig-Mth binding specificity for substrate-like duplex DNA. The results of these experiments support the idea that opposite strand interactions play roles in determining substrate specificity. Endonuclease IV, which cleaves AP sites in the next step of the BER pathway, was used to analyze the effect of product removal on the overall rate of thymine hydrolysis by Mig-Mth. Our results support the hypothesis that endonuclease IV increases the apparent activity of Mig-Mth significantly under steady-state conditions by preventing reassociation of enzyme to product. PMID:12509271

  13. Detecting Bots Based on Keylogging Activities

    CERN Document Server

    Al-Hammadi, Yousof

    2010-01-01

    A bot is a piece of software that is usually installed on an infected machine without the user's knowledge. A bot is controlled remotely by the attacker under a Command and Control structure. Recent statistics show that bots represent one of the fastest growing threats to our network by performing malicious activities such as email spamming or keylogging. However, few bot detection techniques have been developed to date. In this paper, we investigate a behavioural algorithm to detect a single bot that uses keylogging activity. Our approach involves the use of function calls analysis for the detection of the bot with a keylogging component. Correlation of the frequency of a specified time-window is performed to enhance he detection scheme. We perform a range of experiments with the spybot. Our results show that there is a high correlation between some function calls executed by this bot which indicates abnormal activity in our system.

  14. Anomica: Fast Support Vector Based Novelty Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we propose ν-Anomica, a novel anomaly detection technique that can be trained on huge data sets with much reduced running time compared to the...

  15. Detection of Atmospheric Composition Based on Lidar

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Jinye; Tong Yala; Yang Xiaoling; Gong Jiaoli [School of science, Hubei University of Technology, Wuhan 430068 (China); Gong Wei, E-mail: yezi.zh@163.com [State Key Laboratory for Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, Wuhan 430079 (China)

    2011-02-01

    A summary overview about the types of lidar and their own applications on atmosphere detection is presented. Measurement of atmospheric aerosols by Mie lidar and Raman lidar is focused. The vertical profiles of aerosols in the atmosphere are retrieved. And at the same time, through analyzing aerosol vertical content distribution, the atmosphere boundary layer and the cloud are also observed. All the results show that the lidar has good performance on detecting the atmospheric composition.

  16. Vision-based vehicle detection and tracking algorithm design

    Science.gov (United States)

    Hwang, Junyeon; Huh, Kunsoo; Lee, Donghwi

    2009-12-01

    The vision-based vehicle detection in front of an ego-vehicle is regarded as promising for driver assistance as well as for autonomous vehicle guidance. The feasibility of vehicle detection in a passenger car requires accurate and robust sensing performance. A multivehicle detection system based on stereo vision has been developed for better accuracy and robustness. This system utilizes morphological filter, feature detector, template matching, and epipolar constraint techniques in order to detect the corresponding pairs of vehicles. After the initial detection, the system executes the tracking algorithm for the vehicles. The proposed system can detect front vehicles such as the leading vehicle and side-lane vehicles. The position parameters of the vehicles located in front are obtained based on the detection information. The proposed vehicle detection system is implemented on a passenger car, and its performance is verified experimentally.

  17. Visual mismatch negativity: A predictive coding view

    Directory of Open Access Journals (Sweden)

    Gabor eStefanics

    2014-09-01

    Full Text Available An increasing number of studies investigate the visual mismatch negativity (vMMN or use the vMMN as a tool to probe various aspects of human cognition. This paper reviews the theoretical underpinnings of vMMN in the light of methodological considerations and provides recommendations for measuring and interpreting the vMMN. The following key issues are discussed from the experimentalist’s point of view in a predictive coding framework: 1 experimental protocols and procedures to control ‘refractoriness’ effects; 2 methods to control attention; 3 vMMN and veridical perception.

  18. Barbed Congruence of Asymmetry and Mismatch

    Institute of Scientific and Technical Information of China (English)

    Xiao-Ju Dong; Yu-Xi Fu

    2007-01-01

    The X calculus is a model of concurrent and mobile systems. It emphasizes that communications are information exchanges. In the paper, two constructions are incorporated into the framework of the chi calculus, which are asymmetric communication and mismatch condition widely used in applications. Since the barbed bisimilarity has proved its generality and gained its popularity as an effective approach to generating a reasonable observational equivalence, we study both the operational and algebraic properties of the barbed bisimilarity in this enriched calculus. The investigation supports an improved understanding of the bisimulation behaviors of the model. It also gives a general picture of how the two constructions affect the observational theory.

  19. Characterization of PolyA and PolyC mismatches by Raman spectroscopy

    Institute of Scientific and Technical Information of China (English)

    Yubo Liao; Yaoyong Meng; Haodong Lei; Ying Wang

    2008-01-01

    A.C mismatches are studied by Raman spectral characterization of PolyA, PolyC, and their equimolar complex in solution of 0.14 mol/L Na+,pH7.0.Experimental results show that A·C mismatches occur to be A/B (mainly A) conformers, and unlike Watson-Crick base pairing, this kind of mismatches is stabilized by only one hydrogen bond involving cytosine N4H2 and adenine N7.The formation of A·C complex makes the base stacking interactions much stronger, and conformation of the backbone more ordered, which leads to obvious Raman hypochromic effect with some shifts in corresponding bands.

  20. Concentrative meditation enhances preattentive processing: a mismatch negativity study.

    Science.gov (United States)

    Srinivasan, Narayanan; Baijal, Shruti

    2007-10-29

    The mismatch negativity (MMN) paradigm that is an indicator of preattentive processing was used to study the effects of concentrative meditation. Sudarshan Kriya Yoga meditation is a yogic exercise practiced in an ordered sequence beginning with breathing exercises, and ending with concentrative (Sahaj Samadhi) meditation. Auditory MMN waveforms were recorded at the beginning and after each of these practices for meditators, and equivalently after relaxation sessions for the nonmeditators. Overall meditators were found to have larger MMN amplitudes than nonmeditators. The meditators also exhibited significantly increased MMN amplitudes immediately after meditation suggesting transient state changes owing to meditation. The results indicate that concentrative meditation practice enhances preattentive perceptual processes, enabling better change detection in auditory sensory memory.

  1. Adaptive skin detection based on online training

    Science.gov (United States)

    Zhang, Ming; Tang, Liang; Zhou, Jie; Rong, Gang

    2007-11-01

    Skin is a widely used cue for porn image classification. Most conventional methods are off-line training schemes. They usually use a fixed boundary to segment skin regions in the images and are effective only in restricted conditions: e.g. good lightness and unique human race. This paper presents an adaptive online training scheme for skin detection which can handle these tough cases. In our approach, skin detection is considered as a classification problem on Gaussian mixture model. For each image, human face is detected and the face color is used to establish a primary estimation of skin color distribution. Then an adaptive online training algorithm is used to find the real boundary between skin color and background color in current image. Experimental results on 450 images showed that the proposed method is more robust in general situations than the conventional ones.

  2. Community Detection Based on Link Prediction Methods

    CERN Document Server

    Cheng, Hui-Min

    2016-01-01

    Community detection and link prediction are both of great significance in network analysis, which provide very valuable insights into topological structures of the network from diffrent perspectives. In this paper, we propose a novel community detection algorithm with inclusion of link prediction, motivated by the question whether link prediction can be devoted to improve the accuracy of community partition. For link prediction, we propose two novel indices to compute the similarity between each pair of nodes, one of which aims to add missing links, and the other tries to remove spurious edges. Extensive experiments are conducted on benchmark data sets, and the results of our proposed algorithm are compared with two classes of baselines. In conclusion, our proposed algorithm is competitive, revealing that link prediction does improve the precision of community detection.

  3. Antibody-based biological toxin detection

    Energy Technology Data Exchange (ETDEWEB)

    Menking, D.E.; Goode, M.T. [Army Edgewood Research, Development and Engineering Center, Aberdeen Proving Ground, MD (United States)

    1995-12-01

    Fiber optic evanescent fluorosensors are under investigation in our laboratory for the study of drug-receptor interactions for detection of threat agents and antibody-antigen interactions for detection of biological toxins. In a direct competition assay, antibodies against Cholera toxin, Staphylococcus Enterotoxin B or ricin were noncovalently immobilized on quartz fibers and probed with fluorescein isothiocyanate (FITC) - labeled toxins. In the indirect competition assay, Cholera toxin or Botulinum toxoid A was immobilized onto the fiber, followed by incubation in an antiserum or partially purified anti-toxin IgG. These were then probed with FITC-anti-IgG antibodies. Unlabeled toxins competed with labeled toxins or anti-toxin IgG in a dose dependent manner and the detection of the toxins was in the nanomolar range.

  4. What Do Educational Mismatches Tell Us About Skill Mismatches? A Cross-country Analysis

    NARCIS (Netherlands)

    Allen, Jim; Weert, de Egbert

    2007-01-01

    The relationship between higher education and employment is commonly interpreted in terms of the extent to which the higher education sector is providing graduates with the knowledge and skills to match employment needs. It is assumed that a mismatch between working in a job and level or field of ed

  5. Label-Free Dengue Detection Utilizing PNA/DNA Hybridization Based on the Aggregation Process of Unmodified Gold Nanoparticles

    Directory of Open Access Journals (Sweden)

    Samsulida Abdul Rahman

    2014-01-01

    Full Text Available A label-free optical detection method based on PNA/DNA hybridization using unmodified gold nanoparticles (AuNPs for dengue virus detection has been successfully developed. In this study, no immobilization method is involved and the hybridization of PNA/DNA occurs directly in solution. Unmodified AuNPs undergo immediate aggregation in the presence of neutral charge peptide nucleic acid (PNA due to the coating of PNA on AuNPs surface. However, in the presence of complementary targets DNA, the hybridization of PNA probe with target DNA forms negatively charged complexes due to the negatively charged phosphate backbone of the target DNA. The negatively charged complexes adsorbed onto the AuNPs surface ensure sufficient charge repulsion, need for AuNPs dispersion, and stability in solution. The detection procedure is a naked eye method based on immediate color changes and also through UV-vis adsorption spectra. The selectivity of the proposed method was studied successfully by single base mismatch and noncomplementary target DNA.

  6. Genome instability in mismatch repair and its role on radiation-induced cancer

    Energy Technology Data Exchange (ETDEWEB)

    Munakata, Nobuo; Morohoshi, Fumiko [National Cancer Center, Tokyo (Japan). Research Inst

    2000-02-01

    Studies on mismatch repair mechanism have been progressed using Caenorhabditis elegans, a nematode since its genetic analysis is comparatively easy. In this study, homologue gene for mismatch repairing of nematoda were investigated and 3 kinds of homologue genes of mut S; msh G, msh Z and msh F and two kinds of mut L homologue genes were identified. Based on these genes, each cDNA was isolated aiming to determine the sequence and clarify the phylogenetic relationship. Either of msh G, msh Z and msh F is present in the cDNA library, suggesting that these genes might be expressed in every stage of development. Northern analysis was made using the RNA fractions extracted from nematoda at various stages of development as a probe for cDNA of msh G and msh Z, and each corresponding bands were detected for the imago and the matured larva, but not so distinct for the larva and embryo, suggesting that both genes would be regulated in the transcription step at each development stage. Then, resistant larva in which Tcl transposon is activated was cultured and its DNA was extracted to use as a template DNA. Thus, Tcl transposon inserted strains for three of 8 repair related genes were obtained. The passages of these strains were kept comparatively stable. However, the sensitivities to ionizing radiation, ultraviolet light and alkyl agents of these inserted strains were not so different from the control. PCR reaction revealed that DNA fragments of which Tcl was excluded were produced in a certain stage of development. This suggest in vivo exclusion of Tcl in somatic cells. (M.N.)

  7. Flow-Based Detection of DNS Tunnels

    NARCIS (Netherlands)

    W. Ellens; P. Żuraniewski; A. Sperotto; H. Schotanus; M. Mandjes; E. Meeuwissen

    2013-01-01

    DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniq

  8. Contour Detection Operators Based on Surround Inhibition

    NARCIS (Netherlands)

    Grigorescu, Cosmin; Petkov, Nicolai; Westenberg, Michel A.

    2003-01-01

    We propose a biologically motivated computational step, called non-classical receptive field (non-CRF) inhibition, to improve contour detection in images of natural scenes. We augment a Gabor energy operator with non-CRF inhibition. The resulting contour operator responds strongly to isolated lines,

  9. Flow-based detection of DNS tunnels

    NARCIS (Netherlands)

    Ellens, W.; Zuraniewski, P.W.; Sperotto, A.; Schotanus, H.A.; Mandjes, M.; Meeuwissen, H.B.

    2013-01-01

    DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniq

  10. Memory detection 2.0: the first web-based memory detection test.

    Science.gov (United States)

    Kleinberg, Bennett; Verschuere, Bruno

    2015-01-01

    There is accumulating evidence that reaction times (RTs) can be used to detect recognition of critical (e.g., crime) information. A limitation of this research base is its reliance upon small samples (average n = 24), and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262) tried to hide 2 high salient (birthday, country of origin) and 2 low salient (favourite colour, favourite animal) autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research.

  11. Memory detection 2.0: the first web-based memory detection test.

    Directory of Open Access Journals (Sweden)

    Bennett Kleinberg

    Full Text Available There is accumulating evidence that reaction times (RTs can be used to detect recognition of critical (e.g., crime information. A limitation of this research base is its reliance upon small samples (average n = 24, and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262 tried to hide 2 high salient (birthday, country of origin and 2 low salient (favourite colour, favourite animal autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research.

  12. HLA-DR and -DQ eplet mismatches and transplant glomerulopathy: a nested case-control study.

    Science.gov (United States)

    Sapir-Pichhadze, R; Tinckam, K; Quach, K; Logan, A G; Laupacis, A; John, R; Beyene, J; Kim, S J

    2015-01-01

    We conducted a nested case-control study from a cohort of adult kidney transplant recipients to assess the risk of transplant glomerulopathy (TG) as a function of donor and recipient HLA-DR and -DQ incompatibility at the eplet level. Cases (n = 52) were defined as patients diagnosed with transplant glomerulopathy based on biopsies showing glomerular basement membrane duplication without immune complex deposition. Controls (n = 104) with a similar follow-up from transplantation were randomly selected from the remaining cohort. HLAMatchmaker was used to ascertain the number of DRB1/3/4/5, DQA1 and DQB1 related eplet mismatches (eplet load). Multivariable conditional logistic regression models demonstrated an increase in the odds of TG (odds ratios [OR] of 2.84 [95% confidence interval (CI): 1.03, 7.84] and 4.62 [95% CI: 1.51, 14.14]) in the presence of 27-43 and >43 HLA-DR + DQ related eplet mismatches versus <27 eplet mismatches, respectively. When the eplet load was modeled as a continuous variable, the OR for TG was 1.25 (95% CI: 1.04, 1.50) for every 10 additional HLA-DR + DQ eplet mismatches. Our study suggests that minimization of HLA-DR + DQ eplet mismatches may decrease the incidence of transplant glomerulopathy diagnosed by indication biopsies. The role of eplet immunogenicity/antigenicity as determinants of allograft outcomes requires further study. PMID:25521856

  13. The switch rail detection system based on laser sensor

    Directory of Open Access Journals (Sweden)

    Sa Ji Ming

    2016-01-01

    Full Text Available As a carrier, turnout is an extremely important part of transport, when railways is operating. So the detection of turnout should meet the requirement. However, the detection effort is mainly completed manually at the present stage, which is low accuracy. Thus the study of the switch rail detection system based on laser sensor is necessary. In this paper, we discuss the scheme of the switch rail detection by using Gocator 2030 laser sensor and SIMENS 840D numerical control system. We study the algorithm and data collection of the switch rail detection based on laser sensor. This detection system provides accurate data collection and information display for the enterprise of producing turnout. After the test, the system has a faster detection speed and higher detection accuracy.

  14. Effective analysis of cloud based intrusion detection system

    Directory of Open Access Journals (Sweden)

    Sanjay Ram

    2012-08-01

    Full Text Available The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS. People are paid more attention on intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, detecting all kinds of intrusions effectively requires a global view of the monitored network, Here, discuss about new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

  15. Controllable Mismatched Ligation for Bioluminescence Screening of Known and Unknown Mutations.

    Science.gov (United States)

    Xu, Qinfeng; Huang, Si-qiang; Ma, Fei; Tang, Bo; Zhang, Chun-yang

    2016-02-16

    Single-nucleotide polymorphisms (SNPs) are closely related to human diseases and individual drug responses, and the accurate detection of SNPs is crucial to both clinical diagnosis and development of personalized medicine. Among various SNPs detection methods, ligase detection reaction (LDR) has shown great potential due to its low detection limit and excellent specificity. However, frequent involvement of expensive labels increases the experimental cost and compromises the assay efficiency, and the requirement of careful predesigned probes limits it to only known SNPs assays. In this research, we develop a controllable mismatched ligation for bioluminescence screening of both known and unknown mutations. Especially, the ligation specificity of E. coli ligase is tunable under different experimental conditions. The mismatches locating on the 3'-side of the nick cannot be ligated efficiently by E. coli ligase, whereas all mismatches locating on the 5'-side of the nick can be ligated efficiently by E. coli ligase. We design a 3'-discriminating probe (3'-probe) for the discrimination of known mutation and introduce a T7 Endo I for the detection of unknown mutation. With the integration of bioluminescence monitoring of ligation byproduct adenosine 5'-monophosphate (AMP), both known and unknown SNPs can be easily detected without the involvement of any expensive labels and labor-intensive separation. This method is simple, homogeneous, label-free, and cost-effective and may provide a valuable complement to current sequencing technologies for disease diagnostics, personalized medicine, and biomedical research. PMID:26754165

  16. Mismatch responses in the awake rat: evidence from epidural recordings of auditory cortical fields.

    Directory of Open Access Journals (Sweden)

    Fabienne Jung

    Full Text Available Detecting sudden environmental changes is crucial for the survival of humans and animals. In the human auditory system the mismatch negativity (MMN, a component of auditory evoked potentials (AEPs, reflects the violation of predictable stimulus regularities, established by the previous auditory sequence. Given the considerable potentiality of the MMN for clinical applications, establishing valid animal models that allow for detailed investigation of its neurophysiological mechanisms is important. Rodent studies, so far almost exclusively under anesthesia, have not provided decisive evidence whether an MMN analogue exists in rats. This may be due to several factors, including the effect of anesthesia. We therefore used epidural recordings in awake black hooded rats, from two auditory cortical areas in both hemispheres, and with bandpass filtered noise stimuli that were optimized in frequency and duration for eliciting MMN in rats. Using a classical oddball paradigm with frequency deviants, we detected mismatch responses at all four electrodes in primary and secondary auditory cortex, with morphological and functional properties similar to those known in humans, i.e., large amplitude biphasic differences that increased in amplitude with decreasing deviant probability. These mismatch responses significantly diminished in a control condition that removed the predictive context while controlling for presentation rate of the deviants. While our present study does not allow for disambiguating precisely the relative contribution of adaptation and prediction error processing to the observed mismatch responses, it demonstrates that MMN-like potentials can be obtained in awake and unrestrained rats.

  17. Generalization of GLRT-Based Magnetic Anomaly Detection

    OpenAIRE

    Pepe, Pascal; Zozor, Steeve; Rouve, Laure-Line; Coulomb, Jean-Louis; Servière, Christine; Muley, Jean

    2015-01-01

    International audience Magnetic anomaly detection (MAD) refers to a passive method used to reveal hidden magnetic masses and is most commonly based on a dipolar target model. This paper proposes a generalization of the MAD through a multipolar model that provides a more precise description of the anomaly and serves a twofold objective: to improve the detection performance , and to widen the variety of detectable targets. The dipole detection strategy – namely an orthonormal decomposition o...

  18. A Novel Chip-based Spectrophotometer for Online Detection

    Institute of Scientific and Technical Information of China (English)

    Haoyuan Cai; Min-Hsien Wu; Zheng Cui

    2006-01-01

    A chip-based spectrophotometer integrated with optical fiber is successfully demonstrated. Grade concentration of lactate solution flowed through the chip to perform an online detection. The response time (100s) and Limit of Detection (LOD,50mg/L) of the device were measured. This device shows comparable performance with traditional commercial instrument,while greatly decreases the sample requirement per detection and reduces the size of total system, introducing a novel method for real-time detection.

  19. Hybrid Collision Detection Algorithm based on Image Space

    Directory of Open Access Journals (Sweden)

    XueLi Shen

    2013-07-01

    Full Text Available Collision detection is an important application in the field of virtual reality, and efficiently completing collision detection has become the research focus. For the poorly real-time defect of collision detection, this paper has presented an algorithm based on the hybrid collision detection, detecting the potential collision object sets quickly with the mixed bounding volume hierarchy tree, and then using the streaming pattern collision detection algorithm to make an accurate detection. With the above methods, it can achieve the purpose of balancing load of the CPU and GPU and speeding up the detection rate. The experimental results show that compared with the classic Rapid algorithm, this algorithm can effectively improve the efficiency of collision detection.

  20. A frontal attention mechanism in the visual mismatch negativity

    Science.gov (United States)

    Hedge, Craig; Stothart, George; Todd Jones, Jenna; Rojas Frías, Priscila; Magee, Kristopher Lundy; Brooks, Jonathan C.W.

    2015-01-01

    Automatic detection of environmental change is a core component of attention. The mismatch negativity (MMN), an electrophysiological marker of this mechanism, has been studied prominently in the auditory domain, with cortical generators identified in temporal and frontal regions. Here, we combined electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) to assess whether the underlying frontal regions associated with auditory change detection also play a role in visual change detection. Twenty healthy young adults completed a visual MMN task in separate EEG and fMRI sessions. Region of interest analyses were conducted on left and right middle frontal (MFG) and inferior frontal (IFG) gyri, i.e., the frontal areas identified as potential auditory MMN generators. A significant increase in activation was observed in the left IFG and MFG in response to blocks containing deviant stimuli. These findings suggest that a frontal mechanism is involved in the detection of change in the visual MMN. Our results support the notion that frontal mechanisms underlie attention switching, as measured via MMN, across multiple modalities. PMID:26183650

  1. An Immunity-Based Anomaly Detection System with Sensor Agents

    Directory of Open Access Journals (Sweden)

    Yoshiteru Ishida

    2009-11-01

    Full Text Available This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user’s command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems.

  2. How relevant is job mismatch for German graduates?

    OpenAIRE

    Berlingieri, Francesco; Erdsiek, Daniel

    2012-01-01

    In this study, we examine the incidence and direct consequences of job mismatch for German graduates. Beyond measuring job mismatch by the comparison of qualification obtained by employees and required for a job, we employ self-reported skill mismatch variables concerning overall skills and more detailed information about the surplus or deficit in specific competences. The results indicate that a substantial share of graduates underutilizes own skills in the job. The rate of overqualification...

  3. Anomaly-based Network Intrusion Detection Methods

    Directory of Open Access Journals (Sweden)

    Pavel Nevlud

    2013-01-01

    Full Text Available The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks.

  4. Improving Seroreactivity-Based Detection of Glioma

    OpenAIRE

    Nicole Ludwig; Andreas Keller; Sabrina Heisel; Petra Leidinger; Veronika Klein; Stefanie Rheinheimer; Andres, Claudia U; Bernhard Stephan; Wolf-Ingo Steudel; Graf, Norbert M; Bernhard Burgeth; Joachim Weickert; Hans-Peter Lenhof; Eckart Meese

    2009-01-01

    Seroreactivity profiling emerges as valuable technique for minimal invasive cancer detection. Recently, we provided first evidence for the applicability of serum profiling of glioma using a limited number of immunogenic antigens. Here, we screened 57 glioma and 60 healthy sera for autoantibodies against 1827 Escherichia coli expressed clones, including 509 in-frame peptide sequences. By a linear support vector machine approach, we calculated mean specificity, sensitivity, and accuracy of 100 ...

  5. FACIAL EXPRESSION RECOGNITION BASED ON EDGE DETECTION

    OpenAIRE

    Chen, Xiaoming; Cheng, Wushan

    2015-01-01

    Relational Over the last two decades, the advances in computer vision and pattern recognition power have opened the door to new opportunity of automatic facial expression recognition system[1]. This paper use Canny edge detection method for facial expression recognition. Image color space transformation in the first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's features extraction. Last we judge the facial expressions after compared wi...

  6. Aptamer Based Microsphere Biosensor for Thrombin Detection

    OpenAIRE

    Xudong Fan; White, Ian M.; Suter, Jonathan D.; Hongying Zhu

    2006-01-01

    We have developed an optical microsphere resonator biosensor using aptamer as receptor for the measurement of the important biomolecule thrombin. The sphere surface is modified with anti-thrombin aptamer, which has excellent binding affinity and selectivity for thrombin. Binding of the thrombin at the sphere surface is monitored by the spectral position of the microsphere's whispering gallery mode resonances. A detection limit on the order of 1 NIH Unit/mL is demonstrated. Control experiments...

  7. Fuzzy Based Anomaly Intrusion Detection System for Clustered WSN

    OpenAIRE

    Sumathy Murugan; Sundara Rajan, M.

    2015-01-01

    In Wireless Sensor Networks (WSN), the intrusion detection technique may result in increased computational cost, packet loss, performance degradation and so on. In order to overcome these issues, in this study, we propose a fuzzy based anomaly intrusion detection system for clustered WSN. Initially the cluster heads are selected based on the parameters such as link quality, residual energy and coverage. Then the anomaly intrusion is detected using fuzzy logic technique. This technique conside...

  8. Automatic hearing loss detection system based on auditory brainstem response

    Energy Technology Data Exchange (ETDEWEB)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R [Laboratorio de Ingenieria en Rehabilitacion e Investigaciones Neuromusculares y Sensoriales (Argentina); Facultad de Ingenieria, Universidad Nacional de Entre Rios, Ruta 11 - Km 10, Oro Verde, Entre Rios (Argentina)

    2007-11-15

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory.

  9. Method for detecting software anomalies based on recurrence plot analysis

    Directory of Open Access Journals (Sweden)

    Michał Mosdorf

    2012-03-01

    Full Text Available Presented paper evaluates method for detecting software anomalies based on recurrence plot analysis of trace log generated by software execution. Described method for detecting software anomalies is based on windowed recurrence quantification analysis for selected measures (e.g. Recurrence rate - RR or Determinism - DET. Initial results show that proposed method is useful in detecting silent software anomalies that do not result in typical crashes (e.g. exceptions.

  10. Automatic hearing loss detection system based on auditory brainstem response

    Science.gov (United States)

    Aldonate, J.; Mercuri, C.; Reta, J.; Biurrun, J.; Bonell, C.; Gentiletti, G.; Escobar, S.; Acevedo, R.

    2007-11-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory.

  11. Poseidon: a 2-tier anomaly-based intrusion detection system

    NARCIS (Netherlands)

    Bolzoni, Damiano; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection r

  12. An IQ mismatch calibration and compensation technique for wideband wireless transceivers

    Science.gov (United States)

    Jin, Peng; Liguo, Zhou; Heng, Yao; Fang, Yuan; Zhi, Fang; Yin, Shi

    2014-08-01

    An IQ mismatch calibration and compensation technique based on the digital baseband for wideband wireless communication transmitters is proposed. The digital baseband transmits the signal used for IQ mismatch calibration. The signal passes through the RF transmitter path, the calibration loop (which is composed of a square power detector and a band-pass filter in the RF transceiver) and the variable gain amplifier of the receiver. The digital baseband samples the signal for IQ mismatch estimation and compensates for it. Compared with the self-calibration technique in the RF chip, the proposed technique saves area and power consumption for the wireless local area network solution. This technique has been successfully used for the 802.11n system and satisfies the requirement of the standard by achieving over 50 dB image suppression.

  13. An IQ mismatch calibration and compensation technique for wideband wireless transceivers

    International Nuclear Information System (INIS)

    An IQ mismatch calibration and compensation technique based on the digital baseband for wideband wireless communication transmitters is proposed. The digital baseband transmits the signal used for IQ mismatch calibration. The signal passes through the RF transmitter path, the calibration loop (which is composed of a square power detector and a band-pass filter in the RF transceiver) and the variable gain amplifier of the receiver. The digital baseband samples the signal for IQ mismatch estimation and compensates for it. Compared with the self-calibration technique in the RF chip, the proposed technique saves area and power consumption for the wireless local area network solution. This technique has been successfully used for the 802.11n system and satisfies the requirement of the standard by achieving over 50 dB image suppression. (semiconductor integrated circuits)

  14. 免疫组织化学法检测结直肠癌四种 DNA错配修复蛋白表达缺失对判断肿瘤微卫星状态的价值%Value of detection of DNA mismatch repair proteins deficiency by immunohistochemistry in predicting tumor microsatellite status

    Institute of Scientific and Technical Information of China (English)

    秦云; 梁莉萍; 郑兴征; 郑杰; 叶菊香; 郭丽梅; 赵峰; 石雪迎

    2015-01-01

    expression was defined as complete absence of nuclear staining within tumor cells in the presence of positively labeled internal non-neoplastic cells.Focal staining was defined as the presence of staining in <5% of the tumor cells.CRCs showing negative staining for any MMR proteins were interpreted as MMR deficient tumors . PCR-genescan MSI analysis was performed in each case by a five marker panel including Bat 26, Bat25, NR-21, NR-24 and MONO-27.Results Among the 140 CRCs with routine formalin-fixed paraffin embedded tissue sections , concordance rate between IHC and PCR-genescan was 98.6% ( 138/140 ) , the sensitivity and specificity of IHC in detecting MSI tumors were 94.9% ( 37/39 ) and 100.0% ( 101/101 ) , respectively.The 2 disconcordant cases showed focal staining in at least one of the MMR proteins but were confirmed to be MSI-H CRCs by PCR-genescan assay.On tissue microarray, 91.3% (105/115) of the cases had informative results . The concordance rate between IHC and PCR-genescan was 100.0%(105/105).Both the specificity and sensitivity of IHC in detecting MSI tumors on available tissue microarray samples were 100.0%.Ten cases were inclusive due to the presence of negative stains of MMR proteins in both the tumor and internal control cells .Conclusions Detection of 4 MMR proteins expression by IHC is reliable for identifying MSI CRCs and is recommended for routine practice .Tumors with focal MMR protein staining are highly suspected for the presence of MSI-H and PCR-genescan based MSI analysis should be performed to confirm .

