WorldWideScience

Sample records for base mismatch detection

  1. Blind Decorrelating Detection Based on Particle Swarm Optimization under Spreading Code Mismatch

    Institute of Scientific and Technical Information of China (English)

    Jhih-Chung Chang; Chih-Chang Shen

    2014-01-01

    A way of resolving spreading code mismatches in blind multiuser detection with a particle swarm optimization (PSO) approach is proposed. It has been shown that the PSO algorithm incorporating the linear system of the decorrelating detector, which is termed as decorrelating PSO (DPSO), can significantly improve the bit error rate (BER) and the system capacity. As the code mismatch occurs, the output BER performance is vulnerable to degradation for DPSO. With a blind decorrelating scheme, the proposed blind DPSO (BDPSO) offers more robust capabilities over existing DPSO under code mismatch scenarios.

  2. Gold-based optical biosensor for single-mismatched DNA detection using salt-induced hybridization

    DEFF Research Database (Denmark)

    Zhan, Zongrui; Ma, Xingyi; Cao, Cuong

    2011-01-01

    DNA while Au-NPs modified with oligonucleotide detection sequences played a role in recognition and signal production. Due to the much lower stability of mismatched DNA strands caused by unstable duplex structures in solutions of relatively low salt concentration, hybridization efficiency...

  3. Label-free detection of DNA single-base mismatches using a simple reflectance-based optical technique.

    Science.gov (United States)

    Nava, G; Ceccarello, E; Giavazzi, F; Salina, M; Damin, F; Chiari, M; Buscaglia, M; Bellini, T; Zanchetta, G

    2016-05-21

    Rapid and quantitative detection of the binding of nucleic acids to surface-immobilized probes remains a challenge in many biomedical applications. We investigated the hybridization of a set of fully complementary and defected 12-base long DNA oligomers by using the Reflective Phantom Interface (RPI), a recently developed multiplexed label-free detection technique. Based on the simple measurement of reflected light intensity, this technology enables to quantify the hybridization directly as it occurs on the surface with a sensitivity of 10 pg mm(-2). We found a strong effect of single-base mismatches and of their location on hybridization kinetics and equilibrium binding. In line with previous studies, we found that DNA-DNA binding is weaker on a surface than in the bulk. Our data indicate that this effect is a consequence of weak nonspecific binding of the probes to the surface.

  4. HNA and ANA high-affinity arrays for detections of DNA and RNA single-base mismatches.

    Science.gov (United States)

    Abramov, Mikhail; Schepers, Guy; Van Aerschot, Arthur; Van Hummelen, Paul; Herdewijn, Piet

    2008-06-15

    DNA microarrays and sensors have become essential tools in the functional analysis of sequence information. Recently we reported that chimeric hexitol (HNA) and altritol (ANA) nucleotide monomers with an anhydrohexitol sugar moiety are easily available and proved their chemistry to be compatible with DNA and RNA synthesis. In this communication we describe a novel analytical platform based on HNA and ANA units to be used as synthetic oligonucleotide arrays on a glass solid support for match/mismatch detection of DNA and RNA targets. Arrays were fabricated by immobilization of diene-modified oligonucleotides on maleimido-activated glass slides. To demonstrate the selectivity and sensitivity of the HNA/ANA arrays and to compare their properties with regular DNA arrays, sequences in the reverse transcriptase gene (codon 74) and the protease gene of HIV-1 (codon 10) were selected. Both, the relative intensity of the signal and match/mismatch discrimination increased up to fivefold for DNA targets and up to 3-3.5-fold for RNA targets applying HNA or ANA arrays (ANA>HNA>DNA). Certainly in the new field of miRNA detection, ANA arrays could prove very beneficial and their properties should be investigated in more detail.