  15. Background Subtraction Algorithm Based Human Behavior Detection

    Directory of Open Access Journals (Sweden)

    Prof. D. D. Dighe

    2014-07-01

    Full Text Available Consider all the features of subset information in video streaming there is a tremendous processes with real time applications. In this paper we introduce and develop a new video surveillance system. Using this technique we detect human normal and exponential behaviors in realistic format, and also we categories data event generation of human tracking in real time applications. In this technique we apply differencing, threshold segmentation, morphological operations and object tracking. The experimental result show efficient human tracking in video streaming operations.

  16. Frequency Based Fault Detection in Wind Turbines

    DEFF Research Database (Denmark)

    Odgaard, Peter Fogh; Stoustrup, Jakob

    2014-01-01

    In order to obtain lower cost of energy for wind turbines fault detection and accommodation is important. Expensive condition monitoring systems are often used to monitor the condition of rotating and vibrating system parts. One example is the gearbox in a wind turbine. This system is operated...... gearbox. Only the generator speed measurement which is available in even simple wind turbine control systems is used as input. Consequently this proposed scheme does not need additional sensors and computers for monitoring the condition of the wind gearbox. The scheme is evaluated on a wide-spread wind...

  17. Accelerometry-based home monitoring for detection of nocturnal hypermotor seizures based on novelty detection.

    Science.gov (United States)

    Cuppens, Kris; Karsmakers, Peter; Van de Vel, Anouk; Bonroy, Bert; Milosevic, Milica; Luca, Stijn; Croonenborghs, Tom; Ceulemans, Berten; Lagae, Lieven; Van Huffel, Sabine; Vanrumste, Bart

    2014-05-01

    Nocturnal home monitoring of epileptic children is often not feasible due to the cumbersome manner of seizure monitoring with the standard method of video/EEG-monitoring. We propose a method for hypermotor seizure detection based on accelerometers attached to the extremities. From the acceleration signals, multiple temporal, frequency, and wavelet-based features are extracted. After determining the features with the highest discriminative power, we classify movement events in epileptic and nonepileptic movements. This classification is only based on a nonparametric estimate of the probability density function of normal movements. Such approach allows us to build patient-specific models to classify movement data without the need for seizure data that are rarely available. If, in the test phase, the probability of a data point (event) is lower than a threshold, this event is considered to be an epileptic seizure; otherwise, it is considered as a normal nocturnal movement event. The mean performance over seven patients gives a sensitivity of 95.24% and a positive predictive value of 60.04%. However, there is a noticeable interpatient difference. PMID:24122607

  18. GLRT Based Anomaly Detection for Sensor Network Monitoring

    KAUST Repository

    Harrou, Fouzi

    2015-12-07

    Proper operation of antenna arrays requires continuously monitoring their performances. When a fault occurs in an antenna array, the radiation pattern changes and can significantly deviate from the desired design performance specifications. In this paper, the problem of fault detection in linear antenna arrays is addressed within a statistical framework. Specifically, a statistical fault detection method based on the generalized likelihood ratio (GLR) principle is utilized for detecting potential faults in linear antenna arrays. The proposed method relies on detecting deviations in the radiation pattern of the monitored array with respect to a reference (fault-free) one. To assess the abilities of the GLR based fault detection method, three case studies involving different types of faults have been performed. The simulation results clearly illustrate the effectiveness of the GLR-based fault detection method in monitoring the performance of linear antenna arrays.

  19. EMAIL - A Highly Sensitive Tool for Specific Mutation Detection in Plant Improvement Programmes

    International Nuclear Information System (INIS)

    TILLING (Targeting Induced Local Lesions IN Genomes) is a useful tool for discovery of specific point mutations in genes of interest to plant breeders. It employs mismatch cleavage detection using endonucleases, particularly CEL I and CEL II. However, conventional protocols are limited in their ability to detect mismatch cleavage due to non-specific removal, by the nuclease, of 5' end-labelled termini. Mutation detection is further limited by the high background characteristic of PCR-based end-labelling mismatch scanning techniques. Here we show that, as nuclease activity increased, internal signal was maintained while 5' signal decayed and that internal labelling reduced the background signal. A new mismatch scanning assay called 'Endonucleolytic Mutation Analysis by Internal Labelling' (EMAIL), was developed using capillary electrophoresis, involving internal amplicon labelling by PCR incorporation of fluorescently-labelled deoxynucleotides. Multiple mutations amongst allelic pools were detected when EMAIL was applied with the mismatch nucleases CEL I and CEL II. This technique offers greatly increased sensitivity in the detection of mutations in specific genes in pooled samples, enabling enlarged pool sizes and improving throughput and efficiency. We are investigating the limits of pool sizes to deliver a highly efficient mutation detection and analysis strategy for plant breeders and geneticists. (author)

  20. Multi-features Based Approach for Moving Shadow Detection

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ning; ZHOU Man-li; XU Yi-ping; FANG Bao-hong

    2004-01-01

    In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.

  1. Towards aerial natural gas leak detection system based on TDLAS

    Science.gov (United States)

    Liu, Shuyang; Zhou, Tao; Jia, Xiaodong

    2014-11-01

    Pipeline leakage is a complex scenario for sensing system due to the traditional high cost, low efficient and labor intensive detection scheme. TDLAS has been widely accepted as industrial trace gas detection method and, thanks to its high accuracy and reasonable size, it has the potential to meet pipeline gas leakage detection requirements if it combines with the aerial platform. Based on literature study, this paper discussed the possibility of applying aerial TDLAS principle in pipeline gas leak detection and the key technical foundation of implementing it. Such system is able to result in a high efficiency and accuracy measurement which will provide sufficient data in time for the pipeline leakage detection.

  2. P2P worm detection based on application identification

    Institute of Scientific and Technical Information of China (English)

    XIA Chunhe; SHI Yunping; LI Xiaojian; GAO Wei

    2007-01-01

    P2P worm exploits common vulnerabilities and spreads through peer-to-peer networks.Despite being recognized as a potential and deadly threat to the Internet recently,few relevant countermeasures are found in extant literature.Once it breaks out,a P2P worm could result in unpredictable losses.Based on propagation characteristics of the worm,this paper presents a detection method called PWD (P2P Worm Detection),which is designed based on application identification and unknown worm detection.Simulation result and LAN-environment experiment result both indicate that PWD is an effective method to detect and block P2P worms.

  3. KFDA and clustering based multiclass SVM for intrusion detection

    Institute of Scientific and Technical Information of China (English)

    WEI Yu-xin; WU Mu-qing

    2008-01-01

    To improve the classification accuracy and reducethe training time, an intrusion detection technology is proposed,which combines feature extraction technology and multiclasssupport vector machine (SVM) classification algorithm. Theintrusion detection model setup has two phases. The first phaseis to project the original training data into kernel fisherdiscriminant analysis (KFDA) space. The second phase is to usefuzzy clustering technology to cluster the projected data andconstruct the decision tree, based on the clustering results. Theoverall detection model is set up based on the decision tree.Results of the experiment using knowledge discovery and datamining (KDD) from 99 datasets demonstrate that the proposedtechnology can be an an effective way for intrusion detection.

  4. Anomalous cross-linking by mechlorethamine of DNA duplexes containing C-C mismatch pairs.

    Science.gov (United States)

    Romero, R M; Mitas, M; Haworth, I S

    1999-03-23

    Nitrogen mustards such as mechlorethamine have previously been shown to covalently cross-link DNA through the N7 position of the two guanine bases of a d[GXC].d[GYC] duplex sequence, a so-called 1,3 G-G-cross-link, when X-Y = C-G or T-A. Here, we report the formation of a new mechlorethamine cross-link with the d[GXC].d[GYC] fragment when X-Y is a C-C mismatch pair. Mechlorethamine cross-links this fragment preferentially between the two mismatched cytosine bases, rather than between the guanine bases. The cross-link also forms when one or both of the guanine bases of the d[GCC].d[GCC] fragment are replaced by N7-deazaguanine, and, more generally, forms with any C-C mismatch, regardless of the flanking base pairs. Piperidine cleavage of the cross-link species containing the d[GCC].d[GCC] sequence gives DNA fragments consistent with alkylation at the mismatched cytosine bases. We also provide evidence that the cross-link reaction occurs between the N3 atoms of the two cytosine bases by showing that the formation of the C-C cross-link is pH dependent for both mechlorethamine and chlorambucil. Dimethyl sulfate (DMS) probing of the cross-linked d[GCC].d[GCC] fragment showed that the major groove of the guanine adjacent to the C-C mismatch is still accessible to DMS. In contrast, the known minor groove binder Hoechst 33258 inhibits the cross-link formation with a C-C mismatch pair flanked by A-T base pairs. These results suggest that the C-C mismatch is cross-linked by mechlorethamine in the minor groove. Since C-C pairs may be involved in unusual secondary structures formed by the trinucleotide repeat sequence d[CCG]n, and associated with triplet repeat expansion diseases, mechlorethamine may serve as a useful probe for these structures. PMID:10090751

  5. Intrusion Detection Systems Based On Packet Sniffing

    Directory of Open Access Journals (Sweden)

    Ushus Maria Joseph

    2013-01-01

    Full Text Available In the present era of networks, security of network systems is becoming increasingly important, as more and more sensitive information is being stored and manipulated online. The paper entitled ’Packet Sniffing’ is a IDS where it monitors packets on the network wire and attempts to the discovery of hacker/cracker who is attempting to break into system. Packet Sniffing also finds the contents and tracks the data packet in the network system. This sniffing is being performed by comparing the captured packet with the intruder details stored in the database .If the packet is found to be an intruder it is then forwarded to the firewall with the respective message for blocking. The Emotional Ants module contains the sender and receiver .The sender will inform all the other Ants running in other machines about the detection of intruder through his pheromone (Messages. The receiver in Ants will listen for the messages from other Ants

  6. Muon Detection Based on a Hadronic Calorimeter

    CERN Document Server

    Ciodaro, Thiago; Abreu, R; Achenbach, R; Adragna, P; Aharrouche, M; Aielli, G; Al-Shabibi, A; Aleksandrov, I; Alexandrov, E; Aloisio, A; Alviggi, M G; Amorim, A; Amram, N; Andrei, V; Anduaga, X; Angelaszek, D; Anjos, N; Annovi, A; Antonelli, S; Anulli, F; Apolle, R; Aracena, I; Ask, S; Åsman, B; Avolio, G; Baak, M; Backes, M; Backlund, S; Badescu, E; Baines, J; Ballestrero, S; Banerjee, S; Bansil, H S; Barnett, B M; Bartoldus, R; Bartsch, V; Batraneanu, S; Battaglia, A; Bauss, B; Beauchemin, P; Beck, H P; Bee, C; Begel, M; Behera, P K; Bell, P; Bell, W H; Bellagamba, L; Bellomo, M; Ben Ami, S; Bendel, M; Benhammou, Y; Benslama, K; Berge, D; Bernius, C; Berry, T; Bianco, M; Biglietti, M; Blair, R E; Bogaerts, A; Bohm, C; Boisvert, V; Bold, T; Bondioli, M; Borer, C; Boscherini, D; Bosman, M; Bossini, E; Boveia, A; Bracinik, J; Brandt, A G; Brawn, I P; Brelier, B; Brenner, R; Bressler, S; Brock, R; Brooks, W K; Brown, G; Brunet, S; Bruni, A; Bruni, G; Bucci, F; Buda, S; Burckhart-Chromek, D; Buscher, V; Buttinger, W; Calvet, S; Camarri, P; Campanelli, M; Canale, V; Canelli, F; Capasso, L; Caprini, M; Caracinha, D; Caramarcu, C; Cardarelli, R; Carlino, G; Casadei, D; Casado, M P; Cattani, G; Cerri, A; Cerrito, L; Chapleau, B; Childers, J T; Chiodini, G; Christidi, I; Ciapetti, G; Cimino, D; Ciobotaru, M; Coccaro, A; Cogan, J; Collins, N J; Conde Muino, P; Conidi, C; Conventi, F; Corradi, M; Corso-Radu, A; Coura Torres, R; Cranmer, K; Crescioli, F; Crone, G; Crupi, R; Cuenca Almenar, C; Cummings, J T; Curtis, C J; Czyczula, Z; Dam, M; Damazio, D; Dao, V; Darlea, G L; Davis, A O; De Asmundis, R; De Pedis, D; De Santo, A; de Seixas, J M; Degenhardt, J; Della Pietra, M; Della Volpe, D; Demers, S; Demirkoz, B; Di Ciaccio, A; Di Mattia, A; Di Nardo, R; Di Simone, A; Diaz, M A; Dietzsch, T A; Dionisi, C; Dobson, E; Dobson, M; dos Anjos, A; Dotti, A; Dova, M T; Drake, G; Dufour, M-A; Dumitru, I; Eckweiler, S; Ehrenfeld, W; Eifert, T; Eisenhandler, E; Ellis, K V; Ellis, N; Emeliyanov, D; Enoque Ferreira de Lima, D; Ermoline, Y; Ernst, J; Etzion, E; Falciano, S; Farrington, S; Farthouat, P; Faulkner, P J W; Fedorko, W; Fellmann, D; Feng, E; Ferrag, S; Ferrari, R; Ferrer, M L; Fiorini, L; Fischer, G; Flowerdew, M J; Fonseca Martin, T; Francis, D; Fratina, S; French, S T; Front, D; Fukunaga, C; Gadomski, S; Garelli, N; Garitaonandia Elejabarrieta, H; Gaudio, G; Gee, C N P; George, S; Giagu, S; Giannetti, P; Gillman, A R; Giorgi, M; Giunta, M; Giusti, P; Goebel, M; Gonçalo, R; Gonzalez Silva, L; Göringer, C; Gorini, B; Gorini, E; Grabowska-Bold, I; Green, B; Groll, M; Guida, A; Guler, H; Haas, S; Hadavand, H; Hadley, D R; Haller, J; Hamilton, A; Hanke, P; Hansen, J R; Hasegawa, S; Hasegawa, Y; Hauser, R; Hayakawa, T; Hayden, D; Head, S; Heim, S; Hellman, S; Henke, M; Hershenhorn, A; Hidvégi, A; Hillert, S; Hillier, S J; Hirayama, S; Hod, N; Hoffmann, D; Hong, T M; Hryn'ova, T; Huston, J; Iacobucci, G; Igonkina, O; Ikeno, M; Ilchenko, Y; Ishikawa, A; Ishino, M; Iwasaki, H; Izzo, V; Jez, P; Jimenez Otero, S; Johansen, M; Johns, K; Jones, G; Joos, M; Kadlecik, P; Kajomovitz, E; Kanaya, N; Kanega, F; Kanno, T; Kapliy, A; Kaushik, V; Kawagoe, K; Kawamoto, T; Kazarov, A; Kehoe, R; Kessoku, K; Khomich, A; Khoriauli, G; Kieft, G; Kirk, J; Klemetti, M; Klofver, P; Klous, S; Kluge, E-E; Kobayashi, T; Koeneke, K; Koletsou, I; Koll, J D; Kolos, S; Kono, T; Konoplich, R; Konstantinidis, N; Korcyl, K; Kordas, K; Kotov, V; Kowalewski, R V; Krasznahorkay, A; Kraus, J; Kreisel, A; Kubota, T; Kugel, A; Kunkle, J; Kurashige, H; Kuze, M; Kwee, R; Laforge, B; Landon, M; Lane, J; Lankford, A J; Laranjeira Lima, S M; Larner, A; Leahu, L; Lehmann Miotto, G; Lei, X; Lellouch, D; Levinson, L; Li, S; Liberti, B; Lilley, J N; Linnemann, J T; Lipeles, E; Lohse, T; Losada, M; Lowe, A; Luci, C; Luminari, L; Lundberg, J; Lupu, N; Machado Miguéns, J; Mackeprang, R; Maettig, S; Magnoni, L; Maiani, C; Maltrana, D; Mangeard, P-S; Männer, R; Mapelli, L; Marchese, F; Marino, C; Martin, B; Martin, B T; Martin, T; Martyniuk, A; Marzano, F; Masik, J; Mastrandrea, P; Matsushita, T; McCarn, A; Mechnich, J; Medinnis, M; Meier, K; Melachrinos, C; Mendoza Nava, L M; Merola, L; Messina, A; Meyer, C P; Middleton, R P; Mikenberg, G; Mills, C M; Mincer, A; Mineev, M; Misiejuk, A; Moa, T; Moenig, K; Monk, J; Monticelli, F; Mora Herrera, C; Morettini, P; Morris, J D; Müller, F; Munwes, Y; Murillo Garcia, R; Nagano, K; Nagasaka, Y; Navarro, G A; Negri, A; Nelson, S; Nemethy, P; Neubauer, M S; Neusiedl, A; Newman, P; Nisati, A; Nomoto, H; Nozaki, M; Nozicka, M; Nurse, E; Ochando, C; Ochi, A; Oda, S; Oh, A; Ohm, C; Okumura, Y; Olivito, D; Omachi, C; Osculati, B; Oshita, H; Ospanov, R; Owen, M A; Özcan, V E; Ozone, K; Padilla, C; Panes, B; Panikashvili, N; Paramonov, A; Parodi, F; Pasqualucci, E; Pastore, F; Patricelli, S; Pauly, T; Perera, V J O; Perez, E; Petcu, M; Petersen, B A; Petersen, J; Petrolo, E; Phan, A; Piegaia, R; Pilkington, A; Pinder, A; Poddar, S; Polini, A; Pope, B G; Potter, C T; Primavera, M; Prokoshin, F; Ptacek, E; Qian, W; Quinonez, F; Rajagopalan, S; Ramos Dos Santos Neves, R; Reinherz-Aronis, E; Reinsch, A; Renkel, P; Rescigno, M; Rieke, S; Riu, I; Robertson, S H; Robinson, M; Rodriguez, D; Roich, A; Romeo, G; Romero, R; Roos, L; Ruiz Martinez, A; Ryabov, Y; Ryan, P; Saavedra, A; Safai Tehrani, F; Sakamoto, H; Salamanna, G; Salamon, A; Saland, J; Salnikov, A; Salvatore, F; Sankey, D P C; Santamarina, C; Santonico, R; Sarkisyan-Grinbaum, E; Sasaki, O; Savu, D; Scannicchio, D A; Schäfer, U; Scharf, V L; Scheirich, D; Schiavi, C; Schlereth, J; Schmitt, K; Schroder, C; Schroer, N; Schultz-Coulon, H-C; Schwienhorst, R; Sekhniaidze, G; Sfyrla, A; Shamim, M; Sherman, D; Shimojima, M; Shochet, M; Shooltz, D; Sidoti, A; Silbert, O; Silverstein, S; Sinev, N; Siragusa, G; Sivoklokov, S; Sjoen, R; Sjölin, J; Slagle, K; Sloper, J E; Smith, B C; Soffer, A; Soloviev, I; Spagnolo, S; Spiwoks, R; Staley, R J; Stamen, R; Stancu, S; Steinberg, P; Stelzer, J; Stockton, M C; Straessner, A; Strauss, E A; Strom, D; Su, D; Sugaya, Y; Sugimoto, T; Sushkov, S; Sutton, M R; Suzuki, Y; Taffard, A; Taiblum, N; Takahashi, Y; Takeda, H; Takeshita, T; Tamsett, M; Tan, C L A; Tanaka, S; Tapprogge, S; Tarem, S; Tarem, Z; Taylor, C; Teixeira-Dias, P; Thomas, J P; Thompson, P D; Thomson, M A; Tokushuku, K; Tollefson, K; Tomoto, M; Topfel, C; Torrence, E; Touchard, F; Traynor, D; Tremblet, L; Tricoli, A; Tripiana, M; Triplett, N; True, P; Tsiakiris, M; Tsuno, S; Tuggle, J; Ünel, G; Urquijo, P; Urrejola, P; Usai, G; Vachon, B; Vallecorsa, S; Valsan, L; Vandelli, W; Vari, R; Vaz Gil Lopes, L; Veneziano, S; Ventura, A; Venturi, N; Vercesi, V; Vermeulen, J C; Volpi, G; Vorwerk, V; Wagner, P; Wang, M; Warburton, A; Watkins, P M; Watson, A T; Watson, M; Weber, P; Weidberg, A R; Wengler, T; Werner, P; Werth, M; Wessels, M; White, M; Whiteson, D; Wickens, F J; Wiedenmann, W; Wielers, M; Winklmeier, F; Woods, K S; Wu, S-L; Wu, X; Xaplanteris Karampatsos, L; Xella, S; Yakovlev, A; Yamazaki, Y; Yang, U; Yasu, Y; Yuan, L; Zaitsev, A; Zanello, L; Zhang, H; Zhang, J; Zhao, L; Zobernig, H; zur Nedden, M

    2010-01-01

    The TileCal hadronic calorimeter provides a muon signal which can be used to assist in muon tagging at the ATLAS level-one trigger. Originally, the muon signal was conceived to be combined with the RPC trigger in order to reduce unforeseen high trigger rates due to cavern background. Nevertheless, the combined trigger cannot significantly deteriorate the muon detection performance at the barrel region. This paper presents preliminary studies concerning the impact in muon identification at the ATLAS level-one trigger, through the use of Monte Carlo simulations with single muons with 40 GeV/c momentum. Further, different trigger scenarios were proposed, together with an approach for matching both TileCal and RPC geometries.

  7. Muon Detection Based on a Hadronic Calorimeter

    CERN Document Server

    Ciodaro, T; Abreu, R; Achenbach, R; Adragna, P; Aharrouche, M; Aielli, G; Al-Shabibi, A; Aleksandrov, I; Alexandrov, E; Aloisio, A; Alviggi, M G; Amorim, A; Amram, N; Andrei, V; Anduaga, X; Angelaszek, D; Anjos, N; Annovi, A; Antonelli, S; Anulli, F; Apolle, R; Aracena, I; Ask, S; Åsman, B; Avolio, G; Baak, M; Backes, M; Backlund, S; Badescu, E; Baines, J; Ballestrero, S; Banerjee, S; Bansil, H S; Barnett, B M; Bartoldus, R; Bartsch, V; Batraneanu, S; Battaglia, A; Bauss, B; Beauchemin, P; Beck, H P; Bee, C; Begel, M; Behera, P K; Bell, P; Bell, W H; Bellagamba, L; Bellomo, M; Ben Ami, S; Bendel, M; Benhammou, Y; Benslama, K; Berge, D; Bernius, C; Berry, T; Bianco, M; Biglietti, M; Blair, R E; Bogaerts, A; Bohm, C; Boisvert, V; Bold, T; Bondioli, M; Borer, C; Boscherini, D; Bosman, M; Bossini, E; Boveia, A; Bracinik, J; Brandt, A G; Brawn, I P; Brelier, B; Brenner, R; Bressler, S; Brock, R; Brooks, W K; Brown, G; Brunet, S; Bruni, A; Bruni, G; Bucci, F; Buda, S; Burckhart-Chromek, D; Buscher, V; Buttinger, W; Calvet, S; Camarri, P; Campanelli, M; Canale, V; Canelli, F; Capasso, L; Caprini, M; Caracinha, D; Caramarcu, C; Cardarelli, R; Carlino, G; Casadei, D; Casado, M P; Cattani, G; Cerri, A; Cerrito, L; Chapleau, B; Childers, J T; Chiodini, G; Christidi, I; Ciapetti, G; Cimino, D; Ciobotaru, M; Coccaro, A; Cogan, J; Collins, N J; Conde Muino, P; Conidi, C; Conventi, F; Corradi, M; Corso-Radu, A; Coura Torres, R; Cranmer, K; Crescioli, F; Crone, G; Crupi, R; Cuenca Almenar, C; Cummings, J T; Curtis, C J; Czyczula, Z; Dam, M; Damazio, D; Dao, V; Darlea, G L; Davis, A O; De Asmundis, R; De Pedis, D; De Santo, A; de Seixas, J M; Degenhardt, J; Della Pietra, M; Della Volpe, D; Demers, S; Demirkoz, B; Di Ciaccio, A; Di Mattia, A; Di Nardo, R; Di Simone, A; Diaz, M A; Dietzsch, T A; Dionisi, C; Dobson, E; Dobson, M; dos Anjos, A; Dotti, A; Dova, M T; Drake, G; Dufour, M-A; Dumitru, I; Eckweiler, S; Ehrenfeld, W; Eifert, T; Eisenhandler, E; Ellis, K V; Ellis, N; Emeliyanov, D; Enoque Ferreira de Lima, D; Ermoline, Y; Ernst, J; Etzion, E; Falciano, S; Farrington, S; Farthouat, P; Faulkner , P J W; Fedorko, W; Fellmann, D; Feng, E; Ferrag, S; Ferrari, R; Ferrer, M L; Fiorini, L; Fischer, G; Flowerdew, M J; Fonseca Martin, T; Francis, D; Fratina, S; French, S T; Front, D; Fukunaga, C; Gadomski, S; Garelli, N; Garitaonandia Elejabarrieta, H; Gaudio, G; Gee, C N P; George, S; Giagu, S; Giannetti, P; Gillman, A R; Giorgi, M; Giunta, M; Giusti, P; Goebel, M; Gonçalo, R; Gonzalez Silva, L; Göringer, C; Gorini, B; Gorini, E; Grabowska-Bold, I; Green, B; Groll, M; Guida, A; Guler, H; Haas, S; Hadavand, H; Hadley, D R; Haller, J; Hamilton, A; Hanke, P; Hansen, J R; Hasegawa, S; Hasegawa, Y; Hauser, R; Hayakawa, T; Hayden, D; Head, S; Heim, S; Hellman, S; Henke, M; Hershenhorn, A; Hidvégi, A; Hillert, S; Hillier, S J; Hirayama, S; Hod, N; Hoffmann, D; Hong, T M; Hryn'ova, T; Huston, J; Iacobucci, G; Igonkina, O; Ikeno, M; Ilchenko, Y; Ishikawa, A; Ishino, M; Iwasaki, H; Izzo, V; Jez, P; Jimenez Otero, S; Johansen, M; Johns, K; Jones, G; Joos, M; Kadlecik, P; Kajomovitz, E; Kanaya, N; Kanega, F; Kanno, T; Kapliy, A; Kaushik, V; Kawagoe, K; Kawamoto, T; Kazarov, A; Kehoe, R; Kessoku, K; Khomich, A; Khoriauli, G; Kieft, G; Kirk, J; Klemetti, M; Klofver, P; Klous, S; Kluge, E-E; Kobayashi, T; Koeneke, K; Koletsou, I; Koll, J D; Kolos, S; Kono, T; Konoplich, R; Konstantinidis, N; Korcyl, K; Kordas, K; Kotov, V; Kowalewski, R V; Krasznahorkay, A; Kraus, J; Kreisel, A; Kubota, T; Kugel, A; Kunkle, J; Kurashige, H; Kuze, M; Kwee, R; Laforge, B; Landon, M; Lane, J; Lankford, A J; Laranjeira Lima, S M; Larner, A; Leahu, L; Lehmann Miotto, G; Lei, X; Lellouch, D; Levinson, L; Li, S; Liberti, B; Lilley, J N; Linnemann, J T; Lipeles, E; Lohse, T; Losada, M; Lowe, A; Luci, C; Luminari, L; Lundberg, J; Lupu, N; Machado Miguéns, J; Mackeprang, R; Maettig, S; Magnoni, L; Maiani, C; Maltrana, D; Mangeard, P-S; Männer, R; Mapelli, L; Marchese, F; Marino, C; Martin, B; Martin, B T; Martin, T; Martyniuk, A; Marzano, F; Masik, J; Mastrandrea, P; Matsushita, T; McCarn, A; Mechnich, J; Medinnis, M; Meier, K; Melachrinos, C; Mendoza Nava, L M; Merola, L; Messina, A; Meyer, C P; Middleton, R P; Mikenberg, G; Mills, C M; Mincer, A; Mineev, M; Misiejuk, A; Moa, T; Moenig, K; Monk, J; Monticelli, F; Mora Herrera, C; Morettini, P; Morris, J D; Müller, F; Munwes, Y; Murillo Garcia, R; Nagano, K; Nagasaka, Y; Navarro, G A; Negri, A; Nelson, S; Nemethy, P; Neubauer, M S; Neusiedl, A; Newman, P; Nisati, A; Nomoto, H; Nozaki, M; Nozicka, M; Nurse, E; Ochando, C; Ochi, A; Oda, S; Oh, A; Ohm, C; Okumura, Y; Olivito, D; Omachi, C; Osculati, B; Oshita, H; Ospanov, R; Owen, M A; Özcan, V E; Ozone, K; Padilla, C; Panes, B; Panikashvili, N; Paramonov, A; Parodi, F; Pasqualucci, E; Pastore, F; Patricelli, S; Pauly, T; Perera, V J O; Perez, E

    2010-01-01

    The ATLAS Tile hadronic calorimeter (TileCal) provides highly-segmented energy measurements of incoming particles. The information from TileCal's last segmentation layer can assist in muon tagging and it is being considered for a near future upgrade of the level-one trigger, mainly for rejecting triggers due to cavern background at the barrel region. A muon receiver for the TileCal muon signals is being designed in order to interface with the ATLAS level-one trigger. This paper addresses the preliminary studies concerning the muon discrimination capability for the muon receiver. Monte Carlo simulations for single muons from the interaction point were used to study the effectiveness of hadronic calorimeter information on muon detection.

  8. Labour Market Mismatch among UK Graduates: An Analysis Using REFLEX Data

    Science.gov (United States)

    McGuinness, Seamus; Sloane, Peter J.

    2011-01-01

    There is much disagreement in the literature over the extent to which graduates are mismatched in the labour market and the reasons for this. In this paper we utilise the Flexible Professional in the Knowledge Society (REFLEX) data set to cast light on these issues, based on data for UK graduates. We find substantial pay penalties for…

  9. Model Based Incipient Fault Detection for Gear Drives

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper presents the method of model based incipient fault detection for gear drives,this method is based on parity space method. It can generate the robust residual that is maximally sensitive to the fault caused by the change of the parameters. The example of simulation shows the application of the method, and the residual waves have different characteristics due to different parameter changes; one can detect and isolate the fault based on the different characteristics.