  5. Mismatch repair in Streptococcus pneumoniae: relationship between base mismatches and transformation efficiencies.

    Science.gov (United States)

    Claverys, J P; Méjean, V; Gasc, A M; Sicard, A M

    1983-10-01

    Genetic transformation in Streptococcus pneumoniae involves the insertion of single-stranded pieces of donor DNA into a recipient genome. Efficiencies of transformation strongly depend on the mutations (markers) carried by donor DNA. Markers are classified according to their transforming efficiencies into very high, high, intermediate, and low efficiency. The last is approximately 1/20th as efficient as the first. This marker effect is under the control of the Hex system, which is thought to correct mismatches at the donor-recipient heteroduplex stage in transformation. To investigate this effect, wild type, mutant, and revertant DNA sequences at five genetic sites within the amiA locus were determined. The results show that low-efficiency markers arise from transitional changes A . T to G . C. The transversion A . T to T . A corresponds to an intermediate-efficiency marker. Transversions G . C to T . A and G . C to C . G lead to high-efficiency markers. Among the eight possible mismatches that could exist transiently at the heteroduplex stage in transformation, only two--namely, A/G and C/C--are not corrected by the Hex system. It is noteworthy that the four possible base pairs (A . T, T . A, G . C, and C . G) have been encountered at the very same site (amiA6 site), which constitutes a good illustration of the marker effect. DNA sequence analysis also reveals that short deletions (33 or 34 bases long) are integrated with very high efficiencies. These results confirm that the Hex system corrects point mismatches harbored in donor-recipient heteroduplexes thousands of bases long. The correction pattern of the Hex system toward multiple-base mismatches has also been investigated. Its behavior toward double-base mismatches is complex, suggesting that neighboring sequences may affect the detection of mispaired bases.

  6. Mismatch detection in DNA monolayers by atomic force microscopy and electrochemical impedance spectroscopy

    Directory of Open Access Journals (Sweden)

    Maryse D. Nkoua Ngavouka

    2016-02-01

    Full Text Available Background: DNA hybridization is at the basis of most current technologies for genotyping and sequencing, due to the unique properties of DNA base-pairing that guarantee a high grade of selectivity. Nonetheless the presence of single base mismatches or not perfectly matched sequences can affect the response of the devices and the major challenge is, nowadays, to distinguish a mismatch of a single base and, at the same time, unequivocally differentiate devices read-out of fully and partially matching sequences.Results: We present here two platforms based on different sensing strategies, to detect mismatched and/or perfectly matched complementary DNA strands hybridization into ssDNA oligonucleotide monolayers. The first platform exploits atomic force microscopy-based nanolithography to create ssDNA nano-arrays on gold surfaces. AFM topography measurements then monitor the variation of height of the nanostructures upon biorecognition and then follow annealing at different temperatures. This strategy allowed us to clearly detect the presence of mismatches. The second strategy exploits the change in capacitance at the interface between an ssDNA-functionalized gold electrode and the solution due to the hybridization process in a miniaturized electrochemical cell. Through electrochemical impedance spectroscopy measurements on extended ssDNA self-assembled monolayers we followed in real-time the variation of capacitance, being able to distinguish, through the difference in hybridization kinetics, not only the presence of single, double or triple mismatches in the complementary sequence, but also the position of the mismatched base pair with respect to the electrode surface.Conclusion: We demonstrate here two platforms based on different sensing strategies as sensitive and selective tools to discriminate mismatches. Our assays are ready for parallelization and can be used in the detection and quantification of single nucleotide mismatches in microRNAs or

  7. Technical aspects of typing for HLA-DP alleles using allele-specific DNA in vitro amplification and sequence-specific oligonucleotide probes. Detection of single base mismatches

    DEFF Research Database (Denmark)

    Fugger, L; Morling, N; Ryder, L P

    1990-01-01

    The polymerase chain reaction (PCR) is an effective method for in vitro DNA amplification which combined with probing with synthetic oligonucleotides can be used for, e.g., HLA-typing. We have studied the technical aspects of HLA-DP typing with the technique. DNA from mononuclear nucleated cells ...... mismatches may be detected in the PCR and typing for HLA-DP gene variants, which differ for only one base, may be performed.......The polymerase chain reaction (PCR) is an effective method for in vitro DNA amplification which combined with probing with synthetic oligonucleotides can be used for, e.g., HLA-typing. We have studied the technical aspects of HLA-DP typing with the technique. DNA from mononuclear nucleated cells...... was extracted with either a simple salting out method or phenol/chloroform. Both DNAs could be readily used for PCR. The MgC2 concentration of the PCR buffer and the annealing temperature of the thermal cycle of the PCR were the two most important variables. The MgCl2 concentration and the temperature must...