  10. Aptamer-Based Technologies in Foodborne Pathogen Detection

    Science.gov (United States)

    Teng, Jun; Yuan, Fang; Ye, Yingwang; Zheng, Lei; Yao, Li; Xue, Feng; Chen, Wei; Li, Baoguang

    2016-01-01

    Aptamers are single stranded DNA or RNA ligands, which can be selected by a method called systematic evolution of ligands by exponential enrichment (SELEX); and they can specifically recognize and bind to their targets. These unique characteristics of aptamers offer great potentials in applications such as pathogen detection and biomolecular screening. Pathogen detection is the critical means in detecting and identifying the problems related to public health and food safety; and only the rapid, sensitive and efficient detection technologies can enable the users to make the accurate assessments on the risks of infections (humans and animals) or contaminations (foods and other commodities) caused by various pathogens. This article reviews the development in the field of the aptamer-based approaches for pathogen detection, including whole-cell SELEX and Genomic SELEX. Nowadays, a variety of aptamer-based biosensors have been developed for pathogen detection. Thus, in this review, we also cover the development in aptamer-based biosensors including optical biosensors for multiple pathogen detection by multiple-labeling or label-free models such as fluorescence detection and surface plasmon resonance, electrochemical biosensors and lateral chromatography test strips, and their applications in pathogen detection and biomolecular screening. While notable progress has been made in the field in the last decade, challenges or drawbacks in their applications such as pathogen detection and biomolecular screening remain to be overcome. PMID:27672383

  11. Research on moving object detection based on frog's eyes

    Science.gov (United States)

    Fu, Hongwei; Li, Dongguang; Zhang, Xinyuan

    2008-12-01

    On the basis of object's information processing mechanism with frog's eyes, this paper discussed a bionic detection technology which suitable for object's information processing based on frog's vision. First, the bionics detection theory by imitating frog vision is established, it is an parallel processing mechanism which including pick-up and pretreatment of object's information, parallel separating of digital image, parallel processing, and information synthesis. The computer vision detection system is described to detect moving objects which has special color, special shape, the experiment indicates that it can scheme out the detecting result in the certain interfered background can be detected. A moving objects detection electro-model by imitating biologic vision based on frog's eyes is established, the video simulative signal is digital firstly in this system, then the digital signal is parallel separated by FPGA. IN the parallel processing, the video information can be caught, processed and displayed in the same time, the information fusion is taken by DSP HPI ports, in order to transmit the data which processed by DSP. This system can watch the bigger visual field and get higher image resolution than ordinary monitor systems. In summary, simulative experiments for edge detection of moving object with canny algorithm based on this system indicate that this system can detect the edge of moving objects in real time, the feasibility of bionic model was fully demonstrated in the engineering system, and it laid a solid foundation for the future study of detection technology by imitating biologic vision.

  12. Laser Spot Detection Based on Reaction Diffusion

    Directory of Open Access Journals (Sweden)

    Alejandro Vázquez-Otero

    2016-03-01

    Full Text Available Center-location of a laser spot is a problem of interest when the laser is used for processing and performing measurements. Measurement quality depends on correctly determining the location of the laser spot. Hence, improving and proposing algorithms for the correct location of the spots are fundamental issues in laser-based measurements. In this paper we introduce a Reaction Diffusion (RD system as the main computational framework for robustly finding laser spot centers. The method presented is compared with a conventional approach for locating laser spots, and the experimental results indicate that RD-based computation generates reliable and precise solutions. These results confirm the flexibility of the new computational paradigm based on RD systems for addressing problems that can be reduced to a set of geometric operations.

  13. Laser Spot Detection Based on Reaction Diffusion.

    Science.gov (United States)

    Vázquez-Otero, Alejandro; Khikhlukha, Danila; Solano-Altamirano, J M; Dormido, Raquel; Duro, Natividad

    2016-01-01

    Center-location of a laser spot is a problem of interest when the laser is used for processing and performing measurements. Measurement quality depends on correctly determining the location of the laser spot. Hence, improving and proposing algorithms for the correct location of the spots are fundamental issues in laser-based measurements. In this paper we introduce a Reaction Diffusion (RD) system as the main computational framework for robustly finding laser spot centers. The method presented is compared with a conventional approach for locating laser spots, and the experimental results indicate that RD-based computation generates reliable and precise solutions. These results confirm the flexibility of the new computational paradigm based on RD systems for addressing problems that can be reduced to a set of geometric operations. PMID:26938537

  14. The mouse mismatch repair protein, MSH3, is a nucleoplasmic protein that aggregates into denser nuclear bodies under conditions of stress.

    NARCIS (Netherlands)

    Holt, I.; Thanh Lam, L.; Tome, S.; Wansink, D.G.; Riele, H. te; Gourdon, G.; Morris, G.E.

    2011-01-01

    The mismatch repair protein, MSH3, together with MSH2, forms the MutSbeta heterodimer which recognizes and repairs base pair mismatches and larger insertion/deletion loops in DNA. Lack of specific antibodies against mouse MSH3 has hampered studies of its expression and localization. Mouse MSH3 is no

  15. A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods

    OpenAIRE

    Dong-uk Kim; Hyo-won Kim; Gisung Kim; Sehun Kim

    2013-01-01

    In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propo...

  16. Skill Mismatch of Graduates in a Local Labour Market

    Directory of Open Access Journals (Sweden)

    Enrico Marelli

    2014-06-01

    Full Text Available In this paper we first review the (potential and actual role of the Universities for the local economies in which they operate, especially considering the implications deriving from the degree of skill mismatch (over-education in a local labour market. Then, in the second part of the paper, we realise an empirical investigation based on administrative information of an Italian University matched with the data of the job centres of the local (provincial labour market in order to reconstruct the characteristics of the university-to-work transitions of graduates. Our results have important policy implications, since for local development it is crucial, among other things, to make the best use of all human resources and especially those with the highest educational level.

  17. Heteroduplex DNA mismatch repair system of Streptococcus pneumoniae: cloning and expression of the hexA gene

    International Nuclear Information System (INIS)

    Mutations affecting heteroduplex DNA mismatch repair in Streptococcus pneumoniae were localized in two genes, hexA and hexB, by fractionation of restriction fragments carrying mutant alleles. A fragment containing the hexA4 allele was cloned in the S. pneumoniae cloning system, and the hexA+ allele was introduced into the recombinant plasmid by chromosomal facilitation of plasmid transfer. Subcloning localized the functional hexA gene to a 3.5-kilobase segment of the cloned pneumococcal DNA. The product of this gene was shown in Bacillus subtilis minicells to be a polypeptide with an M/sub r/ of 86,000. Two mutant alleles of hexA showed partial expression of the repair system when present in multicopy plasmids. A model for mismatch repair, which depends on the interaction of two protein components to recognize the mismatched base pair and excise a segment of DNA between strand breaks surrounding the mismatch, is proposed

  18. Supply-demand mismatch transients in susceptible peri-infarct hot zones explain the origin of spreading injury depolarizations

    Science.gov (United States)

    von Bornstädt, Daniel; Houben, Thijs; Seidel, Jessica; Zheng, Yi; Dilekoz, Ergin; Qin, Tao; Sandow, Nora; Kura, Sreekanth; Eikermann-Haerter, Katharina; Endres, Matthias; Boas, David A.; Moskowitz, Michael A.; Lo, Eng H.; Dreier, Jens P.; Woitzik, Johannes; Sakadžić, Sava; Ayata, Cenk

    2015-01-01

    SUMMARY Peri-infarct depolarizations (PIDs) are seemingly spontaneous spreading depression-like waves that negatively impact tissue outcome in both experimental and human stroke. Factors triggering PIDs are unknown. Here, we show that somatosensory activation of peri-infarct cortex triggers PIDs when the activated cortex is within a critical range of ischemia. We show that the mechanism involves increased oxygen utilization within the activated cortex, worsening the supply-demand mismatch. We support the concept by clinical data showing that mismatch predisposes to PIDs in human stroke as well. Conversely, transient worsening of mismatch by episodic hypoxemia or hypotension also reproducibly triggers PIDs. Therefore, PIDs are triggered upon supply-demand mismatch transients in metastable peri-infarct hot zones due to increased demand or reduced supply. Based on the data, we propose that minimizing sensory stimulation and hypoxic or hypotensive transients in stroke and brain injury would reduce PID incidence and their adverse impact on outcome. PMID:25741731

  19. GNSS Spoofing Detection Based on Signal Power Measurements: Statistical Analysis

    Directory of Open Access Journals (Sweden)

    V. Dehghanian

    2012-01-01

    Full Text Available A threat to GNSS receivers is posed by a spoofing transmitter that emulates authentic signals but with randomized code phase and Doppler values over a small range. Such spoofing signals can result in large navigational solution errors that are passed onto the unsuspecting user with potentially dire consequences. An effective spoofing detection technique is developed in this paper, based on signal power measurements and that can be readily applied to present consumer grade GNSS receivers with minimal firmware changes. An extensive statistical analysis is carried out based on formulating a multihypothesis detection problem. Expressions are developed to devise a set of thresholds required for signal detection and identification. The detection processing methods developed are further manipulated to exploit incidental antenna motion arising from user interaction with a GNSS handheld receiver to further enhance the detection performance of the proposed algorithm. The statistical analysis supports the effectiveness of the proposed spoofing detection technique under various multipath conditions.

  20. Shape-Based Plagiarism Detection for Flowchart Figures in Texts

    Directory of Open Access Journals (Sweden)

    Senosy Arrish

    2014-02-01

    Full Text Available Plagiarism detection is well known phenomenon in the academic arena. Copying other people is considered as serious offence that needs to be checked. There are many plagiarism detection systems such as turn-it-in that has been developed to provide this checks. Most, if not all, discard the figures and charts before checking for plagiarism. Discarding the figures and charts results in look holes that people can take advantage. That means people can plagiarized figures and charts easily without the current plagiarism systems detecting it. There are very few papers which talks about flowcharts plagiarism detection. Therefore, there is a need to develop a system that will detect plagiarism in figures and charts. This paper presents a method for detecting flow chart figure plagiarism based on shape-based image processing and multimedia retrieval. The method managed to retrieve flowcharts with ranked similarity according to different matching sets.

  1. Intrusion detection based on system calls and homogeneous Markov chains

    Institute of Scientific and Technical Information of China (English)

    Tian Xinguang; Duan Miyi; Sun Chunlai; Li Wenfa

    2008-01-01

    A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.

  2. Mismatch-Shaped Pseudo-Passive Two-Capacitor DAC

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper; Moon, Un-Ku; Temes, Gabor C.

    1999-01-01

    A simple mismatch-shaping scheme is proposed for a two-capacitor DAC. Unlike in other mismatch-shaping systems, the shaped error is generated by direct filtering of a well-defined bounded signal, which can be generated as white noise. The operation is closely related to a specific digital interpo...

  3. Mismatch-Shaping Serial Digital-to-Analog Converter

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper; Moon, Un-Ku; Temes, Gabor C.

    1999-01-01

    A simple but accurate pseudo-passive mismatch-shaping D/A converter is described. A digital state machine is used to control the switching sequence of a symmetric two-capacitor network that performs the D/A conversion. The error caused by capacitor mismatch is uncorrelated with the input signal a...

  4. The mismatch between job openings and job seekers

    OpenAIRE

    Canon, Maria E.; Mingyu Chen

    2011-01-01

    Today's high unemployment rate is often linked to a structural imbalance—a mismatch between the skills and location required to fill vacant jobs and the skills and geographical preferences of the unemployed. But the evidence downplays the role of this mismatch.

  5. Hydrophobic mismatch triggering texture defects in membrane gel domains

    DEFF Research Database (Denmark)

    Dreier, J.; Brewer, J.R.; Simonsen, Adam Cohen

    2013-01-01

    a lipid-induced transition between vortex and uniform textures in binary phospholipid bilayers. By tuning the lipid composition, the hydrophobic mismatch at the domain boundary can be varied systematically as monitored by AFM. Low hydrophobic mismatch correlates with domains having uniform texture, while...

  6. Evidence-based detection of pulmonary arterial hypertension in systemic sclerosis: the DETECT study

    NARCIS (Netherlands)

    Coghlan, J.G.; Denton, C.P.; Grunig, E.; Bonderman, D.; Distler, O.; Khanna, D.; Muller-Ladner, U.; Pope, J.E.; Vonk, M.C.; Doelberg, M.; Chadha-Boreham, H.; Heinzl, H.; Rosenberg, D.M.; McLaughlin, V.V.; Seibold, J.R.

    2014-01-01

    OBJECTIVE: Earlier detection of pulmonary arterial hypertension (PAH), a leading cause of death in systemic sclerosis (SSc), facilitates earlier treatment. The objective of this study was to develop the first evidence-based detection algorithm for PAH in SSc. METHODS: In this cross-sectional, intern

  7. Segment-based change detection for polarimetric SAR data

    DEFF Research Database (Denmark)

    Skriver, Henning; Nielsen, Allan Aasbjerg; Conradsen, Knut

    2006-01-01

    criterion is based on the Wishart test statistic for fully polarimetric SAR data. 2. METHODOLOGY In change detection applications, at least two images must be available and used in the change detection process. If these images are segmented independently, the segments in the different images will most......1. BACKGROUND Change detection is a very important application of Earth observation data. A number of different applications relies on robust and accurate change detection from such data. Update of topographic maps is, for instance, a very important process for mapping agencies to be able...... detection accuracy, reduction of the speckle is often necessary. This may be done by segmenting the images prior to change detection and then applying change detection to the segmented images. A large number of segmentation algorithms for SAR images have been suggested in the literature. Most of these apply...

  8. SVM Intrusion Detection Model Based on Compressed Sampling

    Directory of Open Access Journals (Sweden)

    Shanxiong Chen

    2016-01-01

    Full Text Available Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. Massive data processing is the bottleneck of network software and hardware equipment in intrusion detection. If we can reduce the data dimension in the stage of data sampling and directly obtain the feature information of network data, efficiency of detection can be improved greatly. In the paper, we present a SVM intrusion detection model based on compressive sampling. We use compressed sampling method in the compressed sensing theory to implement feature compression for network data flow so that we can gain refined sparse representation. After that SVM is used to classify the compression results. This method can realize detection of network anomaly behavior quickly without reducing the classification accuracy.

  9. Optimizing the Face Paradigm of BCI System by Modified Mismatch Negative Paradigm

    Science.gov (United States)

    Zhou, Sijie; Jin, Jing; Daly, Ian; Wang, Xingyu; Cichocki, Andrzej

    2016-01-01

    Many recent studies have focused on improving the performance of event-related potential (ERP) based brain computer interfaces (BCIs). The use of a face pattern has been shown to obtain high classification accuracies and information transfer rates (ITRs) by evoking discriminative ERPs (N200 and N400) in addition to P300 potentials. Recently, it has been proved that the performance of traditional P300-based BCIs could be improved through a modification of the mismatch pattern. In this paper, a mismatch inverted face pattern (MIF-pattern) was presented to improve the performance of the inverted face pattern (IF-pattern), one of the state of the art patterns used in visual-based BCI systems. Ten subjects attended in this experiment. The result showed that the mismatch inverted face pattern could evoke significantly larger vertex positive potentials (p < 0.05) and N400s (p < 0.05) compared to the inverted face pattern. The classification accuracy (mean accuracy is 99.58%) and ITRs (mean bit rate is 27.88 bit/min) of the mismatch inverted face pattern was significantly higher than that of the inverted face pattern (p < 0.05). PMID:27774046

  10. Research about Memory Detection Based on the Embedded Platform

    Science.gov (United States)

    Sun, Hao; Chu, Jian

    As is known to us all, the resources of memory detection of the embedded systems are very limited. Taking the Linux-based embedded arm as platform, this article puts forward two efficient memory detection technologies according to the characteristics of the embedded software. Especially for the programs which need specific libraries, the article puts forwards portable memory detection methods to help program designers to reduce human errors,improve programming quality and therefore make better use of the valuable embedded memory resource.

  11. Multifeature Fusion Vehicle Detection Algorithm Based on Choquet Integral

    Directory of Open Access Journals (Sweden)

    Wenhui Li

    2014-01-01

    Full Text Available Vision-based multivehicle detection plays an important role in Forward Collision Warning Systems (FCWS and Blind Spot Detection Systems (BSDS. The performance of these systems depends on the real-time capability, accuracy, and robustness of vehicle detection methods. To improve the accuracy of vehicle detection algorithm, we propose a multifeature fusion vehicle detection algorithm based on Choquet integral. This algorithm divides the vehicle detection problem into two phases: feature similarity measure and multifeature fusion. In the feature similarity measure phase, we first propose a taillight-based vehicle detection method, and then vehicle taillight feature similarity measure is defined. Second, combining with the definition of Choquet integral, the vehicle symmetry similarity measure and the HOG + AdaBoost feature similarity measure are defined. Finally, these three features are fused together by Choquet integral. Being evaluated on public test collections and our own test images, the experimental results show that our method has achieved effective and robust multivehicle detection in complicated environments. Our method can not only improve the detection rate but also reduce the false alarm rate, which meets the engineering requirements of Advanced Driving Assistance Systems (ADAS.

  12. SCREEN photometric property detection system based on area CCD

    Science.gov (United States)

    Yan, Fu-cai; Ye, Wei; Xu, Yu; Wang, Chao; Zhang, Yu-wei

    2011-08-01

    The photometric property detection of screen display is crucial for screen display quality test. Traditional photometry detection technologies were based on photoelectric sensors such as silicon photocell, photo-electric multiplier and CdS, which can detect only some isolated points. To break the limitation of randomness, incompleteness and detection accuracy in current technologies, we designed a screen photometric detection system based on area CCD. The system consists of photometric image sensor, photometric image acquisition hardware and photometric image analyzing software. The photometric image sensor, which adopts optical lens, optical filters and area CCD, adapts its spectrum response property to fit the spectrum luminous efficiency curve V (λ) by adjusting the thickness and quantity of appropriate optical filters. photometric image acquisition hardware adopts the DSP as a core processor to drive the area CCD, to sample, acquire , process and save the image from image sensor, to transmit the image to computer. For real-time performance of transmitting, the hardware system adopts the transmission protocol of USB2.0. The uploaded image will be processed by photometric image analyzing software, and then displayed in real time with detection results. The screen photometric detection technology based on area CCD can detect specifications of the whole screen such as luminance, contrast, onoff ratio and uniformity, breaks the limitation of randomness and incompleteness in current detection technology, exactly and fully reflects the integrated display quality of the whole screen. According to the test results, the accuracy of this system has reached the accuracy level one in China.

  13. Weak Signal Frequency Detection Method Based on Generalized Duffing Oscillator

    Institute of Scientific and Technical Information of China (English)

    SHI Si-Hong; YUAN Yong; WANG Hui-Qi; LUO Mao-Kang

    2011-01-01

    @@ The sensitive characteristic to the initial value of chaos system sufficiently demonstrates the superiority in weak signal parameters detection.Analyzing the current chaos-based frequency detection method, a novel generalized Duffing equation is proposed to detect weak signal frequency.By choosing a suitable adjusting factor, when the outside driving force frequency is equal to that of the detected signal, the generalized Duffing oscillator is in great period state, which can obtain the frequency information of the detected signal.The simulation results indicate this method is rapidly convenient and shows better accuracy.%The sensitive characteristic to the initial value of chaos system sufficiently demonstrates the superiority in weak signal parameters detection. Analyzing the current chaos-based frequency detection method, a novel generalized Duffing equation is proposed to detect weak signal frequency. By choosing a suitable adjusting factor, when the outside driving force frequency is equal to that of the detected signal, the generalized Duffing oscillator is in great period state, which can obtain the frequency information of the detected signal. The simulation results indicate this method is rapidly convenient and shows better accuracy.

  14. G-quadruplex based two-stage isothermal exponential amplification reaction for label-free DNA colorimetric detection.

    Science.gov (United States)

    Nie, Ji; Zhang, De-Wen; Tie, Cai; Zhou, Ying-Lin; Zhang, Xin-Xiang

    2014-06-15

    A novel G-quadruplex based two-stage isothermal exponential amplification reaction (GQ-EXPAR) was developed for label-free DNA colorimetric detection in this work. The exponential amplified trigger DNA in the first stage can convert into G-quadruplex sequence EAD2 by a linear amplification circuit in the second stage. Created EAD2 can form G-quadruplex/hemin DNAzyme to act as a direct signal readout element. The GQ-EXPAR combines the exponential amplification of DNA sequence and the peroxidase-mimicking DNAzyme induced signal amplification, which achieves tandem dual-amplification. Taking advantages of isothermal incubation, this label-free homogeneous assay obviates the need of thermal cycling . As no complex synthesis or extra downstream operation is needed, the whole easy handling procedure can be finished in no more than 1h. This assay allows the sensing of the model DNA with the limit of detection to be 2.5pM. Moreover, it demonstrates good discrimination of mismatched sequences. The strategy has also been successfully implemented to sensitively detect Tay-Sachs genetic disorder mutant. PMID:24508547

  15. Polypyrrole based gas sensor for ammonia detection

    Science.gov (United States)

    Dunst, K. J.; Cysewska, K.; Kalinowski, P.; Jasiński, P.

    2016-01-01

    The nature of polypyrrole response to toxic gases does not allow using the sensor in a conventional way. The main aim of this study is to acquire the information about the concentration using different approaches: a linear approximation, a non-linear approximation and a tangent method. In this paper a two-steps procedure for sensor response measurements has been utilized. Polypyrrole films were electrochemically synthesized on the interdigitated electrodes. Gas sensing measurements of polypyrrole based sensor were carried out at room temperature. The influence of the flow rate on the sensing performance to NH3 were investigated. The preliminary studies of aging of the sensor were also explored.

  16. Scintillation particle detection based on microfluidics

    CERN Document Server

    Mapelli, A; Renaud, P; Gorini, B; Trivino, N Vico; Jiguet, S; Vandelli, W; Haguenauer, M

    2010-01-01

    A novel type of particle detector based on scintillation, with precise spatial resolution and high radiation hardness, is being studied. It consists of a single microfluidic channel filled with a liquid scintillator and is designed to define an array of scintillating waveguides each independently coupled to a photodetector. Prototype detectors built using an SU-8 epoxy resin have been tested with electrons from a radioactive source. The experimental results show a light yield compatible with the theoretical expectations and confirm the validity of the approach. (C) 2010 Elsevier B.V. All rights reserved.

  17. Model Based Fault Detection in a Centrifugal Pump Application

    DEFF Research Database (Denmark)

    Kallesøe, Carsten; Cocquempot, Vincent; Izadi-Zamanabadi, Roozbeh

    2006-01-01

    A model based approach for fault detection in a centrifugal pump, driven by an induction motor, is proposed in this paper. The fault detection algorithm is derived using a combination of structural analysis, observer design and Analytical Redundancy Relation (ARR) design. Structural considerations...

  18. Pixel based skin detection: asurvey and suggestions for implementation

    NARCIS (Netherlands)

    Monaci, G.

    2009-01-01

    Skin detection is one of the building blocks of many image processing and computer vision algorithms. Within the Video Processing group at Philips Research we are investigating the use of skin detection algorithms for a number of core applications. In this report we focus on skin color based methods

  19. Revisiting anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, Damiano

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  20. Nonlinear Model-Based Fault Detection for a Hydraulic Actuator

    NARCIS (Netherlands)

    Van Eykeren, L.; Chu, Q.P.

    2011-01-01

    This paper presents a model-based fault detection algorithm for a specific fault scenario of the ADDSAFE project. The fault considered is the disconnection of a control surface from its hydraulic actuator. Detecting this type of fault as fast as possible helps to operate an aircraft more cost effect

  1. A new benchmark for stereo-based pedestrian detection

    NARCIS (Netherlands)

    C.G. Keller; M. Enzweiler; D.M. Gavrila

    2011-01-01

    Pedestrian detection is a rapidly evolving area in the intelligent vehicles domain. Stereo vision is an attractive sensor for this purpose. But unlike for monocular vision, there are no realistic, large scale benchmarks available for stereo-based pedestrian detection, to provide a common point of re

  2. Corn tassel detection based on image processing

    Science.gov (United States)

    Tang, Wenbing; Zhang, Yane; Zhang, Dongxing; Yang, Wei; Li, Minzan

    2012-01-01

    Machine vision has been widely applied in facility agriculture, and played an important role in obtaining environment information. In this paper, it is studied that application of image processing to recognize and locate corn tassel for corn detasseling machine. The corn tassel identification and location method was studied based on image processing and automated technology guidance information was provided for the actual production of corn emasculation operation. The system is the application of image processing to recognize and locate corn tassel for corn detasseling machine. According to the color characteristic of corn tassel, image processing techniques was applied to identify corn tassel of the images under HSI color space and Image segmentation was applied to extract the part of corn tassel, the feature of corn tassel was analyzed and extracted. Firstly, a series of preprocessing procedures were done. Then, an image segmentation algorithm based on HSI color space was develop to extract corn tassel from background and region growing method was proposed to recognize the corn tassel. The results show that this method could be effective for extracting corn tassel parts from the collected picture and can be used for corn tassel location information; this result could provide theoretical basis guidance for corn intelligent detasseling machine.

  3. Local evidence aggregation for regression-based facial point detection

    NARCIS (Netherlands)

    Martinez, Brais; Valstar, Michel F.; Binefa, Xavier; Pantic, Maja

    2013-01-01

    We propose a new algorithm to detect facial points in frontal and near-frontal face images. It combines a regression-based approach with a probabilistic graphical model-based face shape model that restricts the search to anthropomorphically consistent regions. While most regression-based approaches

  4. Functional MRI-based lie detection: scientific and societal challenges.

    Science.gov (United States)

    Farah, Martha J; Hutchinson, J Benjamin; Phelps, Elizabeth A; Wagner, Anthony D

    2014-02-01

    Functional MRI (fMRI)-based lie detection has been marketed as a tool for enhancing personnel selection, strengthening national security and protecting personal reputations, and at least three US courts have been asked to admit the results of lie detection scans as evidence during trials. How well does fMRI-based lie detection perform, and how should the courts, and society more generally, respond? Here, we address various questions — some of which are based on a meta-analysis of published studies — concerning the scientific state of the art in fMRI-based lie detection and its legal status, and discuss broader ethical and societal implications. We close with three general policy recommendations.

  5. Algorithms for Speeding up Distance-Based Outlier Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — The problem of distance-based outlier detection is difficult to solve efficiently in very large datasets because of potential quadratic time complexity. We address...

  6. The Mismatch Negativity: An Indicator of Perception of Regularities in Music

    OpenAIRE

    Xide Yu; Tao Liu; Dingguo Gao

    2015-01-01

    This paper reviews music research using Mismatch Negativity (MMN). MMN is a deviation-specific component of auditory event-related potential (EPR), which detects a deviation between a sound and an internal representation (e.g., memory trace). Recent studies have expanded the notion and the paradigms of MMN to higher-order music processing such as those involving short melodies, harmony chord, and music syntax. In this vein, we firstly reviewed the evolution of MMN from sound to music and then...

  7. Vehicle Detection Based on Probability Hypothesis Density Filter

    Science.gov (United States)

    Zhang, Feihu; Knoll, Alois

    2016-01-01

    In the past decade, the developments of vehicle detection have been significantly improved. By utilizing cameras, vehicles can be detected in the Regions of Interest (ROI) in complex environments. However, vision techniques often suffer from false positives and limited field of view. In this paper, a LiDAR based vehicle detection approach is proposed by using the Probability Hypothesis Density (PHD) filter. The proposed approach consists of two phases: the hypothesis generation phase to detect potential objects and the hypothesis verification phase to classify objects. The performance of the proposed approach is evaluated in complex scenarios, compared with the state-of-the-art. PMID:27070621

  8. Exact, almost and delayed fault detection: An observer based approach

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Saberi, Ali; Stoorvogel, Anton A.;

    1999-01-01

    This paper consider the problem of fault detection and isolation in continuous- and discrete-time systems while using zero or almost zero threshold. A number of different fault detections and isolation problems using exact or almost exact disturbance decoupling are formulated. Solvability...... conditions are given for the formulated design problems together with methods for appropriate design of observer based fault detectors. The l-step delayed fault detection problem is also considered for discrete-time systems . Moreover, certain indirect fault detection methods such as unknown input observers...

  9. Using Morphlet-Based Image Representation for Object Detection

    Science.gov (United States)

    Gorbatsevich, V. S.; Vizilter, Yu. V.

    2016-06-01

    In this paper, we propose an original method for objects detection based on a special tree-structured image representation - the trees of morphlets. The method provides robust detection of various types of objects in an image without employing a machine learning procedure. Along with a bounding box creation on a detection step, the method makes pre-segmentation, which can be further used for recognition purposes. Another important feature of the proposed approach is that there are no needs to use a running window as well as a features pyramid in order to detect the objects of different sizes.

  10. USING MORPHLET-BASED IMAGE REPRESENTATION FOR OBJECT DETECTION

    Directory of Open Access Journals (Sweden)

    V. S. Gorbatsevich

    2016-06-01

    Full Text Available In this paper, we propose an original method for objects detection based on a special tree-structured image representation – the trees of morphlets. The method provides robust detection of various types of objects in an image without employing a machine learning procedure. Along with a bounding box creation on a detection step, the method makes pre-segmentation, which can be further used for recognition purposes. Another important feature of the proposed approach is that there are no needs to use a running window as well as a features pyramid in order to detect the objects of different sizes.

  11. Analysis of fault detection method based on predictive filter approach

    Institute of Scientific and Technical Information of China (English)

    LI Ji; ZHANG Hongyue

    2005-01-01

    A new detection method for component faults based on predictive filters together with the fault detectability, false alarm rate, missed alarm rate and upper bound of detection time are proposed. The efficiency of the method is illustrated by a simulation example of a second-order system. It is shown that the fault detection method using predictive filters has a small delay, a low false alarm rate and a low missed alarm rate. Furthermore the filter can give accurate estimates of states even after a fault occurs. The real-time estimation provided by this method can also be used for fault tolerant control.

  12. Abnormal traffic flow data detection based on wavelet analysis

    Directory of Open Access Journals (Sweden)

    Xiao Qian

    2016-01-01

    Full Text Available In view of the traffic flow data of non-stationary, the abnormal data detection is difficult.proposed basing on the wavelet analysis and least squares method of abnormal traffic flow data detection in this paper.First using wavelet analysis to make the traffic flow data of high frequency and low frequency component and separation, and then, combined with least square method to find abnormal points in the reconstructed signal data.Wavelet analysis and least square method, the simulation results show that using wavelet analysis of abnormal traffic flow data detection, effectively reduce the detection results of misjudgment rate and false negative rate.

  13. Reducing measurement scale mismatch to improve surface energy flux estimation

    Science.gov (United States)

    Iwema, Joost; Rosolem, Rafael; Rahman, Mostaquimur; Blyth, Eleanor; Wagener, Thorsten

    2016-04-01

    Soil moisture importantly controls land surface processes such as energy and water partitioning. A good understanding of these controls is needed especially when recognizing the challenges in providing accurate hyper-resolution hydrometeorological simulations at sub-kilometre scales. Soil moisture controlling factors can, however, differ at distinct scales. In addition, some parameters in land surface models are still often prescribed based on observations obtained at another scale not necessarily employed by such models (e.g., soil properties obtained from lab samples used in regional simulations). To minimize such effects, parameters can be constrained with local data from Eddy-Covariance (EC) towers (i.e., latent and sensible heat fluxes) and Point Scale (PS) soil moisture observations (e.g., TDR). However, measurement scales represented by EC and PS still differ substantially. Here we use the fact that Cosmic-Ray Neutron Sensors (CRNS) estimate soil moisture at horizontal footprint similar to that of EC fluxes to help answer the following question: Does reduced observation scale mismatch yield better soil moisture - surface fluxes representation in land surface models? To answer this question we analysed soil moisture and surface fluxes measurements from twelve COSMOS-Ameriflux sites in the USA characterized by distinct climate, soils and vegetation types. We calibrated model parameters of the Joint UK Land Environment Simulator (JULES) against PS and CRNS soil moisture data, respectively. We analysed the improvement in soil moisture estimation compared to uncalibrated model simulations and then evaluated the degree of improvement in surface fluxes before and after calibration experiments. Preliminary results suggest that a more accurate representation of soil moisture dynamics is achieved when calibrating against observed soil moisture and further improvement obtained with CRNS relative to PS. However, our results also suggest that a more accurate

  14. Theoretical detection ranges for acoustic based manatee avoidance technology.

    Science.gov (United States)

    Phillips, Richard; Niezrecki, Christopher; Beusse, Diedrich O

    2006-07-01

    The West Indian manatee (Trichechus manatus latirostris) has become endangered partly because of watercraft collisions in Florida's coastal waterways. To reduce the number of collisions, warning systems based upon detecting manatee vocalizations have been proposed. One aspect of the feasibility of an acoustically based warning system relies upon the distance at which a manatee vocalization is detectable. Assuming a mixed spreading model, this paper presents a theoretical analysis of the system detection capabilities operating within various background and watercraft noise conditions. This study combines measured source levels of manatee vocalizations with the modeled acoustic properties of manatee habitats to develop a method for determining the detection range and hydrophone spacing requirements for acoustic based manatee avoidance technologies. In quiet environments (background noise approximately 70 dB) it was estimated that manatee vocalizations are detectable at approximately 250 m, with a 6 dB detection threshold, In louder environments (background noise approximately 100dB) the detection range drops to 2.5 m. In a habitat with 90 dB of background noise, a passing boat with a maximum noise floor of 120 dB would be the limiting factor when it is within approximately 100 m of a hydrophone. The detection range was also found to be strongly dependent on the manatee vocalization source level. PMID:16875213

  15. A Smartphone Malware Detection Framework Based on Artificial Immunology

    Directory of Open Access Journals (Sweden)

    Min Zhao

    2013-02-01

    Full Text Available With the sharp increase in the number of smartphones, the Android platform pose to becoming a market leader that makes the need for malware analysis on this platform an urgent issue. The current Artificial Immune-Based malware detection systems research focus on traditional computers that uses information from OS or network, but the smartphone software behavior has its own structure and semantics. Current research cannot detect malware in smartphone exactly and efficiently. To address these problems, in this paper, we capitalize on earlier approaches for dynamic analysis of application behavior as a means for detecting malware in the smartphone. An Artificial Immune-Based Smartphone Malware Detection Framework is brought forwards and a prototype system is implemented, the experiment result show that the system can obtain higher detection rate and decrease the false positive rate.

  16. Gold Nanoparticles-Based Barcode Analysis for Detection of Norepinephrine.

    Science.gov (United States)

    An, Jeung Hee; Lee, Kwon-Jai; Choi, Jeong-Woo

    2016-02-01

    Nanotechnology-based bio-barcode amplification analysis offers an innovative approach for detecting neurotransmitters. We evaluated the efficacy of this method for detecting norepinephrine in normal and oxidative-stress damaged dopaminergic cells. Our approach use a combination of DNA barcodes and bead-based immunoassays for detecting neurotransmitters with surface-enhanced Raman spectroscopy (SERS), and provides polymerase chain reaction (PCR)-like sensitivity. This method relies on magnetic Dynabeads containing antibodies and nanoparticles that are loaded both with DNA barcords and with antibodies that can sandwich the target protein captured by the Dynabead-bound antibodies. The aggregate sandwich structures are magnetically separated from the solution and treated to remove the conjugated barcode DNA. The DNA barcodes are then identified by SERS and PCR analysis. The concentration of norepinephrine in dopaminergic cells can be readily detected using the bio-barcode assay, which is a rapid, high-throughput screening tool for detecting neurotransmitters. PMID:27305769

  17. Caption detection from video sequence based on fuzzy neural networks

    Science.gov (United States)

    Gao, Xinbo; Xin, Hong; Li, Jie

    2001-09-01

    Caption graphically superimposed in video frames can provide important indexing information. The automatic detection and recognition of video captions can be of great help in querying topics of interest in digital news library. To detect the caption from video sequence, we present algorithms based on fuzzy clustering neural networks. Since neural networks have the capabilities of learning and self-organizing and parallel computing mechanism, with the great increasing of digital images and video databases, neural networks based techniques become more efficient and popular tools for multimedia processing. Experimental results show that our caption detection scheme is effective and robust.

  18. Computer-based instrumentation for partial discharge detection in GIS

    International Nuclear Information System (INIS)

    Partial discharge is one of the prominent indicators of defects and insulation degradation in a Gas Insulated Switchgear (GIS). Partial discharges (PD) have a harmful effect on the life of insulation of high voltage equipment. The PD detection using acoustic technique and subsequent analysis is currently an efficient method of performing non-destructive testing of GIS apparatus. A low cost PC-based acoustic PD detection instrument has been developed for the non-destructive diagnosis of GIS. This paper describes the development of a PC-based instrumentation system for partial discharge detection in GIS and some experimental results have also presented. (Author)

  19. Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Radhika Baskar

    2013-10-01

    Full Text Available Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which evaluates the behavior of sensor node with node attributes and threshold technique have been used to detect abnormal behavior of sensor node based on behavioral index. The performance has been evaluated for MAC and network layer feature set of wireless nodes.

  20. Outlier Mining Based Abnormal Machine Detection in Intelligent Maintenance

    Institute of Scientific and Technical Information of China (English)

    ZHANG Lei; CAO Qi-xin; LEE Jay

    2009-01-01

    Assessing machine's performance through comparing the same or similar machines is important to implement intelligent maintenance for swarm machine. In this paper, an outlier mining based abnormal machine detection algorithm is proposed for this purpose. Firstly, the outlier mining based on clustering is introduced and the definition of cluster-based global outlier factor (CBGOF) is presented. Then the modified swarm intelligence clustering(MSIC) algorithm is suggested and the outlier mining algorithm based on MSIC is proposed. The algorithm can not only cluster machines according to their performance but also detect possible abnormal machines. Finally, a comparison of mobile soccer robots' performance proves the algorithm is feasible and effective.

  1. Image Fakery Detection Based on Singular Value Decomposition

    Directory of Open Access Journals (Sweden)

    T. Basaruddin

    2009-11-01

    Full Text Available The growing of image processing technology nowadays make it easier for user to modify and fake the images. Image fakery is a process to manipulate part or whole areas of image either in it content or context with the help of digital image processing techniques. Image fakery is barely unrecognizable because the fake image is looking so natural. Yet by using the numerical computation technique it is able to detect the evidence of fake image. This research is successfully applied the singular value decomposition method to detect image fakery. The image preprocessing algorithm prior to the detection process yields two vectors orthogonal to the singular value vector which are important to detect fake image. The result of experiment to images in several conditions successfully detects the fake images with threshold value 0.2. Singular value decomposition-based detection of image fakery can be used to investigate fake image modified from original image accurately.

  2. Investigation on the influence of BBO thermal-induced phase mismatching in 266nm UV laser conversion efficiency

    Science.gov (United States)

    Yu, Kai; Jin, Guangyong; Yu, Miao; Huang, Zhulong; Zhai, Ruizhi; Wang, Lei

    2014-12-01

    266nm UV laser has a wide range of applications in many fields, such as laser medical treatment, laser processing, precision measure and other applications for the reason of its advantages in wavelength, small diffraction effects, high single-photon energy, and high resolution and so on. BBO crystals absorb parts of the fundamental laser energy and second harmonic laser energy are unavoidable, and thus the temperature raise, so that the existing crystal phase matching conditions change, resulting in phase mismatching in the high-power frequency doubling, greatly influence the 266nm UV laser conversion efficiency. To further study the effect of phase mismatching to conversion efficiency, and improve the conversion efficiency, output power and other output characteristics of 266nm laser, the article mainly describe from the following three aspects. Firstly, took the use of three-dimensional nonlinear crystal temperature distribution which is obtained, the process of BBO crystal thermal-induced phase mismatching is analyzed. Secondly, based on frequency doubling theory, the effects of the thermal-induced phase mismatching affected of conversion in crystals are analyzed. Combining with the phase mismatching of the three-dimensional distributions, the fourth harmonic conversion efficiency with thermal phase mismatching changes of BBO 266nm UV laser are simulated for the first time. Thirdly, by using MATLAB software, the effects of phase mismatching to conversion efficiency in crystal for different waist radius, 532nm laser power and the fundamental beam quality are simulated. The results indicate a good physical interpretation of reasons of high power laser frequency doubling system. It shows that the model established explains the reason of the reduction of conversion efficiency, output power and the beam quality excellently. All results make a leading sense to the research on the compensating of the phase mismatching and on the improvement of conversion efficiency.

  3. Detection of heavy metal by paper-based microfluidics.

    Science.gov (United States)

    Lin, Yang; Gritsenko, Dmitry; Feng, Shaolong; Teh, Yi Chen; Lu, Xiaonan; Xu, Jie

    2016-09-15

    Heavy metal pollution has shown great threat to the environment and public health worldwide. Current methods for the detection of heavy metals require expensive instrumentation and laborious operation, which can only be accomplished in centralized laboratories. Various microfluidic paper-based analytical devices have been developed recently as simple, cheap and disposable alternatives to conventional ones for on-site detection of heavy metals. In this review, we first summarize current development of paper-based analytical devices and discuss the selection of paper substrates, methods of device fabrication, and relevant theories in these devices. We then compare and categorize recent reports on detection of heavy metals using paper-based microfluidic devices on the basis of various detection mechanisms, such as colorimetric, fluorescent, and electrochemical methods. To finalize, the future development and trend in this field are discussed. PMID:27131999

  4. Moving Foreground Detection Based On Spatio-temporal Saliency

    Directory of Open Access Journals (Sweden)

    Yang Xia

    2013-01-01

    Full Text Available Detection of moving foreground in video is very important for many applications, such as visual surveillance, object-based video coding, etc. When objects move with different speeds and under illumination changes, the robustness of moving object detection methods proposed so far is still not satisfactory. In this paper, we use the semantic information to adjust the pixel-wise learning rate adaptively for more robust detection performance, which are obtained by spatial saliency map based on Gaussian mixture model (GMM in luma space and temporal saliency map obtained by background subtraction. In addition, we design a two-pass background estimation framework, in which the initial estimation is used for temporal saliency estimation, and the other is to detect foreground and update model parameters. The experimental results show that our method can achieve better moving object extraction performance than the existing background subtraction method based on GMM.

  5. An Efficient Fuzzy Clustering-Based Approach for Intrusion Detection

    CERN Document Server

    Nguyen, Huu Hoa; Darmont, Jérôme

    2011-01-01

    The need to increase accuracy in detecting sophisticated cyber attacks poses a great challenge not only to the research community but also to corporations. So far, many approaches have been proposed to cope with this threat. Among them, data mining has brought on remarkable contributions to the intrusion detection problem. However, the generalization ability of data mining-based methods remains limited, and hence detecting sophisticated attacks remains a tough task. In this thread, we present a novel method based on both clustering and classification for developing an efficient intrusion detection system (IDS). The key idea is to take useful information exploited from fuzzy clustering into account for the process of building an IDS. To this aim, we first present cornerstones to construct additional cluster features for a training set. Then, we come up with an algorithm to generate an IDS based on such cluster features and the original input features. Finally, we experimentally prove that our method outperform...

  6. A new approach toward object-based change detection

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Object-based change detection has been the hotspot in remote sensing image processing.A new approach toward object-based change detection is proposed.The two different temporal images are unitedly segmented using the mean shift procedure to obtain corresponding objects.Then change detection is implemented based on the integration of corresponding objects’ intensity and texture differences.Experiments are conducted on both panchromatic images and multispectral images and the results show that the integrated measure is robust with respect to illumination changes and noise.Supplementary color detection is conducted to determine whether the color of the unchanged objects changes or not when dealing with multispectral images.Some verification work is carried out to show the accuracy of the proposed approach.

  7. Signalprint-Based Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Mitchell, Rob; Chen, Ing-Ray; Eltoweissy, Mohamed

    Wireless networks are a critical part of global communication for which intrusion detection techniques should be applied to secure network access, or the cost associated with successful attacks will overshadow the benefits that wireless networks offer. In this paper we investigate a new scheme called Nodeprints to extend the existing centralized Signalprints design for authentication to a distributed voting-based design for intrusion detection. We analyze the effect of voting-based intrusion detection designs, the probability of an individual node voting incorrectly, the ratio of mobile nodes to base stations, and the rate at which nodes are compromised, on the system performance measured by the probability that the intrusion detection system yields a false result. We develop a performance model for evaluating our Nodeprints design and identify conditions under which Nodeprints outperforms the existing Signalprints design.

  8. Smart phone based bacterial detection using bio functionalized fluorescent nanoparticles

    International Nuclear Information System (INIS)

    We are describing immunochromatographic test strips with smart phone-based fluorescence readout. They are intended for use in the detection of the foodborne bacterial pathogens Salmonella spp. and Escherichia coli O157. Silica nanoparticles (SiNPs) were doped with FITC and Ru(bpy), conjugated to the respective antibodies, and then used in a conventional lateral flow immunoassay (LFIA). Fluorescence was recorded by inserting the nitrocellulose strip into a smart phone-based fluorimeter consisting of a light weight (40 g) optical module containing an LED light source, a fluorescence filter set and a lens attached to the integrated camera of the cell phone in order to acquire high-resolution fluorescence images. The images were analysed by exploiting the quick image processing application of the cell phone and enable the detection of pathogens within few minutes. This LFIA is capable of detecting pathogens in concentrations as low as 105 cfu mL−1 directly from test samples without pre-enrichment. The detection is one order of magnitude better compared to gold nanoparticle-based LFIAs under similar condition. The successful combination of fluorescent nanoparticle-based pathogen detection by LFIAs with a smart phone-based detection platform has resulted in a portable device with improved diagnosis features and having potential application in diagnostics and environmental monitoring. (author)

  9. Association of common variants in mismatch repair genes and breast cancer susceptibility: a multigene study

    Directory of Open Access Journals (Sweden)

    Pina Julieta

    2009-09-01

    Full Text Available Abstract Background MMR is responsible for the repair of base-base mismatches and insertion/deletion loops. Besides this, MMR is also associated with an anti-recombination function, suppressing homologous recombination. Losses of heterozygosity and/or microsatellite instability have been detected in a large number of skin samples from breast cancer patients, suggesting a potential role of MMR in breast cancer susceptibility. Methods We carried out a hospital-based case-control study in a Caucasian Portuguese population (287 cases and 547 controls to estimate the susceptibility to non-familial breast cancer associated with some polymorphisms in mismatch repair genes (MSH3, MSH4, MSH6, MLH1, MLH3, PMS1 and MUTYH. Results Using unconditional logistic regression we found that MLH3 (L844P, G>A polymorphism GA (Leu/Pro and AA (Pro/Pro genotypes were associated with a decreased risk: OR = 0.65 (0.45-0.95 (p = 0.03 and OR = 0.62 (0.41-0.94 (p = 0.03, respectively. Analysis of two-way SNP interaction effects on breast cancer revealed two potential associations to breast cancer susceptibility: MSH3 Ala1045Thr/MSH6 Gly39Glu - AA/TC [OR = 0.43 (0.21-0.83, p = 0.01] associated with a decreased risk; and MSH4 Ala97Thr/MLH3 Leu844Pro - AG/AA [OR = 2.35 (1.23-4.49, p = 0.01], GG/AA [OR = 2.11 (1.12-3,98, p = 0.02], and GG/AG [adjusted OR = 1.88 (1.12-3.15, p = 0.02] all associated with an increased risk for breast cancer. Conclusion It is possible that some of these common variants in MMR genes contribute significantly to breast cancer susceptibility. However, further studies with a large sample size will be needed to support our results.

  10. Multicriteria Similarity-Based Anomaly Detection Using Pareto Depth Analysis.

    Science.gov (United States)

    Hsiao, Ko-Jen; Xu, Kevin S; Calder, Jeff; Hero, Alfred O

    2016-06-01

    We consider the problem of identifying patterns in a data set that exhibits anomalous behavior, often referred to as anomaly detection. Similarity-based anomaly detection algorithms detect abnormally large amounts of similarity or dissimilarity, e.g., as measured by the nearest neighbor Euclidean distances between a test sample and the training samples. In many application domains, there may not exist a single dissimilarity measure that captures all possible anomalous patterns. In such cases, multiple dissimilarity measures can be defined, including nonmetric measures, and one can test for anomalies by scalarizing using a nonnegative linear combination of them. If the relative importance of the different dissimilarity measures are not known in advance, as in many anomaly detection applications, the anomaly detection algorithm may need to be executed multiple times with different choices of weights in the linear combination. In this paper, we propose a method for similarity-based anomaly detection using a novel multicriteria dissimilarity measure, the Pareto depth. The proposed Pareto depth analysis (PDA) anomaly detection algorithm uses the concept of Pareto optimality to detect anomalies under multiple criteria without having to run an algorithm multiple times with different choices of weights. The proposed PDA approach is provably better than using linear combinations of the criteria, and shows superior performance on experiments with synthetic and real data sets.

  11. A physiology-based seizure detection system for multichannel EEG.

    Directory of Open Access Journals (Sweden)

    Chia-Ping Shen

    Full Text Available BACKGROUND: Epilepsy is a common chronic neurological disorder characterized by recurrent unprovoked seizures. Electroencephalogram (EEG signals play a critical role in the diagnosis of epilepsy. Multichannel EEGs contain more information than do single-channel EEGs. Automatic detection algorithms for spikes or seizures have traditionally been implemented on single-channel EEG, and algorithms for multichannel EEG are unavailable. METHODOLOGY: This study proposes a physiology-based detection system for epileptic seizures that uses multichannel EEG signals. The proposed technique was tested on two EEG data sets acquired from 18 patients. Both unipolar and bipolar EEG signals were analyzed. We employed sample entropy (SampEn, statistical values, and concepts used in clinical neurophysiology (e.g., phase reversals and potential fields of a bipolar EEG to extract the features. We further tested the performance of a genetic algorithm cascaded with a support vector machine and post-classification spike matching. PRINCIPAL FINDINGS: We obtained 86.69% spike detection and 99.77% seizure detection for Data Set I. The detection system was further validated using the model trained by Data Set I on Data Set II. The system again showed high performance, with 91.18% detection of spikes and 99.22% seizure detection. CONCLUSION: We report a de novo EEG classification system for seizure and spike detection on multichannel EEG that includes physiology-based knowledge to enhance the performance of this type of system.

  12. Multicriteria Similarity-Based Anomaly Detection Using Pareto Depth Analysis.

    Science.gov (United States)

    Hsiao, Ko-Jen; Xu, Kevin S; Calder, Jeff; Hero, Alfred O

    2016-06-01

    We consider the problem of identifying patterns in a data set that exhibits anomalous behavior, often referred to as anomaly detection. Similarity-based anomaly detection algorithms detect abnormally large amounts of similarity or dissimilarity, e.g., as measured by the nearest neighbor Euclidean distances between a test sample and the training samples. In many application domains, there may not exist a single dissimilarity measure that captures all possible anomalous patterns. In such cases, multiple dissimilarity measures can be defined, including nonmetric measures, and one can test for anomalies by scalarizing using a nonnegative linear combination of them. If the relative importance of the different dissimilarity measures are not known in advance, as in many anomaly detection applications, the anomaly detection algorithm may need to be executed multiple times with different choices of weights in the linear combination. In this paper, we propose a method for similarity-based anomaly detection using a novel multicriteria dissimilarity measure, the Pareto depth. The proposed Pareto depth analysis (PDA) anomaly detection algorithm uses the concept of Pareto optimality to detect anomalies under multiple criteria without having to run an algorithm multiple times with different choices of weights. The proposed PDA approach is provably better than using linear combinations of the criteria, and shows superior performance on experiments with synthetic and real data sets. PMID:26336154

  13. Test Mismatch in Switched-Current Circuits Using Wavelet Analysis"

    Institute of Scientific and Technical Information of China (English)

    GUO Jierong; HE Yigang; LIU Meirong; TANG Shengxue; LI Hongmin

    2007-01-01

    Errors of mismatch and currents calibration caused by channel geometrical variety in switched-current are investigated in this paper. The relation and computing of mismatch and sensitivity are discussed also, and then a measure method of switched current mismatch using wavelet decomposition is proposed. A selected group of same transconductance is choosing as a cohort firstly, and the sensitivities of cohort in relation to the variation of transconductance are computed. Compared with the nominal deviation and tolerance borderline, the optimization and testing can be performed. As an example, a sixth order chebyshev low-pass filter is simulated and tested. The results have justified the reliability and feasibility of the method.

  14. Functional distance between recipient and donor HLA-DPB1 determines nonpermissive mismatches in unrelated HCT.

    Science.gov (United States)

    Crivello, Pietro; Heinold, Andreas; Rebmann, Vera; Ottinger, Hellmut D; Horn, Peter A; Beelen, Dietrich W; Fleischhauer, Katharina

    2016-07-01

    The role of HLA amino acid (AA) polymorphism for the outcome of hematopoietic cell transplantation (HCT) is controversial, in particular for HLA class II. Here, we investigated this question in nonpermissive HLA-DPB1 T-cell epitope (TCE) mismatches reflected by numerical functional distance (FD) scores, assignable to all HLA-DPB1 alleles based on the combined impact of 12 polymorphic AAs. We calculated the difference in FD scores (ΔFD) of mismatched HLA-DPB1 alleles in patients and their 10/10 HLA-matched unrelated donors of 379 HCTs performed at our center for acute leukemia or myelodysplastic syndrome. Receiver-operator curve-based stratification into 2 ΔFD subgroups showed a significantly higher percentage of nonpermissive TCE mismatches for ΔFD >2.665, compared with ΔFD ≤2.665 (88% vs 25%, P 2.665 was significantly associated with overall survival (hazard ratio [HR], 1.40; 95% confidence interval [CI], 1.05-1.87; P TCE mismatches. There was a marked but not statistically significant increase in the hazards of relapse and nonrelapse mortality in the high ΔFD subgroup, whereas no differences were observed for acute and chronic graft-versus-host disease. Seven nonconservative AA substitutions in peptide-binding positions had a significantly stronger impact on ΔFD compared with 5 others (P = .0025), demonstrating qualitative differences in the relative impact of AA polymorphism in HLA-DPB1. The novel concept of ΔFD sheds new light onto nonpermissive HLA-DPB1 mismatches in unrelated HCT. PMID:27162243

  15. Observer-based and Regression Model-based Detection of Emerging Faults in Coal Mills

    DEFF Research Database (Denmark)

    Odgaard, Peter Fogh; Lin, Bao; Jørgensen, Sten Bay

    2006-01-01

    . In this paper three different fault detection approaches are compared using a example of a coal mill, where a fault emerges. The compared methods are based on: an optimal unknown input observer, static and dynamic regression model-based detections. The conclusion on the comparison is that observer-based scheme...... detects the fault 13 samples earlier than the dynamic regression model-based method, and that the static regression based method is not usable due to generation of far too many false detections....

  16. Noise analysis for sensitivity-based structural damage detection

    Institute of Scientific and Technical Information of China (English)

    YIN Tao; ZHU Hong-ping; YU Ling

    2007-01-01

    As vibration-based structural damage detection methods are easily affected by environmental noise, a new statistic-based noise analysis method is proposed together with the Monte Carlo technique to investigate the influence of experimental noise of modal data on sensitivity-based damage detection methods. Different from the commonly used random perturbation technique, the proposed technique is deduced directly by Moore-Penrose generalized inverse of the sensitivity matrix, which does not only make the analysis process more efficient but also can analyze the influence of noise on both frequencies and mode shapes for three commonly used sensitivity-based damage detection methods in a similar way. A one-story portal frame is adopted to evaluate the efficiency of the proposed noise analysis technique.

  17. Automatic Vehicle License Recognition Based on Video Vehicular Detection System

    Institute of Scientific and Technical Information of China (English)

    YANG Zhaoxuan; CHEN Yang; HE Yinghua; WU Jun

    2006-01-01

    Traditional methods of license character extraction cannot meet the requirements of recognition accuracy and speed rendered by the video vehicular detection system.Therefore, a license plate localization method based on multi-scale edge detection and a character segmentation algorithm based on Markov random field model is presented.Results of experiments demonstrate that the method yields more accurate license character extraction in contrast to traditional localization method based on edge detection by difference operator and character segmentation based on threshold.The accuracy increases from 90% to 94% under preferable illumination, while under poor condition, it increases more than 5%.When the two improved algorithms are used, the accuracy and speed of automatic license recognition meet the system's requirement even under the noisy circumstance or uneven illumination.

  18. A Digital PCR-Based Method for Efficient and Highly Specific Screening of Genome Edited Cells

    OpenAIRE

    Findlay, Scott D.; Vincent, Krista M.; Jennifer R. Berman; Postovit, Lynne-Marie

    2016-01-01

    The rapid adoption of gene editing tools such as CRISPRs and TALENs for research and eventually therapeutics necessitates assays that can rapidly detect and quantitate the desired alterations. Currently, the most commonly used assay employs “mismatch nucleases” T7E1 or “Surveyor” that recognize and cleave heteroduplexed DNA amplicons containing mismatched base-pairs. However, this assay is prone to false positives due to cancer-associated mutations and/or SNPs and requires large amounts of st...

  19. Distributed intrusion detection system based on fuzzy rules

    Science.gov (United States)

    Qiao, Peili; Su, Jie; Liu, Yahui

    2006-04-01

    Computational Intelligence is the theory and method solving problems by simulating the intelligence of human using computer and it is the development of Artificial Intelligence. Fuzzy Technique is one of the most important theories of computational Intelligence. Genetic Fuzzy Technique and Neuro-Fuzzy Technique are the combination of Fuzzy Technique and novel techniques. This paper gives a distributed intrusion detection system based on fuzzy rules that has the characters of distributed parallel processing, self-organization, self-learning and self-adaptation by the using of Neuro-Fuzzy Technique and Genetic Fuzzy Technique. Specially, fuzzy decision technique can be used to reduce false detection. The results of the simulation experiment show that this intrusion detection system model has the characteristics of distributed, error tolerance, dynamic learning, and adaptation. It solves the problem of low identifying rate to new attacks and hidden attacks. The false detection rate is low. This approach is efficient to the distributed intrusion detection.

  20. Multi-core Processors based Network Intrusion Detection Method

    Directory of Open Access Journals (Sweden)

    Ziqian Wan

    2012-09-01

    Full Text Available It is becoming increasingly hard to build an intrusion detection system (IDS, because of the higher traffic throughput and the rising sophistication of attacking. Scale will be an important issue to address in the intrusion detection area. For hardware, tomorrow’s performance gains will come from multi-core architectures in which a number of CPU executes concurrently. We take the advantage of multi-core processors’ full power for intrusion detection in this work. We present an intrusion detection system based on the Snort open-source IDS that exploits the computational power of MIPS multi-core architecture to offload the costly pattern matching operations from the CPU, and thus increase the system’s processing throughput. A preliminary experiment demonstrates the potential of this system. The experiment results indicate that this method can be used effectively to speed up intrusion detection systems.

  1. Graph-based pigment network detection in skin images

    Science.gov (United States)

    Sadeghi, M.; Razmara, M.; Ester, M.; Lee, T. K.; Atkins, M. S.

    2010-03-01

    Detecting pigmented network is a crucial step for melanoma diagnosis. In this paper, we present a novel graphbased pigment network detection method that can find and visualize round structures belonging to the pigment network. After finding sharp changes of the luminance image by an edge detection function, the resulting binary image is converted to a graph, and then all cyclic sub-graphs are detected. Theses cycles represent meshes that belong to the pigment network. Then, we create a new graph of the cyclic structures based on their distance. According to the density ratio of the new graph of the pigment network, the image is classified as "Absent" or "Present". Being Present means that a pigment network is detected in the skin lesion. Using this approach, we achieved an accuracy of 92.6% on five hundred unseen images.

  2. Stratification-Based Outlier Detection over the Deep Web

    Directory of Open Access Journals (Sweden)

    Xuefeng Xian

    2016-01-01

    Full Text Available For many applications, finding rare instances or outliers can be more interesting than finding common patterns. Existing work in outlier detection never considers the context of deep web. In this paper, we argue that, for many scenarios, it is more meaningful to detect outliers over deep web. In the context of deep web, users must submit queries through a query interface to retrieve corresponding data. Therefore, traditional data mining methods cannot be directly applied. The primary contribution of this paper is to develop a new data mining method for outlier detection over deep web. In our approach, the query space of a deep web data source is stratified based on a pilot sample. Neighborhood sampling and uncertainty sampling are developed in this paper with the goal of improving recall and precision based on stratification. Finally, a careful performance evaluation of our algorithm confirms that our approach can effectively detect outliers in deep web.