  8. Advanced radar detection schemes under mismatched signal models

    CERN Document Server

    Bandiera, Francesco

    2009-01-01

    Adaptive detection of signals embedded in correlated Gaussian noise has been an active field of research in the last decades. This topic is important in many areas of signal processing such as, just to give some examples, radar, sonar, communications, and hyperspectral imaging. Most of the existing adaptive algorithms have been designed following the lead of the derivation of Kelly's detector which assumes perfect knowledge of the target steering vector. However, in realistic scenarios, mismatches are likely to occur due to both environmental and instrumental factors. When a mismatched signal

  9. Mismatched feature detection with finer granularity for emotional speaker recognition

    Institute of Scientific and Technical Information of China (English)

    Li CHEN; Ying-chun YANG; Zhao-hui WU

    2014-01-01

    The shapes of speakers’ vocal organs change under their different emotional states, which leads to the deviation of the emotional acoustic space of short-time features from the neutral acoustic space and thereby the degradation of the speaker recognition performance. Features deviating greatly from the neutral acoustic space are considered as mismatched features, and they negatively affect speaker recognition systems. Emotion variation produces different feature deformations for different phonemes, so it is reasonable to build a fi ner model to detect mismatched features under each phoneme. However, given the difficulty of phoneme recognition, three sorts of acoustic class recognition- phoneme classes, Gaussian mixture model (GMM) tokenizer, and probabilistic GMM tokenizer- are proposed to replace phoneme recognition. We propose feature pruning and feature regulation methods to process the mismatched features to improve speaker recognition performance. As for the feature regulation method, a strategy of maximizing the between-class distance and minimizing the within-class distance is adopted to train the transformation matrix to regulate the mismatched features. Experiments conducted on the Mandarin affective speech corpus (MASC) show that our feature pruning and feature regulation methods increase the identifi cation rate (IR) by 3.64% and 6.77%, compared with the baseline GMM-UBM (universal background model) algorithm. Also, corresponding IR increases of 2.09% and 3.32% can be obtained with our methods when applied to the state-of-the-art algorithm i-vector.

  10. Energy Detection of Multilevel PAM Signals with Systematic Threshold Mismatch

    Directory of Open Access Journals (Sweden)

    Antti Anttonen

    2009-01-01

    Full Text Available We address a symbol decision problem with spectrally efficient energy detected multilevel pulse amplitude modulated (PAM signals. First, we analytically quantify the relationship between a systematic threshold mismatch and the required increase of the average signal-to-noise ratio to preserve a desired symbol error rate. For the case in which such an increase is not tolerable, we present a novel near-optimal multilevel threshold selection scheme, which is accurate for a wide range of system parameters.

  11. The effect of base pair mismatch on DNA strand displacement

    CERN Document Server

    Broadwater, Bo

    2016-01-01

    DNA strand displacement is a key reaction in DNA homologous recombination and DNA mismatch repair and is also heavily utilized in DNA-based computation and locomotion. Despite its ubiquity in science and engineering, sequence-dependent effects of displacement kinetics have not been extensively characterized. Here, we measured toehold-mediated strand displacement kinetics using single-molecule fluorescence in the presence of a single base pair mismatch. The apparent displacement rate varied significantly when the mismatch was introduced in the invading DNA strand. The rate generally decreased as the mismatch in the invader was encountered earlier in displacement. Our data indicate that a single base pair mismatch in the invader stalls branch migration, and displacement occurs via direct dissociation of the destabilized incumbent strand from the substrate strand. We combined both branch migration and direct dissociation into a model, which we term, the concurrent displacement model, and used the first passage t...

  12. Visual mismatch negativity reveals automatic detection of sequential regularity violation

    Directory of Open Access Journals (Sweden)

    Gábor eStefanics

    2011-05-01

    Full Text Available Sequential regularities are abstract rules based on repeating sequences of environmental events, which are useful to make predictions about future events. As the processes underlying visual mismatch negativity (vMMN are sensitive to complex stimulus changes, this event-related potential component, like its auditory counterpart, may be an index of a primitive system of intelligence. Here we tested whether the visual system is capable to detect abstract sequential regularity in unattended stimulus sequences. In our first experiment we investigated the emergence of vMMN and other change-related activity to stimuli violating abstract rules. Red and green disk patterns were delivered in pairs. When in the majority of pairs the colors were identical within the pairs, deviant pairs with different colors for the second member of the pair elicited vMMN. Spatially more extended vMMN responses with longer latency were observed for deviants with 10% compared to 30% probability. In our second experiment utilizing oddball sequences, we tested the emergence of vMMN to violations of a concrete, feature-based rule of a repetition of a standard color. Deviant colors elicited a vMMN response in the oddball sequences. VMMN was larger for the second member of the pair, i.e. after a shorter stimulus onset asynchrony (SOA. This result corresponds to the expected SOA/(vMMN relationship. Our results show that the system underlying vMMN is sensitive to abstract probability rules and this component can be considered as a correlate of violated predictions about the characteristics of environmental events.

  13. The contrasting structures of mismatched DNA sequences containing looped-out bases (bulges) and multiple mismatches (bubbles).

    Science.gov (United States)

    Bhattacharyya, A; Lilley, D M

    1989-09-12

    We have studied the structure and reactivities of two kinds of mismatched DNA sequences--unopposed bases, or bulges, and multiple mismatched pairs of bases. These were generated in a constant sequence environment, in relatively long DNA fragments, using a technique based on heteroduplex formation between sequences cloned into single-stranded M13 phage. The mismatched sequences were studied from two points of view, viz 1. The mobility of the fragments on gel electrophoresis in polyacrylamide was studied in order to examine possible bending of the DNA due to the presence of the mismatch defect. Such bending would constitute a global effect on the conformation of the molecule. 2. Sequences in and around the mismatches were studied using enzyme and chemical probes of DNA structure. This would reveal more local structural effects of the mismatched sequences. We observed that the structures of the bulges and the multiple mismatches appear to be fundamentally different. The bulged sequences exhibited a large gel retardation, consistent with a significant bending of the DNA at the bulge, and whose magnitude depends on the number of mismatched bases. The larger bulges were sensitive to cleavage by single-strand specific nucleases, and modified by diethyl pyrocarbonate (adenines) or osmium tetroxide (thymines) in a non-uniform way, suggesting that the bulges have a precise structure that leads to exposure of some, but not all, of the bases. In contrast the multiple mismatches ('bubbles') cause very much less bending of the DNA fragment in which they occur, and uniform patterns of chemical reactivity along the length of the mismatched sequences, suggesting a less well defined, and possibly flexible, structure. The precise structure of the bulges suggests that such features may be especially significant for recognition by proteins.

  14. Memory-based mismatch response to frequency changes in rats.

    Directory of Open Access Journals (Sweden)

    Piia Astikainen

    Full Text Available Any occasional changes in the acoustic environment are of potential importance for survival. In humans, the preattentive detection of such changes generates the mismatch negativity (MMN component of event-related brain potentials. MMN is elicited to rare changes ('deviants' in a series of otherwise regularly repeating stimuli ('standards'. Deviant stimuli are detected on the basis of a neural comparison process between the input from the current stimulus and the sensory memory trace of the standard stimuli. It is, however, unclear to what extent animals show a similar comparison process in response to auditory changes. To resolve this issue, epidural potentials were recorded above the primary auditory cortex of urethane-anesthetized rats. In an oddball condition, tone frequency was used to differentiate deviants interspersed randomly among a standard tone. Mismatch responses were observed at 60-100 ms after stimulus onset for frequency increases of 5% and 12.5% but not for similarly descending deviants. The response diminished when the silent inter-stimulus interval was increased from 375 ms to 600 ms for +5% deviants and from 600 ms to 1000 ms for +12.5% deviants. In comparison to the oddball condition the response also diminished in a control condition in which no repetitive standards were presented (equiprobable condition. These findings suggest that the rat mismatch response is similar to the human MMN and indicate that anesthetized rats provide a valuable model for studies of central auditory processing.