  3. Stratification-Based Outlier Detection over the Deep Web.

    Science.gov (United States)

    Xian, Xuefeng; Zhao, Pengpeng; Sheng, Victor S; Fang, Ligang; Gu, Caidong; Yang, Yuanfeng; Cui, Zhiming

    2016-01-01

    For many applications, finding rare instances or outliers can be more interesting than finding common patterns. Existing work in outlier detection never considers the context of deep web. In this paper, we argue that, for many scenarios, it is more meaningful to detect outliers over deep web. In the context of deep web, users must submit queries through a query interface to retrieve corresponding data. Therefore, traditional data mining methods cannot be directly applied. The primary contribution of this paper is to develop a new data mining method for outlier detection over deep web. In our approach, the query space of a deep web data source is stratified based on a pilot sample. Neighborhood sampling and uncertainty sampling are developed in this paper with the goal of improving recall and precision based on stratification. Finally, a careful performance evaluation of our algorithm confirms that our approach can effectively detect outliers in deep web. PMID:27313603

  4. A Detection Scheme for Cavity-based Dark Matter Searches

    CERN Document Server

    Bukhari, M H S

    2016-01-01

    We present here proposal of a scheme and some useful ideas for resonant cavity-based detection of cold dark matter axions with hope to improve the existing endeavors. The scheme is based upon our idea of a detector, which incorporates an integrated tunnel diode and a GaAs HEMT or HFET, High Electron Mobility Transistor or Heterogenous FET, for resonance detection and amplification from a resonant cavity (in a strong transverse magnetic field from a cylindrical array of halbach magnets). The idea of a TD-oscillator-amplifier combination could possibly serve as a more sensitive and viable resonance detection regime while maintaining an excellent performance with low noise temperature, whereas the halbach magnets array may offer a compact and permanent solution replacing the conventional electromagnets scheme. We believe that all these factors could possibly increase the sensitivity and accuracy of axion detection searches and reduce complications (and associated costs) in the experiments, in addition to help re...

  5. Statistical detection of structural damage based on model reduction

    Institute of Scientific and Technical Information of China (English)

    Tao YIN; Heung-fai LAM; Hong-ping ZHU

    2009-01-01

    This paper proposes a statistical method for damage detection based on the finite element (FE) model reduction technique that utilizes measured modal data with a limited number of sensors.A deterministic damage detection process is formulated based on the model reduction technique.The probabilistic process is integrated into the deterministic damage detection process using a perturbation technique,resulting in a statistical structural damage detection method.This is achieved by deriving the firstand second-order partial derivatives of uncertain parameters,such as elasticity of the damaged member,with respect to the measurement noise,which allows expectation and covariance matrix of the uncertain parameters to be calculated.Besides the theoretical development,this paper reports numerical verification of the proposed method using a portal frame example and Monte Carlo simulation.

  6. Stratification-Based Outlier Detection over the Deep Web

    Science.gov (United States)

    Xian, Xuefeng; Zhao, Pengpeng; Sheng, Victor S.; Fang, Ligang; Gu, Caidong; Yang, Yuanfeng; Cui, Zhiming

    2016-01-01

    For many applications, finding rare instances or outliers can be more interesting than finding common patterns. Existing work in outlier detection never considers the context of deep web. In this paper, we argue that, for many scenarios, it is more meaningful to detect outliers over deep web. In the context of deep web, users must submit queries through a query interface to retrieve corresponding data. Therefore, traditional data mining methods cannot be directly applied. The primary contribution of this paper is to develop a new data mining method for outlier detection over deep web. In our approach, the query space of a deep web data source is stratified based on a pilot sample. Neighborhood sampling and uncertainty sampling are developed in this paper with the goal of improving recall and precision based on stratification. Finally, a careful performance evaluation of our algorithm confirms that our approach can effectively detect outliers in deep web. PMID:27313603

  7. Using Case-Based Reasoning for detecting computer virus

    Directory of Open Access Journals (Sweden)

    Abdellatif Berkat

    2011-07-01

    Full Text Available The typical antivirus approach consists of waiting for a number of computers to be infected, detecting the virus, designing a solution, delivering and deploying a solution. In such a situation, it is very difficult to prevent every machine from being compromised by viruses. In this paper, we propose a new method, for detecting computer viruses, that is based on the technique of Case-Based Reasoning (CBR. In this method: (1 even new viruses that do not exist in the database can be detected (2 The updating of the virus database is done automatically without connecting to the Internet. Whenever a new virus is detected, it will be automatically added to the database used by our application. This presents a major advantage

  8. The Unknown Computer Viruses Detection Based on Similarity

    Science.gov (United States)

    Liu, Zhongda; Nakaya, Naoshi; Koui, Yuuji

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.

  9. Moving object detection in aerial video based on spatiotemporal saliency

    Institute of Scientific and Technical Information of China (English)

    Shen Hao; Li Shuxiao; Zhu Chengfei; Chang Hongxing; Zhang Jinglan

    2013-01-01

    In this paper, the problem of moving object detection in aerial video is addressed. While motion cues have been extensively exploited in the literature, how to use spatial information is still an open problem. To deal with this issue, we propose a novel hierarchical moving target detection method based on spatiotemporal saliency. Temporal saliency is used to get a coarse segmentation, and spatial saliency is extracted to obtain the object’s appearance details in candidate motion regions. Finally, by combining temporal and spatial saliency information, we can get refined detec-tion results. Additionally, in order to give a full description of the object distribution, spatial sal-iency is detected in both pixel and region levels based on local contrast. Experiments conducted on the VIVID dataset show that the proposed method is efficient and accurate.

  10. a Uav-Based ROE Deer Fawn Detection System

    Science.gov (United States)

    Israel, M.

    2011-09-01

    This paper presents a UAV based remote sensing system for the detection of fawns in the meadows. There is a high demand because during pasture mowing many wild animals, especially roe deer fawns are killed by mowing machines. The system was tested in several real situations especially with differing weather and iluminating conditions. Its primary sensor is a lightweight thermal infrared camera. The images are captured onboard of the flight system and also transmitted as analog video stream to the ground station, where the user can follow the camera live stream on a monitor for manual animal detection. Beside a high detection rate a fast workflow is another very important objective for this application. Therefore a waypoint planning software was developed that accelerates the workflow. At adequate illuminating and weather conditions the presented UAV-based fawn detection via thermal imaging is a comfortable, fast and reliable method.

  11. Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    CERN Document Server

    Rahbari, Mina

    2011-01-01

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  12. Stratification-Based Outlier Detection over the Deep Web.

    Science.gov (United States)

    Xian, Xuefeng; Zhao, Pengpeng; Sheng, Victor S; Fang, Ligang; Gu, Caidong; Yang, Yuanfeng; Cui, Zhiming

    2016-01-01

    For many applications, finding rare instances or outliers can be more interesting than finding common patterns. Existing work in outlier detection never considers the context of deep web. In this paper, we argue that, for many scenarios, it is more meaningful to detect outliers over deep web. In the context of deep web, users must submit queries through a query interface to retrieve corresponding data. Therefore, traditional data mining methods cannot be directly applied. The primary contribution of this paper is to develop a new data mining method for outlier detection over deep web. In our approach, the query space of a deep web data source is stratified based on a pilot sample. Neighborhood sampling and uncertainty sampling are developed in this paper with the goal of improving recall and precision based on stratification. Finally, a careful performance evaluation of our algorithm confirms that our approach can effectively detect outliers in deep web.

  13. Enhancing Community Detection By Affinity-based Edge Weighting Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Andy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanders, Geoffrey [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Henson, Van [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vassilevski, Panayot [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-05

    Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is ideal for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.

  14. Lattice mismatch induced curved configurations of hybrid boron nitride-carbon nanotubes

    Science.gov (United States)

    Zhang, Jin

    2016-10-01

    A unique curved configuration is observed in freestanding hybrid boron nitride-carbon nanotubes (BN-CNTs) based on molecular dynamics simulations, which, in previous studies, was tacitly assumed as a straight configuration. The physical fundamentals of this phenomenon are explored by using the continuum mechanics theory, where the curved configuration of BN-CNTs is found to be induced by the bending effect due to the lattice mismatch between the C domain and the BN domain. In addition, our results show that the curvature of the curved BN-CNTs is determined by their radius and composition. The curvature of BN-CNTs decreases with growing radius of BN-CNTs and becomes ignorable when their radius is relatively large. A non-monotonic relationship is detected between the curvature and the composition of BN-CNTs. Specifically, the curvature of BN-CNTs increases with growing BN concentration when the molar fraction of BN atoms is smaller than a critical value 0.52, but decreases with growing BN concentration when the molar fraction of BN atoms is larger than this critical value.

  15. Auditory cortical and hippocampal-system mismatch responses to duration deviants in urethane-anesthetized rats.

    Directory of Open Access Journals (Sweden)

    Timo Ruusuvirta

    Full Text Available Any change in the invariant aspects of the auditory environment is of potential importance. The human brain preattentively or automatically detects such changes. The mismatch negativity (MMN of event-related potentials (ERPs reflects this initial stage of auditory change detection. The origin of MMN is held to be cortical. The hippocampus is associated with a later generated P3a of ERPs reflecting involuntarily attention switches towards auditory changes that are high in magnitude. The evidence for this cortico-hippocampal dichotomy is scarce, however. To shed further light on this issue, auditory cortical and hippocampal-system (CA1, dentate gyrus, subiculum local-field potentials were recorded in urethane-anesthetized rats. A rare tone in duration (deviant was interspersed with a repeated tone (standard. Two standard-to-standard (SSI and standard-to-deviant (SDI intervals (200 ms vs. 500 ms were applied in different combinations to vary the observability of responses resembling MMN (mismatch responses. Mismatch responses were observed at 51.5-89 ms with the 500-ms SSI coupled with the 200-ms SDI but not with the three remaining combinations. Most importantly, the responses appeared in both the auditory-cortical and hippocampal locations. The findings suggest that the hippocampus may play a role in (cortical manifestation of MMN.

  16. Detecting weather radar clutter using satellite-based nowcasting products

    OpenAIRE

    Jensen, Thomas B. S.; Gill, Rashpal S.; Overgaard, Søren; Hansen, Lars Kai; Nielsen, Allan Aasbjerg

    2006-01-01

    This contribution presents the initial results from experiments with detection of weather radar clutter by information fusion with satellite based nowcasting products. Previous studies using information fusion of weather radar data and first generation Meteosat imagery have shown promising results for the detecting and removal of clutter. Naturally, the improved spatio-temporal resolution of the Meteosat Second Generation sensors, coupled with its increased number of spectral bands, is expect...

  17. Acoustic Event Detection Based on MRMR Selected Feature Vectors

    OpenAIRE

    VOZARIKOVA Eva; Juhar, Jozef; CIZMAR Anton

    2012-01-01

    This paper is focused on the detection of potentially dangerous acoustic events such as gun shots and breaking glass in the urban environment. Various feature extraction methods can be used forrepresenting the sound in the detection system based on Hidden Markov Models of acoustic events. Mel – frequency cepstral coefficients, low - level descriptors defined in MPEG-7 standard and another time andspectral features were considered in the system. For the selection of final subset of features Mi...

  18. An Eavesdropping Detecting Approach Based on Mode-Mode Correlation

    Institute of Scientific and Technical Information of China (English)

    XIONG Jin; ZENG Gui-Hua; ZHOU Nan-Run

    2005-01-01

    @@ We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed'vacuum states. With this approach, eavesdropping can be easily detected without sacrificing extra secret bits as the test key. In addition, the efficiency of the quantum key distribution protocol is enhanced greatly.

  19. Edge Detection of Concrete Mesostructure Based on DIS Operator

    OpenAIRE

    Feng, Bin; Xu, Zicheng; Xia, Jin; Jin, Shijie; Jin, Weiliang

    2016-01-01

    Aggregate edge detection is the basis of creating concrete mesoscale model, which is applied to analyze concrete mesoscale characteristics. A concrete digital image edge detection method using DIS operator is presented in this paper. Mean filter, multi-scale filter, and Gaussian filter are compared on the effect of concrete image noise reduction. Based on the result, Gaussian filter is the most optimum method to reduce image noise and remain aggregate edge distinct. Sobel operator, Laplacian ...

  20. The Unknown Computer Viruses Detection Based on Similarity

    OpenAIRE

    Liu, Zhongda; NAKAYA, Naoshi; KOUI, Yuuji

    2009-01-01

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and k...

  1. Wavelet Based QRS Complex Detection of ECG Signal

    OpenAIRE

    Mukhopadhyay, Sayantan; Biswas, Shouvik; Roy, Anamitra Bardhan; Dey, Nilanjan

    2012-01-01

    The Electrocardiogram (ECG) is a sensitive diagnostic tool that is used to detect various cardiovascular diseases by measuring and recording the electrical activity of the heart in exquisite detail. A wide range of heart condition is determined by thorough examination of the features of the ECG report. Automatic extraction of time plane features is important for identification of vital cardiac diseases. This paper presents a multi-resolution wavelet transform based system for detection 'P', '...

  2. Anterior insula coordinates hierarchical processing of tactile mismatch responses.

    Science.gov (United States)

    Allen, Micah; Fardo, Francesca; Dietz, Martin J; Hillebrandt, Hauke; Friston, Karl J; Rees, Geraint; Roepstorff, Andreas

    2016-02-15

    The body underlies our sense of self, emotion, and agency. Signals arising from the skin convey warmth, social touch, and the physical characteristics of external stimuli. Surprising or unexpected tactile sensations can herald events of motivational salience, including imminent threats (e.g., an insect bite) and hedonic rewards (e.g., a caressing touch). Awareness of such events is thought to depend upon the hierarchical integration of body-related mismatch responses by the anterior insula. To investigate this possibility, we measured brain activity using functional magnetic resonance imaging, while healthy participants performed a roving tactile oddball task. Mass-univariate analysis demonstrated robust activations in limbic, somatosensory, and prefrontal cortical areas previously implicated in tactile deviancy, body awareness, and cognitive control. Dynamic Causal Modelling revealed that unexpected stimuli increased the strength of forward connections along a caudal to rostral hierarchy-projecting from thalamic and somatosensory regions towards insula, cingulate and prefrontal cortices. Within this ascending flow of sensory information, the AIC was the only region to show increased backwards connectivity to the somatosensory cortex, augmenting a reciprocal exchange of neuronal signals. Further, participants who rated stimulus changes as easier to detect showed stronger modulation of descending PFC to AIC connections by deviance. These results suggest that the AIC coordinates hierarchical processing of tactile prediction error. They are interpreted in support of an embodied predictive coding model where AIC mediated body awareness is involved in anchoring a global neuronal workspace. PMID:26584870

  3. Anterior insula coordinates hierarchical processing of tactile mismatch responses.

    Science.gov (United States)

    Allen, Micah; Fardo, Francesca; Dietz, Martin J; Hillebrandt, Hauke; Friston, Karl J; Rees, Geraint; Roepstorff, Andreas

    2016-02-15

    The body underlies our sense of self, emotion, and agency. Signals arising from the skin convey warmth, social touch, and the physical characteristics of external stimuli. Surprising or unexpected tactile sensations can herald events of motivational salience, including imminent threats (e.g., an insect bite) and hedonic rewards (e.g., a caressing touch). Awareness of such events is thought to depend upon the hierarchical integration of body-related mismatch responses by the anterior insula. To investigate this possibility, we measured brain activity using functional magnetic resonance imaging, while healthy participants performed a roving tactile oddball task. Mass-univariate analysis demonstrated robust activations in limbic, somatosensory, and prefrontal cortical areas previously implicated in tactile deviancy, body awareness, and cognitive control. Dynamic Causal Modelling revealed that unexpected stimuli increased the strength of forward connections along a caudal to rostral hierarchy-projecting from thalamic and somatosensory regions towards insula, cingulate and prefrontal cortices. Within this ascending flow of sensory information, the AIC was the only region to show increased backwards connectivity to the somatosensory cortex, augmenting a reciprocal exchange of neuronal signals. Further, participants who rated stimulus changes as easier to detect showed stronger modulation of descending PFC to AIC connections by deviance. These results suggest that the AIC coordinates hierarchical processing of tactile prediction error. They are interpreted in support of an embodied predictive coding model where AIC mediated body awareness is involved in anchoring a global neuronal workspace.

  4. Anterior insula coordinates hierarchical processing of tactile mismatch responses

    Science.gov (United States)

    Allen, Micah; Fardo, Francesca; Dietz, Martin J.; Hillebrandt, Hauke; Friston, Karl J.; Rees, Geraint; Roepstorff, Andreas

    2016-01-01

    The body underlies our sense of self, emotion, and agency. Signals arising from the skin convey warmth, social touch, and the physical characteristics of external stimuli. Surprising or unexpected tactile sensations can herald events of motivational salience, including imminent threats (e.g., an insect bite) and hedonic rewards (e.g., a caressing touch). Awareness of such events is thought to depend upon the hierarchical integration of body-related mismatch responses by the anterior insula. To investigate this possibility, we measured brain activity using functional magnetic resonance imaging, while healthy participants performed a roving tactile oddball task. Mass-univariate analysis demonstrated robust activations in limbic, somatosensory, and prefrontal cortical areas previously implicated in tactile deviancy, body awareness, and cognitive control. Dynamic Causal Modelling revealed that unexpected stimuli increased the strength of forward connections along a caudal to rostral hierarchy—projecting from thalamic and somatosensory regions towards insula, cingulate and prefrontal cortices. Within this ascending flow of sensory information, the AIC was the only region to show increased backwards connectivity to the somatosensory cortex, augmenting a reciprocal exchange of neuronal signals. Further, participants who rated stimulus changes as easier to detect showed stronger modulation of descending PFC to AIC connections by deviance. These results suggest that the AIC coordinates hierarchical processing of tactile prediction error. They are interpreted in support of an embodied predictive coding model where AIC mediated body awareness is involved in anchoring a global neuronal workspace. PMID:26584870

  5. Gold nanoparticle-based microfluidic sensor for mercury detection

    DEFF Research Database (Denmark)

    Lafleur, Josiane P.; Jensen, Thomas Glasdam; Kutter, Jörg Peter

    2011-01-01

    The contamination of natural resources by human activity can have severe socio-economical impacts. Conventional methods of environmental analysis can be significantly improved by the development of portable microscale technologies for remote/field sensing. A gold nanoparticle-based lab-on-a-chip ......-on-a-chip device was developed for the rapid, in-field detection and quantification of mercury in aquatic environments. Rhodamine 6G functionalized gold nanoparticles allowed the on-chip fluorescence detection of mercury in aqueous samples with a limit of detection of 7 nM....

  6. Image edge detection based on multi-fractal spectrum analysis

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-yuan; WANG Yao-nan

    2006-01-01

    In this paper,an image edge detection method based on multi-fractal spectrum analysis is presented.The coarse grain H(o)lder exponent of the image pixels is first computed,then,its multi-fractal spectrum is estimated by the kernel estimation method.Finally,the image edge detection is done by means of different multi-fractal spectrum values.Simulation results show that this method is efficient and has better locality compared with the traditional edge detection methods such as the Sobel method.

  7. MIXED SCHEME FOR IMAGE EDGE DETECTION BASED ON WAVELET TRANSFORM

    Institute of Scientific and Technical Information of China (English)

    Xie Hongmei; Yu Bianzhang; Zhao Jian

    2004-01-01

    A mixed scheme based on Wavelet Transformation (WT) is proposed for image edge detection. The scheme combines the wavelet transform and traditional Sobel and LoG (Laplacian of Gaussian) operator edge-detection algorithms. The precise theory analysis is given to show that the wavelet transformation has an advantage for signal processing. Simulation results show that the new scheme is better than only using the Sobel or LoG methods. Complexity analysis is also given and the conclusion is acceptable, therefore the proposed scheme is effective for edge detection.

  8. QRS Detection Based on an Advanced Multilevel Algorithm

    Directory of Open Access Journals (Sweden)

    Wissam Jenkal

    2016-01-01

    Full Text Available This paper presents an advanced multilevel algorithm used for the QRS complex detection. This method is based on three levels. The first permits the extraction of higher peaks using an adaptive thresholding technique. The second allows the QRS region detection. The last level permits the detection of Q, R and S waves. The proposed algorithm shows interesting results compared to recently published methods. The perspective of this work is the implementation of this method on an embedded system for a real time ECG monitoring system.

  9. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    LuoMin; ZhangHuan-guo; WangLi-na

    2003-01-01

    An unsupervised clustering-based intrusion detection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal duster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesn't need labeled training data sets. The experiment coneludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  10. Hough Forest-based Corner Detection for Cervical Spine Radiographs

    OpenAIRE

    Al-Arif, S. M.; Asad, M; Knapp, K.; Gundry, M.; Slabaugh, G. G.

    2015-01-01

    The cervical spine (neck region) is highly sensitive to trauma related injuries, which must be analysed carefully by emergency physicians. In this work, we propose a Hough Forest-based corner detection method for cervical spine radiographs, as a first step towards a computer-aided diagnostic tool. We propose a novel patch-based model based on two-stage supervised learning (classification and regression) to estimate the corners of cervical vertebral bodies. Our method is evaluated using 106 ce...

  11. Using LBG quantization for particle-based collision detection algorithm

    Institute of Scientific and Technical Information of China (English)

    SAENGHAENGTHAM Nida; KANONGCHAIYOS Pizzanu

    2006-01-01

    Most collision detection algorithms can be efficiently used only with solid and rigid objects, for instance, Hierarchical methods which must have their bounding representation recalculated every time deformation occurs. An alternative algorithm using particle-based method is then proposed which can detect the collision among non-rigid deformable polygonal models.However, the original particle-based collision detection algorithm might not be sufficient enough in some situations due to the improper particle dispersion. Therefore, this research presents an improved algorithm which provides a particle to detect in each separated area so that particles always covered all over the object. The surface partitioning can be efficiently performed by using LBG quantization since it can classify object vertices into several groups base on a number of factors as required. A particle is then assigned to move between vertices in a group by the attractive forces received from other particles on neighbouring objects.Collision is detected when the distance between a pair of corresponding particles becomes very small. Lastly, the proposed algorithm has been implemented to show that collision detection can be conducted in real-time.

  12. Vision-Based People Detection System for Heavy Machine Applications

    Science.gov (United States)

    Fremont, Vincent; Bui, Manh Tuan; Boukerroui, Djamal; Letort, Pierrick

    2016-01-01

    This paper presents a vision-based people detection system for improving safety in heavy machines. We propose a perception system composed of a monocular fisheye camera and a LiDAR. Fisheye cameras have the advantage of a wide field-of-view, but the strong distortions that they create must be handled at the detection stage. Since people detection in fisheye images has not been well studied, we focus on investigating and quantifying the impact that strong radial distortions have on the appearance of people, and we propose approaches for handling this specificity, adapted from state-of-the-art people detection approaches. These adaptive approaches nevertheless have the drawback of high computational cost and complexity. Consequently, we also present a framework for harnessing the LiDAR modality in order to enhance the detection algorithm for different camera positions. A sequential LiDAR-based fusion architecture is used, which addresses directly the problem of reducing false detections and computational cost in an exclusively vision-based system. A heavy machine dataset was built, and different experiments were carried out to evaluate the performance of the system. The results are promising, in terms of both processing speed and performance. PMID:26805838

  13. Protein-protein interactions in DNA mismatch repair.

    Science.gov (United States)

    Friedhoff, Peter; Li, Pingping; Gotthardt, Julia

    2016-02-01

    The principal DNA mismatch repair proteins MutS and MutL are versatile enzymes that couple DNA mismatch or damage recognition to other cellular processes. Besides interaction with their DNA substrates this involves transient interactions with other proteins which is triggered by the DNA mismatch or damage and controlled by conformational changes. Both MutS and MutL proteins have ATPase activity, which adds another level to control their activity and interactions with DNA substrates and other proteins. Here we focus on the protein-protein interactions, protein interaction sites and the different levels of structural knowledge about the protein complexes formed with MutS and MutL during the mismatch repair reaction. PMID:26725162

  14. Understanding the Consequences of Property Rights Mismatches: a Case Study of New Zealand's Marine Resources

    Directory of Open Access Journals (Sweden)

    Tracy Yandle

    2007-12-01

    Full Text Available Within fisheries and natural resource management literature, there is considerable discussion about the key roles that property rights can play in building biologically and socially sustainable resource management regimes. A key point of agreement is that secure long-term property rights provide an incentive for resource users to manage the resource sustainably. However, property rights mismatches create ambiguity and conflict in resource use. Though the term mismatches is usually associated with problems in matching temporal and spatial resource characteristics with institutional characteristics, I expand it here to include problems that can arise when property rights are incompletely defined or incompletely distributed. Property rights mismatches are particularly likely to occur over marine resources, for which multiple types of resource and resource user can be engaged and managed under a variety of regulatory regimes. I used New Zealand's marine resources to examine the causes and consequences of these property rights mismatches. New Zealand is particularly interesting because its property-rights-based commercial fishing regime, in the form of individual transferable quotas, has attracted considerable positive attention. However, my review of the marine natural resource management regime from a broader property rights perspective highlights a series of problems caused by property rights mismatches, including competition for resources among commercial, customary, and recreational fishers; spatial conflict among many marine resource users; and conflicting incentives and objectives for the management of resources over time. The use of a property rights perspective also highlights some potential solutions such as the layering of institutional arrangements and the improvement of how property rights are defined to encourage long-term sustainability.

  15. Distance Based Method for Outlier Detection of Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Haibin Zhang

    2016-01-01

    Full Text Available We propose a distance based method for the outlier detection of body sensor networks. Firstly, we use a Kernel Density Estimation (KDE to calculate the probability of the distance to k nearest neighbors for diagnosed data. If the probability is less than a threshold, and the distance of this data to its left and right neighbors is greater than a pre-defined value, the diagnosed data is decided as an outlier. Further, we formalize a sliding window based method to improve the outlier detection performance. Finally, to estimate the KDE by training sensor readings with errors, we introduce a Hidden Markov Model (HMM based method to estimate the most probable ground truth values which have the maximum probability to produce the training data. Simulation results show that the proposed method possesses a good detection accuracy with a low false alarm rate.

  16. A Trainable Neuromorphic Integrated Circuit that Exploits Device Mismatch

    OpenAIRE

    Thakur, Chetan Singh; Wang, Runchun; Hamilton, Tara Julia; Tapson, Jonathan; van Schaik, Andre

    2015-01-01

    Random device mismatch that arises as a result of scaling of the CMOS (complementary metal-oxide semi-conductor) technology into the deep submicron regime degrades the accuracy of analogue circuits. Methods to combat this increase the complexity of design. We have developed a novel neuromorphic system called a Trainable Analogue Block (TAB), which exploits device mismatch as a means for random projections of the input to a higher dimensional space. The TAB framework is inspired by the princip...

  17. Rhabdomyosarcoma in patients with constitutional mismatch-repair-deficiency syndrome

    OpenAIRE

    Kratz, Christian P; Holter, Spring; Etzler, Julia; Lauten, Melchior; Pollett, Aaron; Charlotte M. Niemeyer; Gallinger, Steven; Wimmer, Katharina

    2009-01-01

    Abstract Background: Biallelic germline mutations in the mismatch repair genes MLH1, MSH2, MSH6 or PMS2 cause a recessive childhood cancer syndrome characterized by early-onset malignancies and signs reminiscent of neurofibromatosis type 1 (NF1). Alluding to the underlying genetic defect we refer to this syndrome as constitutional mismatch repair-deficiency (CMMR-D) syndrome. The tumor spectrum of CMMR-D syndrome includes hematological neoplasias, brain tumors and Lynch syndrome as...

  18. The detection of bulk explosives using nuclear-based techniques

    Energy Technology Data Exchange (ETDEWEB)

    Morgado, R.E.; Gozani, T.; Seher, C.C.

    1988-01-01

    In 1986 we presented a rationale for the detection of bulk explosives based on nuclear techniques that addressed the requirements of civil aviation security in the airport environment. Since then, efforts have intensified to implement a system based on thermal neutron activation (TNA), with new work developing in fast neutron and energetic photon reactions. In this paper we will describe these techniques and present new results from laboratory and airport testing. Based on preliminary results, we contended in our earlier paper that nuclear-based techniques did provide sufficiently penetrating probes and distinguishable detectable reaction products to achieve the FAA operational goals; new data have supported this contention. The status of nuclear-based techniques for the detection of bulk explosives presently under investigation by the US Federal Aviation Administration (FAA) is reviewed. These include thermal neutron activation (TNA), fast neutron activation (FNA), the associated particle technique, nuclear resonance absorption, and photoneutron activation. The results of comprehensive airport testing of the TNA system performed during 1987-88 are summarized. From a technical point of view, nuclear-based techniques now represent the most comprehensive and feasible approach for meeting the operational criteria of detection, false alarms, and throughput. 9 refs., 5 figs., 2 tabs.

  19. Sequential Bayesian Detection: A Model-Based Approach

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V

    2008-12-08

    Sequential detection theory has been known for a long time evolving in the late 1940's by Wald and followed by Middleton's classic exposition in the 1960's coupled with the concurrent enabling technology of digital computer systems and the development of sequential processors. Its development, when coupled to modern sequential model-based processors, offers a reasonable way to attack physics-based problems. In this chapter, the fundamentals of the sequential detection are reviewed from the Neyman-Pearson theoretical perspective and formulated for both linear and nonlinear (approximate) Gauss-Markov, state-space representations. We review the development of modern sequential detectors and incorporate the sequential model-based processors as an integral part of their solution. Motivated by a wealth of physics-based detection problems, we show how both linear and nonlinear processors can seamlessly be embedded into the sequential detection framework to provide a powerful approach to solving non-stationary detection problems.

  20. Wafer weak point detection based on aerial images or WLCD

    Science.gov (United States)

    Ning, Guoxiang; Philipp, Peter; Litt, Lloyd C.; Ackmann, Paul; Crell, Christian; Chen, Norman

    2015-10-01

    Aerial image measurement is a key technique for model based optical proximity correction (OPC) verification. Actual aerial images obtained by AIMS (aerial image measurement system) or WLCD (wafer level critical dimension) can detect printed wafer weak point structures in advance of wafer exposure and defect inspection. Normally, the potential wafer weak points are determined based on optical rule check (ORC) simulation in advance. However, the correlation to real wafer weak points is often not perfect due to the contribution of mask three dimension (M3D) effects, actual mask errors, and scanner lens effects. If the design weak points can accurately be detected in advance, it will reduce the wafer fab cost and improve cycle time. WLCD or AIMS tools are able to measure the aerial images CD and bossung curve through focus window. However, it is difficult to detect the wafer weak point in advance without defining selection criteria. In this study, wafer weak points sensitive to mask mean-to-nominal values are characterized for a process with very high MEEF (normally more than 4). Aerial image CD uses fixed threshold to detect the wafer weak points. By using WLCD through threshold and focus window, the efficiency of wafer weak point detection is also demonstrated. A novel method using contrast range evaluation is shown in the paper. Use of the slope of aerial images for more accurate detection of the wafer weak points using WLCD is also discussed. The contrast range can also be used to detect the wafer weak points in advance. Further, since the mean to nominal of the reticle contributes to the effective contrast range in a high MEEF area this work shows that control of the mask error is critical for high MEEF layers such as poly, active and metal layers. Wafer process based weak points that cannot be detected by wafer lithography CD or WLCD will be discussed.