  15. An unexpected sequence of events: mismatch detection in the human hippocampus.

    Directory of Open Access Journals (Sweden)

    Dharshan Kumaran

    2006-11-01

    Full Text Available The ability to identify and react to novelty within the environment is fundamental to survival. Computational models emphasize the potential role of the hippocampus in novelty detection, its unique anatomical circuitry making it ideally suited to act as a comparator between past and present experience. The hippocampus, therefore, is viewed to detect associative mismatches between what is expected based on retrieval of past experience and current sensory input. However, direct evidence that the human hippocampus performs such operations is lacking. We explored brain responses to novel sequences of objects using functional magnetic resonance imaging (fMRI, while subjects performed an incidental target detection task. Our results demonstrate that hippocampal activation was maximal when prior predictions concerning which object would appear next in a sequence were violated by sensory reality. In so doing, we establish the biological reality of associative match-mismatch computations within the human hippocampus, a process widely held to play a cardinal role in novelty detection. Our results also suggest that the hippocampus may generate predictions about how future events will unfold, and critically detect when these expectancies are violated, even when task demands do not require it. The present study also offers broader insights into the nature of essential computations carried out by the hippocampus, which may also underpin its unique contribution to episodic memory.

  16. T-T mismatch-driven biosensor using triple functional DNA-protein conjugates for facile detection of Hg2+.

    Science.gov (United States)

    Wang, Ruoyu; Zhou, Xiaohong; Shi, Hanchang; Luo, Yi

    2016-04-15

    We report herein a T-T mismatch-driven biosensor using triple functional DNA-protein conjugates for facile detection of mercury ions (Hg(2+)) based on evanescent wave fluorescence excitation. Fluorescein-labeled DNA strands and streptavidin molecules were conjugated using heterobifunctional crosslinkers, and the obtained conjugates were named as "Hg(2+) dependent conjugates, HDCs". Initially hybridized with quencher-labeled DNA (Q-DNA) strands, HDCs showed low evanescent wave-induced fluorescence emission signals; however, in the presence of Hg(2+), the DNA moieties of HDCs tended to form hairpin structures stabilized by T-T mismatches, releasing Q-DNA strands, which was accompanied by increases in the fluorescent signals. The novel detection strategy enables the fluorescent detection of mercury ions with high specificity and a low detection limit of 1.06 nM in a facile way.

  17. Model Mismatch Paradigm for Probe based Nanoscale Imaging

    Science.gov (United States)

    Agarwal, Pranav

    Scanning Probe Microscopes (SPMs) are widely used for investigation of material properties and manipulation of matter at the nanoscale. These instruments are considered critical enablers of nanotechnology by providing the only technique for direct observation of dynamics at the nanoscale and affecting it with sub Angstrom resolution. Current SPMs are limited by low throughput and lack of quantitative measurements of material properties. Various applications like the high density data storage, sub-20 nm lithography, fault detection and functional probing of semiconductor circuits, direct observation of dynamical processes involved in biological samples viz. motor proteins and transport phenomena in various materials demand high throughput operation. Researchers involved in material characterization at nanoscale are interested in getting quantitative measurements of stiffness and dissipative properties of various materials in a least invasive manner. In this thesis, system theoretic concepts are used to address these limitations. The central tenet of the thesis is to model, the known information about the system and then focus on perturbations of these known dynamics or model, to sense the effects due to changes in the environment such as changes in material properties or surface topography. Thus a model mismatch paradigm for probe based nanoscale imaging is developed. The topic is developed by presenting physics based modeling of a particular mode of operation of SPMs called the dynamic mode operation. This mode is modeled as a forced Lure system where a linear time invariant system is in feedback with an unknown static memoryless nonlinearity. Tools from averaging theory are used to tame this complex nonlinear system by approximating it as a linear system with time varying parameters. Material properties are thus transformed from being parameters of unknown nonlinear functions to being unknown coefficients of a linear plant. The first contribution of this thesis