  1. Assessment of primer/template mismatch effects on real-time PCR amplification of target taxa for GMO quantification.

    Science.gov (United States)

    Ghedira, Rim; Papazova, Nina; Vuylsteke, Marnik; Ruttink, Tom; Taverniers, Isabel; De Loose, Marc

    2009-10-28

    GMO quantification, based on real-time PCR, relies on the amplification of an event-specific transgene assay and a species-specific reference assay. The uniformity of the nucleotide sequences targeted by both assays across various transgenic varieties is an important prerequisite for correct quantification. Single nucleotide polymorphisms (SNPs) frequently occur in the maize genome and might lead to nucleotide variation in regions used to design primers and probes for reference assays. Further, they may affect the annealing of the primer to the template and reduce the efficiency of DNA amplification. We assessed the effect of a minor DNA template modification, such as a single base pair mismatch in the primer attachment site, on real-time PCR quantification. A model system was used based on the introduction of artificial mismatches between the forward primer and the DNA template in the reference assay targeting the maize starch synthase (SSIIb) gene. The results show that the presence of a mismatch between the primer and the DNA template causes partial to complete failure of the amplification of the initial DNA template depending on the type and location of the nucleotide mismatch. With this study, we show that the presence of a primer/template mismatch affects the estimated total DNA quantity to a varying degree.

  2. DNA methylation detection based on difference of base content

    Science.gov (United States)

    Sato, Shinobu; Ohtsuka, Keiichi; Honda, Satoshi; Sato, Yusuke; Takenaka, Shigeori

    2016-04-01

    Methylation frequently occurs in cytosines of CpG sites to regulate gene expression. The identification of aberrant methylation of certain genes is important for cancer marker analysis. The aim of this study was to determine the methylation frequency in DNA samples of unknown length and/or concentration. Unmethylated cytosine is known to be converted to thymine following bisulfite treatment and subsequent PCR. For this reason, the AT content in DNA increases with an increasing number of methylation sites. In this study, the fluorescein-carrying bis-acridinyl peptide (FKA) molecule was used for the detection of methylation frequency. FKA contains fluorescein and two acridine moieties, which together allow for the determination of the AT content of double-stranded DNA fragments. Methylated and unmethylated human genomes were subjected to bisulfide treatment and subsequent PCR using primers specific for the CFTR, CDH4, DBC1, and NPY genes. The AT content in the resulting PCR products was estimated by FKA, and AT content estimations were found to be in good agreement with those determined by DNA sequencing. This newly developed method may be useful for determining methylation frequencies of many PCR products by measuring the fluorescence in samples excited at two different wavelengths.

  3. An Improved Retransmission-based Network Steganography: Design and Detection

    Directory of Open Access Journals (Sweden)

    Jiangtao Zhai

    2013-01-01

    Full Text Available Network steganography is a covert communication technique that uses redundancies in network protocols to transfer secret information. The retransmission-based steganography (RSTEG embeds covert messages into the payload field of the intentionally retransmission packets. So its capacity is higher than most of the existing methods. Because TCP checksum field of the original packet is different from that of the retransmitted packet, RSTEG is not stealthy in fact. An improved method named IRSTEG is presented to resolve the flaw by introducing the payload compensation. Further, a method is proposed to detect IRSTEG based the payload segment comparison. Experiments show that the method can detect IRSTEG well.

  4. 3D face recognition algorithm based on detecting reliable components

    Institute of Scientific and Technical Information of China (English)

    Huang Wenjun; Zhou Xuebing; Niu Xiamu

    2007-01-01

    Fisherfaces algorithm is a popular method for face recognition. However, there exist some unstable components that degrade recognition performance. In this paper, we propose a method based on detecting reliable components to overcome the problem and introduce it to 3D face recognition. The reliable components are detected within the binary feature vector, which is generated from the Fisherfaces feature vector based on statistical properties, and is used for 3D face recognition as the final feature vector. Experimental results show that the reliable components feature vector is much more effective than the Fisherfaces feature vector for face recognition.

  5. Unsupervised malaria parasite detection based on phase spectrum.

    Science.gov (United States)

    Fang, Yuming; Xiong, Wei; Lin, Weisi; Chen, Zhenzhong

    2011-01-01

    In this paper, we propose a novel method for malaria parasite detection based on phase spectrum. The method first obtains the amplitude spectrum and phase spectrum for blood smear images through Quaternion Fourier Transform (QFT). Then it gets the reconstructed image based on Inverse Quaternion Fourier transform (IQFT) on a constant amplitude spectrum and the original phase spectrum. The malaria parasite areas can be detected easily from the reconstructed blood smear images. Extensive experiments have demonstrated the effectiveness of this novel method. PMID:22256196

  6. Obstacle detection of mobile robot based on data fusion

    Institute of Scientific and Technical Information of China (English)

    YUAN Xin; SU Li; SUN Li-ning

    2009-01-01

    To study the problem of obstacle detection based on multi-sensors data fusion, the multi-target track-ing theory and techniques are introduced into obstacle detection systems, and the exact position of obstacle can be determined. Data fusion problems are discussed directly based on achievable data from some sensors without considering the specific structure of each individual sensor. With respect to normal linear systems and nonlinear systems, the corresponding algorithms are proposed. The validity of the method is confirmed by simulation re-suits.

  7. Detection of polyaromatic compounds using antibody-based fiberoptics fluoroimmunosensors

    Energy Technology Data Exchange (ETDEWEB)

    Vo-Dinh, T.; Tromberg, B.J.; Griffin, G.D.; Ambrose, K.R.; Sepaniak, M.J.; Alarie, J.P.

    1987-01-01

    In this work we have investigated the performance of an antibody-based fiberoptics sensor for the detection of the carcinogen benzo(a)pyrene and its DNA-adduct product BP-tetrol. The excellent sensitivity of this device - femtomole limits of detection for BP - illustrates that it has considerable potential to perform analyses of chemical and biological samples at trace levels in complex matrices. The results indicate that fiberoptics-based fluoroimmunosensors can be useful in a wide spectrum of biochemical and clinical analyses. 17 refs., 4 figs., 1 tab.

  8. Distinct Clinicopathological Patterns of Mismatch Repair Status in Colorectal Cancer Stratified by KRAS Mutations.

    Directory of Open Access Journals (Sweden)

    Wenbin Li

    Full Text Available In sporadic colorectal cancer (CRC, the BRAFV600E mutation is associated with deficient mismatch repair (MMR status and inversely associated with to KRAS mutations. In contrast to deficient MMR (dMMR CRC, data on the presence of KRAS oncogenic mutations in proficient MMR (pMMR CRC and their relationship with tumor progression are scarce. We therefore examined the MMR status in combination with KRAS mutations in 913 Chinese patients and correlated the findings obtained with clinical and pathological features. The MMR status was determined based on detection of MLH1, MSH2, MSH6 and PMS2 expression. KRAS mutation and dMMR status were detected in 36.9% and 7.5% of cases, respectively. Four subtypes were determined by MMR and KRAS mutation status: KRAS (+/pMMR (34.0%, KRAS (+/dMMR (2.9%, KRAS (-/pMMR (58.5% and KRAS (-/dMMR (4.6%. A higher percentage of pMMR tumors with KRAS mutation were most likely to be female (49.0%, proximal located (45.5%, a mucinous histology (38.4%, and to have increased lymph node metastasis (60.3%, compared with pMMR tumors without BRAFV600E and KRAS mutations (36.0%, 29.3%, 29.4% and 50.7%, respectively; all P < 0.01. To the contrary, compared with those with KRAS(-/dMMR tumors, patients with KRAS(+/dMMR tumors demonstrated no statistically significant differences in gender, tumor location, pT depth of invasion, lymph node metastasis, pTNM stage, and histologic grade. This study revealed that specific epidemiologic and clinicopathologic characteristics are associated with MMR status stratified by KRAS mutation. Knowledge of MMR and KRAS mutation status may enhance molecular pathologic staging of CRC patients and metastatic progression in CRC can be estimated based on the combination of these biomarkers.

  9. Real-time fault detection method based on belief rule base for aircraft navigation system

    Institute of Scientific and Technical Information of China (English)

    Zhao Xin; Wang Shicheng; Zhang Jinsheng; Fan Zhiliang; Min Haibo

    2013-01-01

    Real-time and accurate fault detection is essential to enhance the aircraft navigation system's reliability and safety.The existent detection methods based on analytical model draws back at simultaneously detecting gradual and sudden faults.On account of this reason,we propose an online detection solution based on non-analytical model.In this article,the navigation system fault detection model is established based on belief rule base (BRB),where the system measuring residual and its changing rate are used as the inputs of BRB model and the fault detection function as the output.To overcome the drawbacks of current parameter optimization algorithms for BRB and achieve online update,a parameter recursive estimation algorithm is presented for online BRB detection model based on expectation maximization (EM) algorithm.Furthermore,the proposed method is verified by navigation experiment.Experimental results show that the proposed method is able to effectively realize online parameter evaluation in navigation system fault detection model.The output of the detection model can track the fault state very well,and the faults can be diagnosed in real time and accurately.In addition,the detection ability,especially in the probability of false detection,is superior to offline optimization method,and thus the system reliability has great improvement.

  10. Mechanism of mismatch recognition revealed by human MutS[beta] bound to unpaired DNA loops

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Shikha; Gellert, Martin; Yang, Wei (NIH)

    2012-04-17

    DNA mismatch repair corrects replication errors, thus reducing mutation rates and microsatellite instability. Genetic defects in this pathway cause Lynch syndrome and various cancers in humans. Binding of a mispaired or unpaired base by bacterial MutS and eukaryotic MutS{alpha} is well characterized. We report here crystal structures of human MutS{beta} in complex with DNA containing insertion-deletion loops (IDL) of two, three, four or six unpaired nucleotides. In contrast to eukaryotic MutS{alpha} and bacterial MutS, which bind the base of a mismatched nucleotide, MutS{beta} binds three phosphates in an IDL. DNA is severely bent at the IDL; unpaired bases are flipped out into the major groove and partially exposed to solvent. A normal downstream base pair can become unpaired; a single unpaired base can thereby be converted to an IDL of two nucleotides and recognized by MutS{beta}. The C-terminal dimerization domains form an integral part of the MutS structure and coordinate asymmetrical ATP hydrolysis by Msh2 and Msh3 with mismatch binding to signal for repair.

  11. Analysis of Android Device-Based Solutions for Fall Detection.

    Science.gov (United States)

    Casilari, Eduardo; Luque, Rafael; Morón, María-José

    2015-01-01

    Falls are a major cause of health and psychological problems as well as hospitalization costs among older adults. Thus, the investigation on automatic Fall Detection Systems (FDSs) has received special attention from the research community during the last decade. In this area, the widespread popularity, decreasing price, computing capabilities, built-in sensors and multiplicity of wireless interfaces of Android-based devices (especially smartphones) have fostered the adoption of this technology to deploy wearable and inexpensive architectures for fall detection. This paper presents a critical and thorough analysis of those existing fall detection systems that are based on Android devices. The review systematically classifies and compares the proposals of the literature taking into account different criteria such as the system architecture, the employed sensors, the detection algorithm or the response in case of a fall alarms. The study emphasizes the analysis of the evaluation methods that are employed to assess the effectiveness of the detection process. The review reveals the complete lack of a reference framework to validate and compare the proposals. In addition, the study also shows that most research works do not evaluate the actual applicability of the Android devices (with limited battery and computing resources) to fall detection solutions. PMID:26213928

  12. Semantic-based technique for thai documents plagiarism detection

    Directory of Open Access Journals (Sweden)

    Sorawat Prapanitisatian

    2014-03-01

    Full Text Available Plagiarism is the act of taking another person's writing or idea without referring to the source of information. This is one of major problems in educational institutes. There is a number of plagiarism detection software available on the Internet. However, a few numbers of them works. Typically, they use a simple method for plagiarism detection e.g. string matching. The main weakness of this method is it cannot detect the plagiarism when the author replaces some words using synonyms. As such, this paper presents a new technique for a semantic-based plagiarism detection using Semantic Role Labeling (SRL and term weighting. SRL is deployed in order to calculate the semantic-based similarity. The main different from the existing framework is terms in a sentence are weighted dynamically depending on their roles in the sentence e.g. subject, verb or object. This technique enhances the plagiarism detection mechanism more efficiently than existing system although positions of terms in a sentence are reordered. The experimental results show that the proposed method can detect the plagiarism document more effective than the existing methods, Anti-kobpae, Turnit-in and Traditional Semantic Role Labeling.

  13. Noise Based Detection and Segmentation of Nebulous Objects

    CERN Document Server

    Akhlaghi, Mohammad

    2015-01-01

    A noise based non parametric technique to detect nebulous objects, for example irregular or clumpy galaxies, and their structure in noise is introduced. Noise based and non parametric imply that it imposes negligible constraints on the properties of the targets and that it employs no regression analysis or fittings. The sub-sky detection threshold is defined, and initial detections are found, independent of the sky value. False detections are then estimated and removed using the ambient noise as a reference. This results in a purity level of 0.86 for the final detections as compared to 0.27 for SExtractor when a completeness of 1 is desired for a sample extremely faint and diffuse identical mock galaxy profiles. The dispersion in their measured magnitudes is less by one magnitude, allowing much more accurate photometry. Defining the accuracy of detection as the difference of the measured sky with the known background of mock images, an order of magnitude less biased sky measurement is achieved. A non parametr...

  14. Analysis of Android Device-Based Solutions for Fall Detection.

    Science.gov (United States)

    Casilari, Eduardo; Luque, Rafael; Morón, María-José

    2015-07-23

    Falls are a major cause of health and psychological problems as well as hospitalization costs among older adults. Thus, the investigation on automatic Fall Detection Systems (FDSs) has received special attention from the research community during the last decade. In this area, the widespread popularity, decreasing price, computing capabilities, built-in sensors and multiplicity of wireless interfaces of Android-based devices (especially smartphones) have fostered the adoption of this technology to deploy wearable and inexpensive architectures for fall detection. This paper presents a critical and thorough analysis of those existing fall detection systems that are based on Android devices. The review systematically classifies and compares the proposals of the literature taking into account different criteria such as the system architecture, the employed sensors, the detection algorithm or the response in case of a fall alarms. The study emphasizes the analysis of the evaluation methods that are employed to assess the effectiveness of the detection process. The review reveals the complete lack of a reference framework to validate and compare the proposals. In addition, the study also shows that most research works do not evaluate the actual applicability of the Android devices (with limited battery and computing resources) to fall detection solutions.

  15. Analysis of Android Device-Based Solutions for Fall Detection

    Directory of Open Access Journals (Sweden)

    Eduardo Casilari

    2015-07-01

    Full Text Available Falls are a major cause of health and psychological problems as well as hospitalization costs among older adults. Thus, the investigation on automatic Fall Detection Systems (FDSs has received special attention from the research community during the last decade. In this area, the widespread popularity, decreasing price, computing capabilities, built-in sensors and multiplicity of wireless interfaces of Android-based devices (especially smartphones have fostered the adoption of this technology to deploy wearable and inexpensive architectures for fall detection. This paper presents a critical and thorough analysis of those existing fall detection systems that are based on Android devices. The review systematically classifies and compares the proposals of the literature taking into account different criteria such as the system architecture, the employed sensors, the detection algorithm or the response in case of a fall alarms. The study emphasizes the analysis of the evaluation methods that are employed to assess the effectiveness of the detection process. The review reveals the complete lack of a reference framework to validate and compare the proposals. In addition, the study also shows that most research works do not evaluate the actual applicability of the Android devices (with limited battery and computing resources to fall detection solutions.

  16. Video Shot Boundary Detection based on Multifractal Analisys

    Directory of Open Access Journals (Sweden)

    B. D. Reljin

    2011-11-01

    Full Text Available Extracting video shots is an essential preprocessing step to almost all video analysis, indexing, and other content-based operations. This process is equivalent to detecting the shot boundaries in a video. In this paper we presents video Shot Boundary Detection (SBD based on Multifractal Analysis (MA. Low-level features (color and texture features are extracted from each frame in video sequence. Features are concatenated in feature vectors (FVs and stored in feature matrix. Matrix rows correspond to FVs of frames from video sequence, while columns are time series of particular FV component. Multifractal analysis is applied to FV component time series, and shot boundaries are detected as high singularities of time series above pre defined treshold. Proposed SBD method is tested on real video sequence with 64 shots, with manually labeled shot boundaries. Detection accuracy depends on number FV components used. For only one FV component detection accuracy lies in the range 76-92% (depending on selected threshold, while by combining two FV components all shots are detected completely (accuracy of 100%.

  17. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  18. R-peaks detection based on stationary wavelet transform.

    Science.gov (United States)

    Merah, M; Abdelmalik, T A; Larbi, B H

    2015-10-01

    Automatic detection of the QRS complexes/R-peaks in an electrocardiogram (ECG) signal is the most important step preceding any kind of ECG processing and analysis. The performance of these systems heavily relies on the accuracy of the QRS detector. The objective of present work is to drive a new robust method based on stationary wavelet transform (SWT) for R-peaks detection. The decimation of the coefficients at each level of the transformation algorithm is omitted, more samples in the coefficient sequences are available and hence a better outlier detection can be performed. Using the information of local maxima, minima and zero crossings of the fourth SWT coefficient detail, the proposed algorithm identifies the significant points for detection and delineation of the QRS complexes, as well as detection and identification of the QRS individual waves peaks of the pre-processed ECG signal. Various experimental results show that the proposed algorithm exhibits reliable QRS detection as well as accurate ECG delineation, achieving excellent performance on different databases, on the MIT-BIH database (Se=99.84%, P=99.88%), on the QT Database (Se=99.94%, P=99.89%) and on MIT-BIH Noise Stress Test Database, (Se=95.30%, P=93.98%). Reliability and accuracy are close to the highest among the ones obtained in other studies. Experiments results being satisfactory, the SWT may represent a novel QRS detection tool, for a robust ECG signal analysis. PMID:26105724

  19. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  20. PCA-HOG symmetrical feature based diseased cell detection

    Science.gov (United States)

    Wan, Min-jie

    2016-04-01

    A histogram of oriented gradient (HOG) feature is applied to the field of diseased cell detection, which can detect diseased cells in high resolution tissue images rapidly, accurately and efficiently. Firstly, motivated by symmetrical cellular forms, a new HOG symmetrical feature based on the traditional HOG feature is proposed to meet the condition of cell detection. Secondly, considering the high feature dimension of traditional HOG feature leads to plenty of memory resources and long runtime in practical applications, a classical dimension reduction method called principal component analysis (PCA) is used to reduce the dimension of high-dimensional HOG descriptor. Because of that, computational speed is increased greatly, and the accuracy of detection can be controlled in a proper range at the same time. Thirdly, support vector machine (SVM) classifier is trained with PCA-HOG symmetrical features proposed above. At last, practical tissue images is detected and analyzed by SVM classifier. In order to verify the effectiveness of this new algorithm, it is practically applied to conduct diseased cell detection which takes 200 pieces of H&E (hematoxylin & eosin) high resolution staining histopathological images collected from 20 breast cancer patients as a sample. The experiment shows that the average processing rate can be 25 frames per second and the detection accuracy can be 92.1%.

  1. An FPGA-Based Rapid Wheezing Detection System

    Directory of Open Access Journals (Sweden)

    Bor-Shing Lin

    2014-01-01

    Full Text Available Wheezing is often treated as a crucial indicator in the diagnosis of obstructive pulmonary diseases. A rapid wheezing detection system may help physicians to monitor patients over the long-term. In this study, a portable wheezing detection system based on a field-programmable gate array (FPGA is proposed. This system accelerates wheezing detection, and can be used as either a single-process system, or as an integrated part of another biomedical signal detection system. The system segments sound signals into 2-second units. A short-time Fourier transform was used to determine the relationship between the time and frequency components of wheezing sound data. A spectrogram was processed using 2D bilateral filtering, edge detection, multithreshold image segmentation, morphological image processing, and image labeling, to extract wheezing features according to computerized respiratory sound analysis (CORSA standards. These features were then used to train the support vector machine (SVM and build the classification models. The trained model was used to analyze sound data to detect wheezing. The system runs on a Xilinx Virtex-6 FPGA ML605 platform. The experimental results revealed that the system offered excellent wheezing recognition performance (0.912. The detection process can be used with a clock frequency of 51.97 MHz, and is able to perform rapid wheezing classification.

  2. Accounting for detectability in fish distribution models: an approach based on time-to-first-detection

    Directory of Open Access Journals (Sweden)

    Mário Ferreira

    2015-12-01

    Full Text Available Imperfect detection (i.e., failure to detect a species when the species is present is increasingly recognized as an important source of uncertainty and bias in species distribution modeling. Although methods have been developed to solve this problem by explicitly incorporating variation in detectability in the modeling procedure, their use in freshwater systems remains limited. This is probably because most methods imply repeated sampling (≥ 2 of each location within a short time frame, which may be impractical or too expensive in most studies. Here we explore a novel approach to control for detectability based on the time-to-first-detection, which requires only a single sampling occasion and so may find more general applicability in freshwaters. The approach uses a Bayesian framework to combine conventional occupancy modeling with techniques borrowed from parametric survival analysis, jointly modeling factors affecting the probability of occupancy and the time required to detect a species. To illustrate the method, we modeled large scale factors (elevation, stream order and precipitation affecting the distribution of six fish species in a catchment located in north-eastern Portugal, while accounting for factors potentially affecting detectability at sampling points (stream depth and width. Species detectability was most influenced by depth and to lesser extent by stream width and tended to increase over time for most species. Occupancy was consistently affected by stream order, elevation and annual precipitation. These species presented a widespread distribution with higher uncertainty in tributaries and upper stream reaches. This approach can be used to estimate sampling efficiency and provide a practical framework to incorporate variations in the detection rate in fish distribution models.

  3. Colour based fire detection method with temporal intensity variation filtration

    International Nuclear Information System (INIS)

    Development of video, computing technologies and computer vision gives a possibility of automatic fire detection on video information. Under that project different algorithms was implemented to find more efficient way of fire detection. In that article colour based fire detection algorithm is described. But it is not enough to use only colour information to detect fire properly. The main reason of this is that in the shooting conditions may be a lot of things having colour similar to fire. A temporary intensity variation of pixels is used to separate them from the fire. These variations are averaged over the series of several frames. This algorithm shows robust work and was realised as a computer program by using of the OpenCV library

  4. Kernel-based fisher discriminant analysis for hyperspectral target detection

    Institute of Scientific and Technical Information of China (English)

    GU Yan-feng; ZHANG Ye; YOU Di

    2007-01-01

    A new method based on kernel Fisher discriminant analysis (KFDA) is proposed for target detection of hyperspectral images. The KFDA combines kernel mapping derived from support vector machine and the classical linear Fisher discriminant analysis (LFDA), and it possesses good ability to process nonlinear data such as hyperspectral images. According to the Fisher rule that the ratio of the between-class and within-class scatters is maximized, the KFDA is used to obtain a set of optimal discriminant basis vectors in high dimensional feature space. All pixels in the hyperspectral images are projected onto the discriminant basis vectors and the target detection is performed according to the projection result. The numerical experiments are performed on hyperspectral data with 126 bands collected by Airborne Visible/Infrared Imaging Spectrometer (AVIRIS). The experimental results show the effectiveness of the proposed detection method and prove that this method has good ability to overcome small sample size and spectral variability in the hyperspectral target detection.

  5. Colour based fire detection method with temporal intensity variation filtration

    Science.gov (United States)

    Trambitckii, K.; Anding, K.; Musalimov, V.; Linß, G.

    2015-02-01

    Development of video, computing technologies and computer vision gives a possibility of automatic fire detection on video information. Under that project different algorithms was implemented to find more efficient way of fire detection. In that article colour based fire detection algorithm is described. But it is not enough to use only colour information to detect fire properly. The main reason of this is that in the shooting conditions may be a lot of things having colour similar to fire. A temporary intensity variation of pixels is used to separate them from the fire. These variations are averaged over the series of several frames. This algorithm shows robust work and was realised as a computer program by using of the OpenCV library.

  6. Measurements-based Moving Target Detection in Quantum Video

    Science.gov (United States)

    Yan, Fei; Iliyasu, Abdullah M.; Khan, Asif R.; Yang, Huamin

    2016-04-01

    A method to detect a moving target in multi-channel quantum video is proposed based on multiple measurements on the video strip. The proposed method is capable of detecting the location of the moving target in each frame of the quantum video thereby ensuring that the motion trail of the object is easily and efficiently retrieved. Three experiments, i.e. moving target detection (MTD) of a pixel, MTD of an object in complex shape, and MTD of a pixel whose color is conterminous with that of its background, are implemented to demonstrate the feasibility of the proposal. This study presents a modest attempt to focus on the moving target detection and its applications in quantum video.

  7. Sparsity-based algorithm for detecting faults in rotating machines

    Science.gov (United States)

    He, Wangpeng; Ding, Yin; Zi, Yanyang; Selesnick, Ivan W.

    2016-05-01

    This paper addresses the detection of periodic transients in vibration signals so as to detect faults in rotating machines. For this purpose, we present a method to estimate periodic-group-sparse signals in noise. The method is based on the formulation of a convex optimization problem. A fast iterative algorithm is given for its solution. A simulated signal is formulated to verify the performance of the proposed approach for periodic feature extraction. The detection performance of comparative methods is compared with that of the proposed approach via RMSE values and receiver operating characteristic (ROC) curves. Finally, the proposed approach is applied to single fault diagnosis of a locomotive bearing and compound faults diagnosis of motor bearings. The processed results show that the proposed approach can effectively detect and extract the useful features of bearing outer race and inner race defect.

  8. Edge Detection Operators: Peak Signal to Noise Ratio Based Comparison

    Directory of Open Access Journals (Sweden)

    D. Poobathy

    2014-09-01

    Full Text Available Edge detection is the vital task in digital image processing. It makes the image segmentation and pattern recognition more comfort. It also helps for object detection. There are many edge detectors available for pre-processing in computer vision. But, Canny, Sobel, Laplacian of Gaussian (LoG, Robert’s and Prewitt are most applied algorithms. This paper compares each of these operators by the manner of checking Peak signal to Noise Ratio (PSNR and Mean Squared Error (MSE of resultant image. It evaluates the performance of each algorithm with Matlab and Java. The set of four universally standardized test images are used for the experimentation. The PSNR and MSE results are numeric values, based on that, performance of algorithms identified. The time required for each algorithm to detect edges is also documented. After the Experimentation, Canny operator found as the best among others in edge detection accuracy.

  9. FPGA-based amplitude and phase detection in DLLRF

    Institute of Scientific and Technical Information of China (English)

    LIU Rong; WANG Zheng; PAN Wei-Min; WANG Guang-Wei; LIN Hai-Ying; SHA Peng; ZENG Ri-Hua

    2009-01-01

    The new generation particle accelerator requires a highly stable radio frequency (RF) system. The stability of the RF system is realized by the Low Level RF (LLRF) subsystem which controls the amplitude and phase of the RF signal. The detection of the RF signal's amplitude and phase is fundamental to LLRF controls. High-speed ADC (Analog to Digital Converter), DAC (Digital to Analog Converter) and FPGA (Field Programmable Gate Array) play very important roles in digital LLRF control systems. This paper describes the implementation of real-time amplitude and phase detection based of the FPGA with an analysis of the main factors that affect the detection accuracy such as jitter, algorithm's defects and non-linearity of devices, which is helpful for future work on high precision detection and control.

  10. Contributed Review: Quantum cascade laser based photoacoustic detection of explosives

    Science.gov (United States)

    Li, J. S.; Yu, B.; Fischer, H.; Chen, W.; Yalin, A. P.

    2015-03-01

    Detecting trace explosives and explosive-related compounds has recently become a topic of utmost importance for increasing public security around the world. A wide variety of detection methods and an even wider range of physical chemistry issues are involved in this very challenging area. Optical sensing methods, in particular mid-infrared spectrometry techniques, have a great potential to become a more desirable tools for the detection of explosives. The small size, simplicity, high output power, long-term reliability make external cavity quantum cascade lasers (EC-QCLs) the promising spectroscopic sources for developing analytical instrumentation. This work reviews the current technical progress in EC-QCL-based photoacoustic spectroscopy for explosives detection. The potential for both close-contact and standoff configurations using this technique is completely presented over the course of approximately the last one decade.

  11. Contributed Review: Quantum cascade laser based photoacoustic detection of explosives

    Energy Technology Data Exchange (ETDEWEB)

    Li, J. S., E-mail: jingsong-li@ahu.edu.cn; Yu, B. [Key Laboratory of Opto-Electronic Information Acquisition and Manipulation of Ministry of Education, Anhui University, Hefei (China); Fischer, H. [Department of Atmospheric Chemistry, Max Planck Institute for Chemistry, Mainz (Germany); Chen, W. [Laboratoire de Physicochimie de l’Atmosphére, Université du Littoral Côte d’Opale, Dunkerque (France); Yalin, A. P. [Department of Mechanical Engineering, Colorado State University, Fort Collins, Colorado 80523-1374 (United States)

    2015-03-15

    Detecting trace explosives and explosive-related compounds has recently become a topic of utmost importance for increasing public security around the world. A wide variety of detection methods and an even wider range of physical chemistry issues are involved in this very challenging area. Optical sensing methods, in particular mid-infrared spectrometry techniques, have a great potential to become a more desirable tools for the detection of explosives. The small size, simplicity, high output power, long-term reliability make external cavity quantum cascade lasers (EC-QCLs) the promising spectroscopic sources for developing analytical instrumentation. This work reviews the current technical progress in EC-QCL-based photoacoustic spectroscopy for explosives detection. The potential for both close-contact and standoff configurations using this technique is completely presented over the course of approximately the last one decade.

  12. An ellipse detection algorithm based on edge classification

    Science.gov (United States)

    Yu, Liu; Chen, Feng; Huang, Jianming; Wei, Xiangquan

    2015-12-01

    In order to enhance the speed and accuracy of ellipse detection, an ellipse detection algorithm based on edge classification is proposed. Too many edge points are removed by making edge into point in serialized form and the distance constraint between the edge points. It achieves effective classification by the criteria of the angle between the edge points. And it makes the probability of randomly selecting the edge points falling on the same ellipse greatly increased. Ellipse fitting accuracy is significantly improved by the optimization of the RED algorithm. It uses Euclidean distance to measure the distance from the edge point to the elliptical boundary. Experimental results show that: it can detect ellipse well in case of edge with interference or edges blocking each other. It has higher detecting precision and less time consuming than the RED algorithm.

  13. Farsi License Plate Detection and Recognition Based on Characters Features

    Directory of Open Access Journals (Sweden)

    Sedigheh Ghofrani

    2011-06-01

    Full Text Available In this paper a license plate detection and recognition system for Iranian private cars is implemented. The proposed license plate localization algorithm is based on region elements analysis which works properly independent of distance (how far a vehicle is, rotation (angle between camera and vehicle, and contrast (being dirty, reflected, or deformed. In addition, more than one car may exist in the image. The proposed method extracts edges and then determines the candidate regions by applying window movement. The region elements analysis includes binarization, character analysis, character continuity analysis and character parallelism analysis. After detecting license plates, we estimate the rotation angle and try to compensate it. In order to identify a detected plate, every character should be recognized. For this purpose, we present 25 features and use them as the input to an artificial neural network classifier. The experimental results show that our proposed method achieves appropriate performance for both detection and recognition of the Iranian license plates.

  14. Electrochemiluminescence detection in microfluidic cloth-based analytical devices.

    Science.gov (United States)

    Guan, Wenrong; Liu, Min; Zhang, Chunsun

    2016-01-15

    This work describes the first approach at combining microfluidic cloth-based analytical devices (μCADs) with electrochemiluminescence (ECL) detection. Wax screen-printing is employed to make cloth-based microfluidic chambers which are patterned with carbon screen-printed electrodes (SPEs) to create truly disposable, simple, inexpensive sensors which can be read with a low-cost, portable charge coupled device (CCD) imaging sensing system. And, the two most commonly used ECL systems of tris(2,2'-bipyridyl)ruthenium(II)/tri-n-propylamine (Ru(bpy)3(2+)/TPA) and 3-aminophthalhydrazide/hydrogen peroxide (luminol/H2O2) are applied to demonstrate the quantitative ability of the ECL μCADs. In this study, the proposed devices have successfully fulfilled the determination of TPA with a linear range from 2.5 to 2500μM with a detection limit of 1.265μM. In addition, the detection of H2O2 can be performed in the linear range of 0.05-2.0mM, with a detection limit of 0.027mM. It has been shown that the ECL emission on the wax-patterned cloth device has an acceptable sensitivity, stability and reproducibility. Finally, the applicability of cloth-based ECL is demonstrated for determination of glucose in phosphate buffer solution (PBS) and artificial urine (AU) samples, with the detection limits of 0.032mM and 0.038mM, respectively. It can be foreseen, therefore, that μCADs with ECL detection could provide a new sensing platform for point-of-care testing, public health, food safety detection and environmental monitoring in remote regions, developing or developed countries. PMID:26319168

  15. Nanoparticles based DNA conjugates for detection of pathogenic microorganisms

    Science.gov (United States)

    Jamdagni, Pragati; Khatri, Poonam; Rana, J. S.

    2016-01-01

    Infectious diseases have been on rise in the recent past. Early diagnosis plays a role as important as proper treatment and prophylaxis. The current practices of detection are time consuming which may result in unnecessary delays in treatment. Advances in nanodiagnostic approaches have been in focus lately. The rising interest and better understanding of nanoparticles have led to opening up of new frontiers in the concerned area. Optical properties of nanoparticles are being exploited to design detection systems that can provide fast, one-step and reliable results. Based on conserved DNA sequences unique to the target organism, the results offer accuracy comparable to conventional tests. Further, visual or spectrophotometric analysis omits the need of costly apparatus for result interpretation. The present review aims at putting together the information on nanoparticles based DNA conjugate systems for detection of pathogenic microorganisms.

  16. SERS-based pesticide detection by using nanofinger sensors

    International Nuclear Information System (INIS)

    Simple, sensitive, and rapid detection of trace levels of extensively used and highly toxic pesticides are in urgent demand for public health. Surface-enhanced Raman scattering (SERS)-based sensor was designed to achieve ultrasensitive and simple pesticide sensing. We developed a portable sensor system composed of high performance and reliable gold nanofinger sensor strips and a custom-built portable Raman spectrometer. Compared to the general procedure and previously reported studies that are limited to laboratory settings, our analytical method is simple, sensitive, rapid, and cost-effective. Based on the SERS results, the chemical interaction of two pesticides, chlorpyrifos (CPF) and thiabendazole (TBZ), with gold nanofingers was studied to determine a fingerprint for each pesticide. The portable SERS-sensor system was successfully demonstrated to detect CPF and TBZ pesticides within 15 min with a detection limit of 35 ppt in drinking water and 7 ppb on apple skin, respectively. (paper)

  17. Detecting weather radar clutter using satellite-based nowcasting products

    DEFF Research Database (Denmark)

    Jensen, Thomas B.S.; Gill, Rashpal S.; Overgaard, Søren;

    2006-01-01

    by the resolution of the radar data. Subsequently, a supervised classifier was developed based on training data selected by a weather radar expert. Results of classification of data from several different meteorological events are shown. Cases of widespread sea clutter caused by anomalous propagation are especially......This contribution presents the initial results from experiments with detection of weather radar clutter by information fusion with satellite based nowcasting products. Previous studies using information fusion of weather radar data and first generation Meteosat imagery have shown promising results...... for the detecting and removal of clutter. Naturally, the improved spatio-temporal resolution of the Meteosat Second Generation sensors, coupled with its increased number of spectral bands, is expected to yield even better detection accuracies. Weather radar data from three C-band Doppler weather radars...

  18. GPR-Based Landmine Detection and Identification Using Multiple Features

    Directory of Open Access Journals (Sweden)

    Kwang Hee Ko

    2012-01-01

    Full Text Available This paper presents a method to identify landmines in various burial conditions. A ground penetration radar is used to generate data set, which is then processed to reduce the ground effect and noise to obtain landmine signals. Principal components and Fourier coefficients of the landmine signals are computed, which are used as features of each landmine for detection and identification. A database is constructed based on the features of various types of landmines and the ground conditions, including the different levels of moisture and types of ground and the burial depths of the landmines. Detection and identification is performed by searching for features in the database. For a robust decision, the counting method and the Mahalanobis distance-based likelihood ratio test method are employed. Four landmines, different in size and material, are considered as examples that demonstrate the efficiency of the proposed method for detecting and identifying landmines.

  19. Aircraft detection based on probability model of structural elements

    Science.gov (United States)

    Chen, Long; Jiang, Zhiguo

    2014-11-01

    Detecting aircrafts is important in the field of remote sensing. In past decades, researchers used various approaches to detect aircrafts based on classifiers for overall aircrafts. However, with the development of high-resolution images, the internal structures of aircrafts should also be taken into consideration now. To address this issue, a novel aircrafts detection method for satellite images based on probabilistic topic model is presented. We model aircrafts as the connected structural elements rather than features. The proposed method contains two major steps: 1) Use Cascade-Adaboost classier to identify the structural elements of aircraft firstly. 2) Connect these structural elements to aircrafts, where the relationships between elements are estimated by hierarchical topic model. The model places strict spatial constraints on structural elements which can identify differences between similar features. The experimental results demonstrate the effectiveness of the approach.

  20. NETWORK INTRUSION DETECTION METHOD BASED ON RS-MSVM

    Institute of Scientific and Technical Information of China (English)

    Xiao Yun; Han Chongzhao; Zheng Qinghua; Zhang Junjie

    2006-01-01

    A new method called RS-MSVM (Rough Set and Multi-class Support Vector Machine) is proposed for network intrusion detection. This method is based on rough set followed by MSVM for attribute reduction and classification respectively. The number of attributes of the network data used in this paper is reduced from 41 to 30 using rough set theory. The kernel function of HVDM-RBF (Heterogeneous Value Difference Metric Radial Basis Function), based on the heterogeneous value difference metric of heterogeneous datasets, is constructed for the heterogeneous network data. HVDM-RBF and one-against-one method are applied to build MSVM. DARPA (Defense Advanced Research Projects Agency) intrusion detection evaluating data were used in the experiment. The testing results show that our method outperforms other methods mentioned in this paper on six aspects: detection accuracy, number of support vectors, false positive rate, false negative rate, training time and testing time.

  1. Ship detection in Polarimetric SAR based on Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Xuwu Su

    2012-08-01

    Full Text Available A Support Vector Machine (SVM based method for ship detection in Polarimetric SAR (POLSAR is proposed in this study. Because of similarities of ship and man-made structures on land in scattering mechanisms, land and sea are first segmented by SVM according to polarimetric features and texture features; The SVM-based Recursive Feature Elimination (RFE-SVM approach is adopted to improve the performance of the segmentation algorithm. Then ship targets are extracted from sea by SVM classifier; Threshold-based rules and SVM-based rules are established for discriminating ship from non-ship target at last. The experiments are carried out on POLSAR data from Radarsat-2. For the available SAR images, the average accuracy of ship detection is over 95%.

  2. Image edge-enhancement in optical microscopy with a phase mismatched spiral phase plate

    Institute of Scientific and Technical Information of China (English)

    Shibiao Wei; Jing Bu; Siwei Zhu; Xiaocong Yuan

    2011-01-01

    @@ We present a spiral phase filtering system with a large tolerance for edge enhancement of both phase and amplitude objects in optical microscopy.The method is based on a Fourier 4-f spatial filtering system.A phase mismatched spiral phase plate (SPP) fabricated by electron beam lithography is employed as the radial Hilbert transform for image edge enhancement.Compared with holography, SPP is simple,economical, reliable, and easy to integrate.%We present a spiral phase filtering system with a large tolerance for edge enhancement of both phase and amplitude objects in optical microscopy. The method is based on a Fourier 4-f spatial filtering system.A phase mismatched spiral phase plate (SPP) fabricated by electron beam lithography is employed as the radial Hilbert transform for image edge enhancement. Compared with holography, SPP is simple,economical, reliable, and easy to integrate.

  3. Statistics and Machine Learning based Outlier Detection Techniques for Exoplanets

    Science.gov (United States)

    Goel, Amit; Montgomery, Michele

    2015-08-01

    Architectures of planetary systems are observable snapshots in time that can indicate formation and dynamic evolution of planets. The observable key parameters that we consider are planetary mass and orbital period. If planet masses are significantly less than their host star masses, then Keplerian Motion is defined as P^2 = a^3 where P is the orbital period in units of years and a is the orbital period in units of Astronomical Units (AU). Keplerian motion works on small scales such as the size of the Solar System but not on large scales such as the size of the Milky Way Galaxy. In this work, for confirmed exoplanets of known stellar mass, planetary mass, orbital period, and stellar age, we analyze Keplerian motion of systems based on stellar age to seek if Keplerian motion has an age dependency and to identify outliers. For detecting outliers, we apply several techniques based on statistical and machine learning methods such as probabilistic, linear, and proximity based models. In probabilistic and statistical models of outliers, the parameters of a closed form probability distributions are learned in order to detect the outliers. Linear models use regression analysis based techniques for detecting outliers. Proximity based models use distance based algorithms such as k-nearest neighbour, clustering algorithms such as k-means, or density based algorithms such as kernel density estimation. In this work, we will use unsupervised learning algorithms with only the proximity based models. In addition, we explore the relative strengths and weaknesses of the various techniques by validating the outliers. The validation criteria for the outliers is if the ratio of planetary mass to stellar mass is less than 0.001. In this work, we present our statistical analysis of the outliers thus detected.

  4. Cauchy Based Matched Filter for Retinal Vessels Detection

    OpenAIRE

    Zolfagharnasab, Hooshiar; Naghsh-Nilchi, Ahmad Reza

    2014-01-01

    In this paper, a novel matched filter based on a new kernel function with Cauchy distribution is introduced to improve the accuracy of the automatic retinal vessel detection compared with other available matched filter-based methods, most notably, the methods built on Gaussian distribution function. Several experiments are conducted to pick the best values of the parameters for the new designed filter, including both Cauchy function parameters as well as the matched filter parameters such as ...

  5. Video Event Detection Based on Over-segmented STV Regions

    OpenAIRE

    Jing WANG; Xu, Zhijie

    2011-01-01

    Real-world environment introduces many variations into video recordings such as changing illumination and object dynamics. In this paper, a technique for abstracting useful spatio-temporal features from graph-based segmentation operations has been proposed. A spatio-temporal volume (STV)-based shape matching algorithm is then devised by using the intersection theory to facilitate the definition and detection of video events. To maintain system efficiency, this research has integrated an innov...

  6. Rule Based Classification to Detect Malnutrition in Children

    Directory of Open Access Journals (Sweden)

    Xu Dezhi

    2011-01-01

    Full Text Available Data mining is an area which used in vast field of areas. Rule based classification is one of the sub areas in data mining. From this paper it will describe how rule based classification is used alone with Agent Technology to detect malnutrition in children. This proposed system is implemented as an egovernment system. Further it will try to research whether there is connection between number of rules which is used with the optimality of the final decision.

  7. AN EFFICIENT PEAK VALLEY DETECTION BASED VAD ALGORITHM FOR ROBUST DETECTION OF SPEECH AUDITORY BRAINSTEM RESPONSES

    Directory of Open Access Journals (Sweden)

    Ranganadh Narayanam

    2013-02-01

    Full Text Available Voice Activity Detection (VAD problem considers detecting the presence of speech in a noisy signal. The speech/non-speech classification task is not as trivial as it appears, and most of the VAD algorithms fail when the level of background noise increases. In this research we are presenting a new technique for Voice Activity Detection (VAD in EEG collected brain stem speech evoked potentials data [7, 8, 9]. This one is spectral subtraction method in which we have developed our own mathematical formula for the peak valley detection (PVD of the frequency spectra to detect the voice activity [1]. The purpose of this research is to compare the performance of this SNR based PVD (SNRPVD method over Zero-Crossing rate detector [5] and statistical analysis based algorithms [10]. We have put into application of these three algorithms on these particular data sets of this experiment [7, 8, 9] and VAD is verified and compared the results of these three. MATLAB routines were developed on these particular methodologies. Finally we concluded that the method of SNRPVD surely performing better than the ZCR and statistical algorithms.

  8. PILOT-BASED FREQUENCY OFFSET DETECTION SCHEME IN OFDM SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Du Zheng; Zhu Jinkang

    2003-01-01

    The frequency offset information is extracted from local pilot amplitude characteristics, which suffer much less distortion in frequency-selective fading channels than those utilizing frequency domain correlation techniques. Simulation shows that the performance of this scheme has better performance than the existing frequency domain pilot-based frequency offset detection scheme.

  9. Section based traffic detection on motorways for incident management

    NARCIS (Netherlands)

    Noort, M. van; Klunder, G.

    2007-01-01

    Current vehicle detection on motorways is based generally on either inductive loop systems or various alternatives such as video cameras. Recently, we encountered two new developments that take a different approach: one from The Netherlands using microwave sensors, and the other from Sweden using bo

  10. Two-Stage Part-Based Pedestrian Detection

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Prioletti, Antonio; Trivedi, Mohan M.;

    2012-01-01

    Detecting pedestrians is still a challenging task for automotive vision system due the extreme variability of targets, lighting conditions, occlusions, and high speed vehicle motion. A lot of research has been focused on this problem in the last 10 years and detectors based on classifiers has...

  11. Detection of tonic epileptic seizures based on surface electromyography

    DEFF Research Database (Denmark)

    Larsen, Sigge N.; Conradsen, Isa; Beniczky, Sandor;

    2014-01-01

    The purpose of this project was to design an algorithm for detection of tonic seizures based on surface electromyography signals from the deltoids. A successful algorithm has a future prospect of being implemented in a wearable device as part of an alarm system. This has already been done...

  12. Corner Detection Based on Human Visual System Model

    Institute of Scientific and Technical Information of China (English)

    LU Xiaoguang; ZHOU Jie

    2001-01-01

    Corners are useful features in computer vision tasks.In this paper,we present an algorithm for corner detection based on a human visual system model.Experimental results proved that it ismore effective than conventional corner detector under uneven illumination conditions.

  13. Singularity Detection of Signals Based on their Wavelet Transform

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    This paper introduces a multiresolution decomposition of signals based on their wavelet transform. The different behaviors of the wavelet transform between the signal and the noise are compared. An algorithm of singularity detection and processing in signals is proposed by the modulus maximum of the wavelet transform.

  14. Detection of influenza A virus based on fluorescence resonance energy transfer from quantum dots to carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Tian Junping [Key Laboratory of Industrial Ecology and Environmental Engineering (Ministry of Education, China), School of Environmental Science and Technology, Dalian University of Technology, Dalian 116024 (China); Zhao Huimin, E-mail: zhaohuim@dlut.edu.cn [Key Laboratory of Industrial Ecology and Environmental Engineering (Ministry of Education, China), School of Environmental Science and Technology, Dalian University of Technology, Dalian 116024 (China); Liu Meng; Chen Yaqiong; Quan Xie [Key Laboratory of Industrial Ecology and Environmental Engineering (Ministry of Education, China), School of Environmental Science and Technology, Dalian University of Technology, Dalian 116024 (China)

    2012-04-20

    Highlights: Black-Right-Pointing-Pointer The quantum dots-ssDNA probe was designed for the determination of virus DNA. Black-Right-Pointing-Pointer The fluorescence of quantum dots was effectively quenched by carbon nanotubes. Black-Right-Pointing-Pointer The addition of target H5N1 DNA restored the quenched fluorescence of quantum dots. Black-Right-Pointing-Pointer The proposed method exhibited high sensitivity and good selectivity for H5N1 DNA. - Abstract: In this paper, a simple and sensitive approach for H5N1 DNA detection was described based on the fluorescence resonance energy transfer (FRET) from quantum dots (QDs) to carbon nanotubes (CNTs) in a QDs-ssDNA/oxCNTs system, in which the QDs (CdTe) modified with ssDNA were used as donors. In the initial stage, with the strong interaction between ssDNA and oxCNTs, QDs fluorescence was effectively quenched. Upon the recognition of the target, the effective competitive bindings of it to QDs-ssDNA occurred, which decreased the interactions between the QDs-ssDNA and oxCNTs, leading to the recovery of the QDs fluorescence. The recovered fluorescence of QDs was linearly proportional to the concentration of the target in the range of 0.01-20 {mu}M with a detection limit of 9.39 nM. Moreover, even a single-base mismatched target with the same concentration of target DNA can only recover a limited low fluorescence of QDs, illustrating the good anti-interference performance of this QDs-ssDNA/oxCNTs system. This FRET platform in the QDs-ssDNA/oxCNTs system was facilitated to the simple, sensitive and quantitative detection of virus nucleic acids and could have a wide range of applications in molecular diagnosis.

  15. Skin Color Detection Using Region-Based Approach

    Directory of Open Access Journals (Sweden)

    Rudra PK Poudel

    2013-09-01

    Full Text Available Skin color provides a powerful cue for complex computer vision applications. Although skin color detection has been an active research area for decades, the mainstream technology is based on the individual pixels. This paper, which extended our previous work [1], presented a new region- based technique for skin color detection which outperformed the current state-of-the-art pixel- based skin color detection technique on the popular Compaq dataset [2]. Color and spatial distance based clustering technique is used to extract the regions from the images, also known as superpixels followed by a state-of-the-art non-parametric pixel-based skin color classifier called the basic skin color classifier. The pixel-based skin color evidence is then aggregated to classify the superpixels. Finally, the Conditional Random Field (CRF is applied to further improve the results. As CRF operates over superpixels, the computational overhead is minimal. Our technique achieved 91.17% true positive rate with 13.12% false negative rate on the Compaq dataset tested over approximately 14,000 web images.

  16. PDM-16QAM vector signal generation and detection based on intensity modulation and direct detection

    Science.gov (United States)

    Chen, Long; Yu, Jianjun; Li, Xinying

    2016-07-01

    We experimentally demonstrate a novel and simple method to generate and detect high speed polarization-division-multiplexing 16-ary quadrature-amplitude-modulation (PDM-16QAM) vector signal enabled by Mach-Zehnder modulator-based (MZM-based) optical-carrier-suppression (OCS) intensity modulation and direct detection. Due to the adoption of OCS intensity modulation, carrier beating can be avoided at the receiver, and thus polarization de-multiplexing can be implemented by digital-signal-processing-based (DSP-based) cascaded multi-modulus algorithm (CMMA) equalization instead of a polarization tracking system. The change of both amplitude and phase information due to the adoption of OCS modulation can be equalized by DSP-based amplitude and phase precoding at the transmitter. Up to 64-Gb/s PDM-16QAM vector signal is generated and detected after 2-km single-mode fiber-28 (SMF-28) or 20-km large-effective-area fiber (LEAF) transmission with a bit-error-ratio (BER) less than the hard-decision forward-error-correction (HD-FEC) threshold of 3.8×10-3.

  17. Citation-based plagiarism detection detecting disguised and cross-language plagiarism using citation pattern analysis

    CERN Document Server

    Gipp, Bela

    2014-01-01

    Plagiarism is a problem with far-reaching consequences for the sciences. However, even today's best software-based systems can only reliably identify copy & paste plagiarism. Disguised plagiarism forms, including paraphrased text, cross-language plagiarism, as well as structural and idea plagiarism often remain undetected. This weakness of current systems results in a large percentage of scientific plagiarism going undetected. Bela Gipp provides an overview of the state-of-the art in plagiarism detection and an analysis of why these approaches fail to detect disguised plagiarism forms. The aut

  18. A Simulated Multiagent-Based Architecture for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Onashoga S. Adebukola

    2013-04-01

    Full Text Available In this work, a Multiagent-based architecture for Intrusion Detection System (MIDS is proposed to overcome the shortcoming of current Mobile Agent-based Intrusion Detection System. MIDS is divided into three major phases namely: Data gathering, Detection and the Response phases. The data gathering stage involves data collection based on the features in the distributed system and profiling. The data collection components are distributed on both host and network. Closed Pattern Mining (CPM algorithm is introduced for profiling users’ activities in network database. The CPM algorithm is built on the concept of Frequent Pattern-growth algorithm by mining a prefix-tree called CPM-tree, which contains only the closed itemsets and its associated support count. According to the administrator’s specified thresholds, CPM-tree maintains only closed patterns online and incrementally outputs the current closed frequent pattern of users’ activities in real time. MIDS makes use of mobile and static agents to carry out the functions of intrusion detection. Each of these agents is built with rule-based reasoning to autonomously detect intrusions. Java 1.1.8 is chosen as the implementation language and IBM’s Java based mobile agent framework, Aglet 1.0.3 as the platform for running the mobile and static agents. In order to test the robustness of the system, a real-time simulation is carried out on University of Agriculture, Abeokuta (UNAAB network dataset and the results showed an accuracy of 99.94%, False Positive Rate (FPR of 0.13% and False Negative Rate (FNR of 0.04%. This shows an improved performance of MIDS when compared with other known MA-IDSs.

  19. An Algorithm for Quantitatively Calculating I/Q Gain and Phase Mismatch

    Directory of Open Access Journals (Sweden)

    Jin Liu

    2012-08-01

    Full Text Available The in-phase and quadrature modulator (IQ modulator is a key component in modern wireless transmitter. It provides a convenient method for modulating data bits or symbols onto an RF carrier. It has become the architecture of choice for implementing transmitter signal chains for end applications such as cellular, WiMAX, and wireless point-to-point. However, there are several non-ideal aspects of analog IQ modulator, include IQ gain imbalance, imperfect quadrature, and LO leakage. These imperfections will result in image spectral and degrade MER of the modulator, which in turn degrades bit error rate (BER. Gain matching and phase compensation both affect the total amount of image rejection. Factory calibration can detect the IQ gain and phase mismatch in different frequency and store the correction coefficients in nonvolatile memory. The key issue is how to get the exact mismatch. In this paper, a mathematical model of IQ modulator was established and an analytic solution is obtained about how to get the exact mismatch parameters.

  20. Vision Sensor-Based Road Detection for Field Robot Navigation

    Science.gov (United States)

    Lu, Keyu; Li, Jian; An, Xiangjing; He, Hangen

    2015-01-01

    Road detection is an essential component of field robot navigation systems. Vision sensors play an important role in road detection for their great potential in environmental perception. In this paper, we propose a hierarchical vision sensor-based method for robust road detection in challenging road scenes. More specifically, for a given road image captured by an on-board vision sensor, we introduce a multiple population genetic algorithm (MPGA)-based approach for efficient road vanishing point detection. Superpixel-level seeds are then selected in an unsupervised way using a clustering strategy. Then, according to the GrowCut framework, the seeds proliferate and iteratively try to occupy their neighbors. After convergence, the initial road segment is obtained. Finally, in order to achieve a globally-consistent road segment, the initial road segment is refined using the conditional random field (CRF) framework, which integrates high-level information into road detection. We perform several experiments to evaluate the common performance, scale sensitivity and noise sensitivity of the proposed method. The experimental results demonstrate that the proposed method exhibits high robustness compared to the state of the art. PMID:26610514

  1. Vision Sensor-Based Road Detection for Field Robot Navigation.

    Science.gov (United States)

    Lu, Keyu; Li, Jian; An, Xiangjing; He, Hangen

    2015-11-24

    Road detection is an essential component of field robot navigation systems. Vision sensors play an important role in road detection for their great potential in environmental perception. In this paper, we propose a hierarchical vision sensor-based method for robust road detection in challenging road scenes. More specifically, for a given road image captured by an on-board vision sensor, we introduce a multiple population genetic algorithm (MPGA)-based approach for efficient road vanishing point detection. Superpixel-level seeds are then selected in an unsupervised way using a clustering strategy. Then, according to the GrowCut framework, the seeds proliferate and iteratively try to occupy their neighbors. After convergence, the initial road segment is obtained. Finally, in order to achieve a globally-consistent road segment, the initial road segment is refined using the conditional random field (CRF) framework, which integrates high-level information into road detection. We perform several experiments to evaluate the common performance, scale sensitivity and noise sensitivity of the proposed method. The experimental results demonstrate that the proposed method exhibits high robustness compared to the state of the art.

  2. Vision Sensor-Based Road Detection for Field Robot Navigation

    Directory of Open Access Journals (Sweden)

    Keyu Lu

    2015-11-01

    Full Text Available Road detection is an essential component of field robot navigation systems. Vision sensors play an important role in road detection for their great potential in environmental perception. In this paper, we propose a hierarchical vision sensor-based method for robust road detection in challenging road scenes. More specifically, for a given road image captured by an on-board vision sensor, we introduce a multiple population genetic algorithm (MPGA-based approach for efficient road vanishing point detection. Superpixel-level seeds are then selected in an unsupervised way using a clustering strategy. Then, according to the GrowCut framework, the seeds proliferate and iteratively try to occupy their neighbors. After convergence, the initial road segment is obtained. Finally, in order to achieve a globally-consistent road segment, the initial road segment is refined using the conditional random field (CRF framework, which integrates high-level information into road detection. We perform several experiments to evaluate the common performance, scale sensitivity and noise sensitivity of the proposed method. The experimental results demonstrate that the proposed method exhibits high robustness compared to the state of the art.

  3. A wavelet-based approach to fall detection.

    Science.gov (United States)

    Palmerini, Luca; Bagalà, Fabio; Zanetti, Andrea; Klenk, Jochen; Becker, Clemens; Cappello, Angelo

    2015-01-01

    Falls among older people are a widely documented public health problem. Automatic fall detection has recently gained huge importance because it could allow for the immediate communication of falls to medical assistance. The aim of this work is to present a novel wavelet-based approach to fall detection, focusing on the impact phase and using a dataset of real-world falls. Since recorded falls result in a non-stationary signal, a wavelet transform was chosen to examine fall patterns. The idea is to consider the average fall pattern as the "prototype fall".In order to detect falls, every acceleration signal can be compared to this prototype through wavelet analysis. The similarity of the recorded signal with the prototype fall is a feature that can be used in order to determine the difference between falls and daily activities. The discriminative ability of this feature is evaluated on real-world data. It outperforms other features that are commonly used in fall detection studies, with an Area Under the Curve of 0.918. This result suggests that the proposed wavelet-based feature is promising and future studies could use this feature (in combination with others considering different fall phases) in order to improve the performance of fall detection algorithms. PMID:26007719

  4. Pedestrian detection from thermal images: A sparse representation based approach

    Science.gov (United States)

    Qi, Bin; John, Vijay; Liu, Zheng; Mita, Seiichi

    2016-05-01

    Pedestrian detection, a key technology in computer vision, plays a paramount role in the applications of advanced driver assistant systems (ADASs) and autonomous vehicles. The objective of pedestrian detection is to identify and locate people in a dynamic environment so that accidents can be avoided. With significant variations introduced by illumination, occlusion, articulated pose, and complex background, pedestrian detection is a challenging task for visual perception. Different from visible images, thermal images are captured and presented with intensity maps based objects' emissivity, and thus have an enhanced spectral range to make human beings perceptible from the cool background. In this study, a sparse representation based approach is proposed for pedestrian detection from thermal images. We first adopted the histogram of sparse code to represent image features and then detect pedestrian with the extracted features in an unimodal and a multimodal framework respectively. In the unimodal framework, two types of dictionaries, i.e. joint dictionary and individual dictionary, are built by learning from prepared training samples. In the multimodal framework, a weighted fusion scheme is proposed to further highlight the contributions from features with higher separability. To validate the proposed approach, experiments were conducted to compare with three widely used features: Haar wavelets (HWs), histogram of oriented gradients (HOG), and histogram of phase congruency (HPC) as well as two classification methods, i.e. AdaBoost and support vector machine (SVM). Experimental results on a publicly available data set demonstrate the superiority of the proposed approach.

  5. A Wavelet-Based Approach to Fall Detection

    Directory of Open Access Journals (Sweden)

    Luca Palmerini

    2015-05-01

    Full Text Available Falls among older people are a widely documented public health problem. Automatic fall detection has recently gained huge importance because it could allow for the immediate communication of falls to medical assistance. The aim of this work is to present a novel wavelet-based approach to fall detection, focusing on the impact phase and using a dataset of real-world falls. Since recorded falls result in a non-stationary signal, a wavelet transform was chosen to examine fall patterns. The idea is to consider the average fall pattern as the “prototype fall”.In order to detect falls, every acceleration signal can be compared to this prototype through wavelet analysis. The similarity of the recorded signal with the prototype fall is a feature that can be used in order to determine the difference between falls and daily activities. The discriminative ability of this feature is evaluated on real-world data. It outperforms other features that are commonly used in fall detection studies, with an Area Under the Curve of 0.918. This result suggests that the proposed wavelet-based feature is promising and future studies could use this feature (in combination with others considering different fall phases in order to improve the performance of fall detection algorithms.

  6. Paper-based ELISA to rapidly detect Escherichia coli.

    Science.gov (United States)

    Shih, Cheng-Min; Chang, Chia-Ling; Hsu, Min-Yen; Lin, Jyun-Yu; Kuan, Chen-Meng; Wang, Hsi-Kai; Huang, Chun-Te; Chung, Mu-Chi; Huang, Kui-Chou; Hsu, Cheng-En; Wang, Chun-Yuan; Shen, Ying-Cheng; Cheng, Chao-Min

    2015-12-01

    Escherichia coli is a generic indicator of fecal contamination, and certain serotypes cause food- and water-borne illness such as O157:H7. In the clinic, detection of bacteriuria, which is often due to E. coli, is critical before certain surgical procedures or in cases of nosocomial infection to prevent further adverse events such as postoperative infection or sepsis. In low- and middle-income countries, where insufficient equipment and facilities preclude modern methods of detection, a simple, low-cost diagnostic device to detect E. coli in water and in the clinic will have significant impact. We have developed a simple paper-based colorimetric platform to detect E. coli contamination in 5h. On this platform, the mean color intensity for samples with 10(5)cells/mL is 0.118±0.002 (n=4), and 0.0145±0.003 (Ppaper-based ELISA is an innovative point-of-care diagnostic tool to rapidly detect E. coli, and possibly other pathogens when customized as appropriate, especially in areas that lack advanced clinical equipment.

  7. Digital Signal Processing Based Real Time Vehicular Detection System

    Institute of Scientific and Technical Information of China (English)

    YANG Zhaoxuan; LIN Tao; LI Xiangping; LIU Chunyi; GAO Jian

    2005-01-01

    Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation.

  8. Micro-Vibration-Based Slip Detection in Tactile Force Sensors

    Directory of Open Access Journals (Sweden)

    Raul Fernandez

    2014-01-01

    Full Text Available Tactile sensing provides critical information, such as force, texture, shape or temperature, in manipulation tasks. In particular, tactile sensors traditionally used in robotics are emphasized in contact force determination for grasping control and object recognition. Nevertheless, slip detection is also crucial to successfully manipulate an object. Several approaches have appeared to detect slipping, the majority being a combination of complex sensors with complex algorithms. In this paper, we deal with simplicity, analyzing how a novel, but simple, algorithm, based on micro-vibration detection, can be used in a simple, but low-cost and durable, force sensor. We also analyze the results of using the same principle to detect slipping in other force sensors based on flexible parts. In particular, we show and compare the slip detection with: (i a flexible finger, designed by the authors, acting as a force sensor; (ii the finger torque sensor of a commercial robotic hand; (iii a commercial six-axis force sensor mounted on the wrist of a robot; and (iv a fingertip piezoresistive matrix sensor.

  9. Disposable amperometric biosensor based on nanostructured bacteriophages for glucose detection

    Science.gov (United States)

    Kang, Yu Ri; Hwang, Kyung Hoon; Kim, Ju Hwan; Nam, Chang Hoon; Kim, Soo Won

    2010-10-01

    The selection of electrode material profoundly influences biosensor science and engineering, as it heavily influences biosensor sensitivity. Here we propose a novel electrochemical detection method using a working electrode consisting of bio-nanowires from genetically modified filamentous phages and nanoparticles. fd-tet p8MMM filamentous phages displaying a three-methionine (MMM) peptide on the major coat protein pVIII (designated p8MMM phages) were immobilized on the active area of an electrochemical sensor through physical adsorption and chemical bonding. Bio-nanowires composed of p8MMM phages and silver nanoparticles facilitated sensitive, rapid and selective detection of particular molecules. We explored whether the composite electrode with bio-nanowires was an effective platform to detect the glucose oxidase. The current response of the bio-nanowire sensor was high at various glucose concentrations (0.1 µm-0.1 mM). This method provides a considerable advantage to demonstrate analyte detection over low concentration ranges. Especially, phage-enabled bio-nanowires can serve as receptors with high affinity and specificity for the detection of particular biomolecules and provide a convenient platform for designing site-directed multifunctional scaffolds based on bacteriophages and may serve as a simple method for label-free detection.

  10. A Viola-Jones based hybrid face detection framework

    Science.gov (United States)

    Murphy, Thomas M.; Broussard, Randy; Schultz, Robert; Rakvic, Ryan; Ngo, Hau

    2013-12-01

    Improvements in face detection performance would benefit many applications. The OpenCV library implements a standard solution, the Viola-Jones detector, with a statistically boosted rejection cascade of binary classifiers. Empirical evidence has shown that Viola-Jones underdetects in some instances. This research shows that a truncated cascade augmented by a neural network could recover these undetected faces. A hybrid framework is constructed, with a truncated Viola-Jones cascade followed by an artificial neural network, used to refine the face decision. Optimally, a truncation stage that captured all faces and allowed the neural network to remove the false alarms is selected. A feedforward backpropagation network with one hidden layer is trained to discriminate faces based upon the thresholding (detection) values of intermediate stages of the full rejection cascade. A clustering algorithm is used as a precursor to the neural network, to group significant overlappings. Evaluated on the CMU/VASC Image Database, comparison with an unmodified OpenCV approach shows: (1) a 37% increase in detection rates if constrained by the requirement of no increase in false alarms, (2) a 48% increase in detection rates if some additional false alarms are tolerated, and (3) an 82% reduction in false alarms with no reduction in detection rates. These results demonstrate improved face detection and could address the need for such improvement in various applications.

  11. Using Satellite Based Techniques to Combine Volcanic Ash Detection Methods

    Science.gov (United States)

    Hendrickson, B. T.; Kessinger, C.; Herzegh, P.; Blackburn, G.; Cowie, J.; Williams, E.

    2006-12-01

    Volcanic ash poses a serious threat to aircraft avionics due to the corrosive nature of the silicate particles. Aircraft encounters with ash have resulted in millions of dollars in damage and loss of power to aircraft engines. Accurate detection of volcanic ash for the purpose of avoiding these hazardous areas is of the utmost importance to ensure aviation safety as well as to minimize economic loss. Satellite-based detection of volcanic ash has been used extensively to warn the aviation community of its presence through the use of multi-band detection algorithms. However, these algorithms are generally used individually rather than in combination and require the intervention of a human analyst. Automation of the detection and warning of the presence of volcanic ash for the aviation community is a long term goal of the Federal Aviation Administration Oceanic Weather Product Development Team. We are exploring the use of data fusion techniques within a fuzzy logic framework to perform a weighted combination of several multi-band detection algorithms. Our purpose is to improve the overall performance of volcanic ash detection and to test whether automation is feasible. Our initial focus is on deep, stratospheric eruptions.

  12. Wideband Array Signal Detection Algorithm Based on Power Focusing

    Directory of Open Access Journals (Sweden)

    Gong Bin

    2012-09-01

    Full Text Available Aiming at the requirement of real-time signal detection in the passive surveillance system, a wideband array signal detection algorithm is proposed based on the concept of power focusing. By making use of the phase difference of the signal received by a uniform linear array, the algorithm makes the power of the received signal focused in the Direction Of Arrival (DOA with improved cascade FFT. Subsequently, the probability density function of the output noise at each angle is derived. Furthermore, a Constant False Alarm Rate (CFAR test statistic and the corresponding detection threshold are constructed. The theoretical probability of detection is also derived for different false alarm rate and Signal-to-Noise Ratio (SNR. The proposed algorithm is computationally efficient, and the detection process is independent of the prior information. Meanwhile, the results can act as the initial value for other algorithms with higher precision. Simulation results show that the proposed algorithm achieves good performance for weak signal detection.

  13. Traffic Flow Detection Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Bao-juan Liang

    2013-08-01

    Full Text Available Detecting traffic flow by in-road inductive loop is the most common methods, but inductive loop is physically large, it is hard to install and maintain, also the classification rate is low. The inductive loops cannot communicate with each other, so they cannot share traffic data with each other. The wireless sensor network has these features: real-time, fault tolerance, scalability and coordination. Applying wireless sensor network into traffic area for traffic flow detection is easier to install, and provide real-time traffic flow for coordinate traffic control, also it can improve the classification rate. A lot of researchers applied the wireless sensor network for traffic flow detection, but no one referred to the coordinate traffic flow detection method. In this paper, we provided a coordinate traffic flow detection framework. Based on this framework, we set up a simple traffic flow detection platform by wireless sensor nodes produced by cross box company to verify this method. We selected four periods, for each period, we got a more than 90% classification rate.

  14. Capacitance-based damage detection sensing for aerospace structural composites

    Science.gov (United States)

    Bahrami, P.; Yamamoto, N.; Chen, Y.; Manohara, H.

    2014-04-01

    Damage detection technology needs improvement for aerospace engineering application because detection within complex composite structures is difficult yet critical to avoid catastrophic failure. Damage detection is challenging in aerospace structures because not all the damage detection technology can cover the various defect types (delamination, fiber fracture, matrix crack etc.), or conditions (visibility, crack length size, etc.). These defect states are expected to become even more complex with future introduction of novel composites including nano-/microparticle reinforcement. Currently, non-destructive evaluation (NDE) methods with X-ray, ultrasound, or eddy current have good resolutions (analysis currently requires excessive wiring and complex signal analysis. Here, we present a capacitance sensor-based, structural defect detection technology with improved sensing capability. Thin dielectric polymer layer is integrated as part of the structure; the defect in the structure directly alters the sensing layer's capacitance, allowing full-coverage sensing capability independent of defect size, orientation or location. In this work, capacitance-based sensing capability was experimentally demonstrated with a 2D sensing layer consisting of a dielectric layer sandwiched by electrodes. These sensing layers were applied on substrate surfaces. Surface indentation damage (~1mm diameter) and its location were detected through measured capacitance changes: 1 to 250 % depending on the substrates. The damage detection sensors are light weight, and they can be conformably coated and can be part of the composite structure. Therefore it is suitable for aerospace structures such as cryogenic tanks and rocket fairings for example. The sensors can also be operating in space and harsh environment such as high temperature and vacuum.

  15. Influence of hydrophobic mismatch on the catalytic activity of Escherichia coli GlpG rhomboid protease.

    Science.gov (United States)

    Foo, Alexander C Y; Harvey, Brandon G R; Metz, Jeff J; Goto, Natalie K

    2015-04-01

    Rhomboids comprise a broad family of intramembrane serine proteases that are found in a wide range of organisms and participate in a diverse array of biological processes. High-resolution structures of the catalytic transmembrane domain of the Escherichia coli GlpG rhomboid have provided numerous insights that help explain how hydrolytic cleavage can be achieved below the membrane surface. Key to this are observations that GlpG hydrophobic domain dimensions may not be sufficient to completely span the native lipid bilayer. This formed the basis for a model where hydrophobic mismatch Induces thinning of the local membrane environment to promote access to transmembrane substrates. However, hydrophobic mismatch also has the potential to alter the functional properties of the rhomboid, a possibility we explore in the current work. For this purpose, we purified the catalytic transmembrane domain of GlpG into phosphocholine or maltoside detergent micelles of varying alkyl chain lengths, and assessed proteolytic function with a model water-soluble substrate. Catalytic turnover numbers were found to depend on detergent alkyl chain length, with saturated chains containing 10-12 carbon atoms supporting maximal activity. Similar results were obtained in phospholipid bicelles, with no proteolytic activity being detected in longer-chain lipids. Although differences in thermal stability and GlpG oligomerization could not explain these activity differences, circular dichroism spectra suggest that mismatch gives rise to a small change in structure. Overall, these results demonstrate that hydrophobic mismatch can exert an inhibitory effect on rhomboid activity, with the potential for changes in local membrane environment to regulate activity in vivo.

  16. Functional interactions and signaling properties of mammalian DNA mismatch repair proteins.

    Science.gov (United States)

    Bellacosa, A

    2001-11-01

    The mismatch repair (MMR) system promotes genomic fidelity by repairing base-base mismatches, insertion-deletion loops and heterologies generated during DNA replication and recombination. This function is critically dependent on the assembling of multimeric complexes involved in mismatch recognition and signal transduction to downstream repair events. In addition, MMR proteins coordinate a complex network of physical and functional interactions that mediate other DNA transactions, such as transcription-coupled repair, base excision repair and recombination. MMR proteins are also involved in activation of cell cycle checkpoint and induction of apoptosis when DNA damage overwhelms a critical threshold. For this reason, they play a role in cell death by alkylating agents and other chemotherapeutic drugs, including cisplatin. Inactivation of MMR genes in hereditary and sporadic cancer is associated with a mutator phenotype and inhibition of apoptosis. In the future, a deeper understanding of the molecular mechanisms and functional interactions of MMR proteins will lead to the development of more effective cancer prevention and treatment strategies. PMID:11687886

  17. Analysis of Host-Based and Network-Based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Amrit Pal Singh

    2014-07-01

    Full Text Available Intrusion-detection systems (IDS aim at de-tecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host Based- IDS. This paper covers the scope of both the types and their result analysis along with their comparison as stated. OSSEC (HIDS is a free, open source host-base intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response. While Snort (NIDS is a lightweight intrusion detection system that can log packets coming across your network and can alert the user regarding any attack. Both are efficient in their own distinct fields.

  18. Convolutional Neural Network Based Fault Detection for Rotating Machinery

    Science.gov (United States)

    Janssens, Olivier; Slavkovikj, Viktor; Vervisch, Bram; Stockman, Kurt; Loccufier, Mia; Verstockt, Steven; Van de Walle, Rik; Van Hoecke, Sofie

    2016-09-01

    Vibration analysis is a well-established technique for condition monitoring of rotating machines as the vibration patterns differ depending on the fault or machine condition. Currently, mainly manually-engineered features, such as the ball pass frequencies of the raceway, RMS, kurtosis an crest, are used for automatic fault detection. Unfortunately, engineering and interpreting such features requires a significant level of human expertise. To enable non-experts in vibration analysis to perform condition monitoring, the overhead of feature engineering for specific faults needs to be reduced as much as possible. Therefore, in this article we propose a feature learning model for condition monitoring based on convolutional neural networks. The goal of this approach is to autonomously learn useful features for bearing fault detection from the data itself. Several types of bearing faults such as outer-raceway faults and lubrication degradation are considered, but also healthy bearings and rotor imbalance are included. For each condition, several bearings are tested to ensure generalization of the fault-detection system. Furthermore, the feature-learning based approach is compared to a feature-engineering based approach using the same data to objectively quantify their performance. The results indicate that the feature-learning system, based on convolutional neural networks, significantly outperforms the classical feature-engineering based approach which uses manually engineered features and a random forest classifier. The former achieves an accuracy of 93.61 percent and the latter an accuracy of 87.25 percent.

  19. Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes

    Directory of Open Access Journals (Sweden)

    Frances Bernadette C. De Ocampo

    2015-05-01

    Full Text Available Signature-based Intrusion Detection System (IDS helps in maintaining the integrity of data in a network controlled environment. Unfortunately, this type of IDS depends on predetermined intrusion patterns that are manually created. If the signature database of the Signature-based IDS is not updated, network attacks just pass through this type of IDS without being noticed. To avoid this, an Anomaly-based IDS is used in order to countercheck if a network traffic that is not detected by Signature-based IDS is a true malicious traffic or not. In doing so, the Anomaly-based IDS might come up with several numbers of logs containing numerous network attacks which could possibly be a false positive. This is the reason why the Anomaly-based IDS is not perfect, it would readily alarm the system that a network traffic is an attack just because it is not on its baseline. In order to resolve the problem between these two IDSs, the goal is to correlate data between the logs of the Anomaly-based IDS and the packet that has been captured in order to determine if a network traffic is really malicious or not. With the supervision of a security expert, the malicious network traffic would be verified as malicious. Using machine learning, the researchers can identify which algorithm is better than the other algorithms in classifying if a certain network traffic is really malicious. Upon doing so, the creation of signatures would follow by basing the automated creation of signatures from the detected malicious traffic.

  20. Asynchronous event-based corner detection and matching.

    Science.gov (United States)

    Clady, Xavier; Ieng, Sio-Hoi; Benosman, Ryad

    2015-06-01

    This paper introduces an event-based luminance-free method to detect and match corner events from the output of asynchronous event-based neuromorphic retinas. The method relies on the use of space-time properties of moving edges. Asynchronous event-based neuromorphic retinas are composed of autonomous pixels, each of them asynchronously generating "spiking" events that encode relative changes in pixels' illumination at high temporal resolutions. Corner events are defined as the spatiotemporal locations where the aperture problem can be solved using the intersection of several geometric constraints in events' spatiotemporal spaces. A regularization process provides the required constraints, i.e. the motion attributes of the edges with respect to their spatiotemporal locations using local geometric properties of visual events. Experimental results are presented on several real scenes showing the stability and robustness of the detection and matching. PMID:25828960

  1. Ground-based Nuclear Detonation Detection (GNDD) Technology Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Leslie A.

    2014-01-13

    This GNDD Technology Roadmap is intended to provide guidance to potential researchers and help management define research priorities to achieve technology advancements for ground-based nuclear explosion monitoring science being pursued by the Ground-based Nuclear Detonation Detection (GNDD) Team within the Office of Nuclear Detonation Detection in the National Nuclear Security Administration (NNSA) of the U.S. Department of Energy (DOE). Four science-based elements were selected to encompass the entire scope of nuclear monitoring research and development (R&D) necessary to facilitate breakthrough scientific results, as well as deliver impactful products. Promising future R&D is delineated including dual use associated with the Comprehensive Nuclear-Test-Ban Treaty (CTBT). Important research themes as well as associated metrics are identified along with a progression of accomplishments, represented by a selected bibliography, that are precursors to major improvements to nuclear explosion monitoring.

  2. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  3. Ground-based Nuclear Detonation Detection (GNDD) Technology Roadmap

    International Nuclear Information System (INIS)

    This GNDD Technology Roadmap is intended to provide guidance to potential researchers and help management define research priorities to achieve technology advancements for ground-based nuclear explosion monitoring science being pursued by the Ground-based Nuclear Detonation Detection (GNDD) Team within the Office of Nuclear Detonation Detection in the National Nuclear Security Administration (NNSA) of the U.S. Department of Energy (DOE). Four science-based elements were selected to encompass the entire scope of nuclear monitoring research and development (R&D) necessary to facilitate breakthrough scientific results, as well as deliver impactful products. Promising future R&D is delineated including dual use associated with the Comprehensive Nuclear-Test-Ban Treaty (CTBT). Important research themes as well as associated metrics are identified along with a progression of accomplishments, represented by a selected bibliography, that are precursors to major improvements to nuclear explosion monitoring.

  4. A novel interacting multiple model based network intrusion detection scheme

    Science.gov (United States)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  5. Vehicle detection and tracking based on phase-correlation

    Institute of Scientific and Technical Information of China (English)

    Yi He(何毅); Xin Yang(杨新)

    2004-01-01

    This paper presents vehicle detection and tracking algorithms based on real-time background (RTB) and phase-correlation (PC) in the video sequence of urban highway with fixed camera. Firstly moving objects are obtained by subtracting RTB from serial images. After classification, PC is used to determine corresponding regions of moving objects between consecutive frames. The problems of vehicles' merging and splitting, sudden stop, and restart are also considered. Experiments show that the method is practical and can realize real-time detection and tracking of vehicles on highway.

  6. A Wavelet-Based Approach to Fall Detection

    OpenAIRE

    Luca Palmerini; Fabio Bagalà; Andrea Zanetti; Jochen Klenk; Clemens Becker; Angelo Cappello

    2015-01-01

    Falls among older people are a widely documented public health problem. Automatic fall detection has recently gained huge importance because it could allow for the immediate communication of falls to medical assistance. The aim of this work is to present a novel wavelet-based approach to fall detection, focusing on the impact phase and using a dataset of real-world falls. Since recorded falls result in a non-stationary signal, a wavelet transform was chosen to examine fall patterns. The idea ...

  7. Development of a Wearable-Sensor-Based Fall Detection System

    Directory of Open Access Journals (Sweden)

    Falin Wu

    2015-01-01

    Full Text Available Fall detection is a major challenge in the public healthcare domain, especially for the elderly as the decline of their physical fitness, and timely and reliable surveillance is necessary to mitigate the negative effects of falls. This paper develops a novel fall detection system based on a wearable device. The system monitors the movements of human body, recognizes a fall from normal daily activities by an effective quaternion algorithm, and automatically sends request for help to the caregivers with the patient’s location.

  8. A Weld Defects Detection System Based on a Spectrometer

    Directory of Open Access Journals (Sweden)

    Sadek C. A. Alfaro

    2009-04-01

    Full Text Available Improved product quality and production methods, and decreased production costs are important objectives of industries. Welding processes are part of this goal. There are many studies about monitoring and controlling welding process. This work presents a non-intrusive on-line monitoriment system and some algorithms capable of detecting GTAW weld defects. Some experiments were made to simulate weld defects by disturbing the electric arc. The data comes from a spectrometer which captures perturbations on the electric arc by the radiation emission of chosen lines. Algorithms based on change detection methods are used to indicate the presence and localization of those defects.

  9. Granular computing in model based abdominal organs detection.

    Science.gov (United States)

    Juszczyk, Jan; Pietka, Ewa; Pyciński, Bartłomiej

    2015-12-01

    Detection of region specific voxel is a true challenge in many segmentation procedures. In this study a concept of implementing granular computing in the detection of anatomical structures in abdominal computed tomography (CT) scans is introduced. After proving the usefulness of the information granules to identify voxels that mark certain organs, an automatic model-based approach has been developed. A three-parameter granule that combines the interval and density distribution of voxels has been introduced and employed to identify organ specific voxels of the liver, spleen and kidneys. The specificity of the information granules varies between 90 and 99% for the liver and spleen and over 85% for the kidneys.

  10. Image Fault Area Detection Algorithm Based on Visual Perception

    Directory of Open Access Journals (Sweden)

    Peng-Lu

    2011-02-01

    Full Text Available If the natural scenes decomposed by basic ICA which simulates visual perception then the arrangement in space of its basis functions are in disorder. This result is contradicted with physiological mechanisms of vision. So, a new compute model is proposed to simulate two important mechanisms of vision which are visual cortex receptive field topology construct and synchronous oscillation among neuron group. To solve the problem of train image fault detection, a novel algorithm was proposed based on above compute model. The experiment results show that, the algorithm can increase fault detection rate effectively compared with traditional methods which absence of above two important mechanisms of vision.

  11. Kernel based orthogonalization for change detection in hyperspectral images

    DEFF Research Database (Denmark)

    Nielsen, Allan Aasbjerg

    Kernel versions of principal component analysis (PCA) and minimum noise fraction (MNF) analysis are applied to change detection in hyperspectral image (HyMap) data. The kernel versions are based on so-called Q-mode analysis in which the data enter into the analysis via inner products in the Gram...... the kernel function and then performing a linear analysis in that space. An example shows the successful application of (kernel PCA and) kernel MNF analysis to change detection in HyMap data covering a small agricultural area near Lake Waging-Taching, Bavaria, in Southern Germany. In the change...

  12. Detection of unexploded ordnance by PGNAA based borehole-logging

    International Nuclear Information System (INIS)

    The performance of a borehole-logging system, based on prompt-gamma-neutron-activation-analysis (PGNAA), for explosive detection was studied by Monte-Carlo simulations. The prompt gamma of nitrogen, which is a constituent of common explosive, was used to identify the unexploded ordnance (UXO). Our results show that the minimum counting time depends on the soil moisture, the cladding thickness and the explosive composition. In conjunction with the standard detection by magnetometry, the PGNAA is a promising analytical technique for definitive identification of deep buried UXOs. (author)

  13. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Luo Min; Zhang Huan-guo; Wang Li-na

    2003-01-01

    An unsupervised clustering-based intrusion de tection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal cluster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesnt need labeled training data sets. The experiment concludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  14. Direct Mismatch Characterization of femto-Farad Capacitors

    KAUST Repository

    Omran, Hesham

    2015-08-17

    Reducing the capacitance of programmable capacitor arrays, commonly used in analog integrated circuits, is necessary for low-energy applications. However, limited mismatch data is available for small capacitors. We report mismatch measurement for a 2fF poly-insulator-poly (PIP) capacitor, which is the smallest reported PIP capacitor to the best of the authors’ knowledge. Instead of using complicated custom onchip circuitry, direct mismatch measurement is demonstrated and verified using Monte Carlo Simulations and experimental measurements. Capacitive test structures composed of 9 bit programmable capacitor arrays (PCAs) are implemented in a low-cost 0:35m CMOS process. Measured data is compared to mismatch of large PIP capacitors, theoretical models, and recently published data. Measurement results indicate an estimated average relative standard deviation of 0.43% for the 2fF unit capacitor, which is better than the reported mismatch of metal-oxide-metal (MOM) fringing capacitors implemented in an advanced 32nm CMOS process.

  15. A portable cell-based optical detection device for rapid detection of Listeria and Bacillus toxins

    Science.gov (United States)

    Banerjee, Pratik; Banada, Padmapriya P.; Rickus, Jenna L.; Morgan, Mark T.; Bhunia, Arun K.

    2005-11-01

    A mammalian cell-based optical biosensor was built to detect pathogenic Listeria and Bacillus species. This sensor measures the ability of the pathogens to infect and induce cytotoxicity on hybrid lymphocyte cell line (Ped-2E9) resulting in the release of alkaline phosphatase (ALP) that can be detected optically using a portable spectrophotometer. The Ped-2E9 cells were encapsulated in collagen gel matrices and grown in 48-well plates or in specially designed filtration tube units. Toxin preparations or bacterial cells were introduced and ALP release was assayed after 3-5 h. Pathogenic L. monocytogenes strains or the listeriolysin toxins preparation showed cytotoxicity ranging from 55% - 92%. Toxin preparations (~20 μg/ml) from B. cereus strains showed 24 - 98% cytotoxicity. In contrast, a non-pathogenic L. innocua (F4247) and a B. substilis induced only 2% and 8% cytotoxicity, respectively. This cell-based detection device demonstrates its ability to detect the presence of pathogenic Listeria and Bacillus species and can potentially be used onsite for food safety or in biosecurity application.

  16. Features Extraction for Object Detection Based on Interest Point

    Directory of Open Access Journals (Sweden)

    Amin Mohamed Ahsan

    2013-05-01

    Full Text Available In computer vision, object detection is an essential process for further processes such as object tracking, analyzing and so on. In the same context, extraction features play important role to detect the object correctly. In this paper we present a method to extract local features based on interest point which is used to detect key-points within an image, then, compute histogram of gradient (HOG for the region surround that point. Proposed method used speed-up robust feature (SURF method as interest point detector and exclude the descriptor. The new descriptor is computed by using HOG method. The proposed method got advantages of both mentioned methods. To evaluate the proposed method, we used well-known dataset which is Caltech101. The initial result is encouraging in spite of using a small data for training.

  17. A Cooperative Network Intrusion detection Based on Fuzzy SVMs

    Directory of Open Access Journals (Sweden)

    Shaohua Teng

    2010-04-01

    Full Text Available There is a large number of noise in the data obtained from network, which deteriorates intrusion detection performance. To delete the noise data, data preprocessing is done before the construction of hyperplane in support vector machine (SVM. By introducing fuzzy theory into SVM, a new method is proposed for network intrusion detection.  Because the attack behavior is different for different network protocol, a different fuzzy membership function is formatted, such that for each class of protocol there is a SVM. To implement this approach, a fuzzy SVM-based cooperative network intrusion detection system with multi-agent architecture is presented. It is composed of three types of agents corresponding to TCP, UDP, and ICMP protocols, respectively. Simulation experiments are done by using KDD CUP 1999 data set, results show that the training time is significantly shortened, storage space requirement is reduced, and classification accuracy is improved.

  18. Overlapping Communities Detection Based on Link Partition in Directed Networks

    Directory of Open Access Journals (Sweden)

    Qingyu Zou

    2013-09-01

    Full Text Available Many complex systems can be described as networks to comprehend both the structure and the function. Community structure is one of the most important properties of complex networks. Detecting overlapping communities in networks have been more attention in recent years, but the most of approaches to this problem have been applied to the undirected networks. This paper presents a novel approach based on link partition to detect overlapping communities structure in directed networks. In contrast to previous researches focused on grouping nodes, our algorithm defines communities as groups of directed links rather than nodes with the purpose of nodes naturally belong to more than one community. This approach can identify a suitable number of overlapping communities without any prior knowledge about the community in directed networks. We evaluate our algorithm on a simple artificial network and several real-networks. Experimental results demonstrate that the algorithm proposed is efficient for detecting overlapping communities in directed networks.  

  19. Model-Based Design of Tree WSNs for Decentralized Detection

    Directory of Open Access Journals (Sweden)

    Ashraf Tantawy

    2015-08-01

    Full Text Available The classical decentralized detection problem of finding the optimal decision rules at the sensor and fusion center, as well as variants that introduce physical channel impairments have been studied extensively in the literature. The deployment of WSNs in decentralized detection applications brings new challenges to the field. Protocols for different communication layers have to be co-designed to optimize the detection performance. In this paper, we consider the communication network design problem for a tree WSN. We pursue a system-level approach where a complete model for the system is developed that captures the interactions between different layers, as well as different sensor quality measures. For network optimization, we propose a hierarchical optimization algorithm that lends itself to the tree structure, requiring only local network information. The proposed design approach shows superior performance over several contentionless and contention-based network design approaches.

  20. Efficient detection of internal infestation in wheat based on biophotonics.

    Science.gov (United States)

    Shi, Weiya; Jiao, Keke; Liang, Yitao; Wang, Feng

    2016-02-01

    In the process of grain storage, there are many losses of grain quantity and quality for the sake of insects. As a result, it is necessary to find a rapid and economical method for detecting insects in the grain. The paper innovatively proposes a model of detecting internal infestation in wheat by combining pattern recognition and BioPhoton Analytical Technology (BPAT). In this model, the spontaneous ultraweak photons emitted from normal and insect-contaminated wheat are firstly measured respectively. Then, position, distribution and morphological characteristics can be extracted from the measuring data to construct wheat feature vector. Backpropagation (BP) neural network based on genetic algorithm is employed to take decision on whether wheat kernel has contaminated by insects. The experimental results show that the proposed model can differentiate the normal wheat from the insect-contaminated one at an average accuracy of 95%. The model can also offer a novel thought for detecting internal infestation in the wheat. PMID:26774558