  18. Can Mismatch Negativity Be Linked to Synaptic Processes? A Glutamatergic Approach to Deviance Detection

    Science.gov (United States)

    Strelnikov, Kuzma

    2007-01-01

    This article aims to provide a theoretical framework to elucidate the neurophysiological underpinnings of deviance detection as reflected by mismatch negativity. A six-step model of the information processing necessary for deviance detection is proposed. In this model, predictive coding of learned regularities is realized by means of long-term…

  19. Detecting mismatches of bird migration stopover and tree phenology in response to changing climate

    Science.gov (United States)

    Kellermann, Jherime L.; Van Riper, Charles

    2015-01-01

    Migratory birds exploit seasonal variation in resources across latitudes, timing migration to coincide with the phenology of food at stopover sites. Differential responses to climate in phenology across trophic levels can result in phenological mismatch; however, detecting mismatch is sensitive to methodology. We examined patterns of migrant abundance and tree flowering, phenological mismatch, and the influence of climate during spring migration from 2009 to 2011 across five habitat types of the Madrean Sky Islands in southeastern Arizona, USA. We used two metrics to assess phenological mismatch: synchrony and overlap. We also examined whether phenological overlap declined with increasing difference in mean event date of phenophases. Migrant abundance and tree flowering generally increased with minimum spring temperature but depended on annual climate by habitat interactions. Migrant abundance was lowest and flowering was highest under cold, snowy conditions in high elevation montane conifer habitat while bird abundance was greatest and flowering was lowest in low elevation riparian habitat under the driest conditions. Phenological synchrony and overlap were unique and complementary metrics and should both be used when assessing mismatch. Overlap declined due to asynchronous phenologies but also due to reduced migrant abundance or flowering when synchrony was actually maintained. Overlap declined with increasing difference in event date and this trend was strongest in riparian areas. Montane habitat specialists may be at greatest risk of mismatch while riparian habitat could provide refugia during dry years for phenotypically plastic species. Interannual climate patterns that we observed match climate change projections for the arid southwest, altering stopover habitat condition.

  20. Detection of cognitive impairment in patients with obstructive sleep apnea hypopnea syndrome using mismatch negativity

    Institute of Scientific and Technical Information of China (English)

    Xiaohui Wen; Ningyu Wang; Jinfeng Liu; Zhanfeng Yan; Zhonghai Xin

    2012-01-01

    In this experiment, 97 patients with obstructive sleep apnea hypopnea syndrome were divided into three groups (mild, moderate, severe) according to minimum oxygen saturation, and 35 healthy subjects were examined as controls. Cognitive function was determined using the mismatch negativity paradigm and the Montreal Cognitive Assessment. The results revealed that as the disease worsened, the mismatch negativity latency was gradually extended, and the amplitude gradually declined in patients with obstructive sleep apnea hypopnea syndrome. Importantly, mismatch negativity latency in severe patients with a persistent time of minimum oxygen saturation 60 seconds. Correlation analysis revealed a negative correlation between minimum oxygen saturation latency and Montreal Cognitive Assessment scores. These findings indicate that intermittent night-time hypoxemia affects mismatch negativity waveforms and Montreal Cognitive Assessment scores. As indicators for detecting the cognitive functional status of obstructive sleep apnea hypopnea syndrome patients, the sensitivity of mismatch negativity is 82.93%, the specificity is 73.33%, the accuracy rate is 81.52%, the positive predictive value is 85.00%, the negative predictive value is 70.21%, the positive likelihood ratio is 3, and the negative likelihood ratio is 0.23. These results indicate that mismatch negativity can be used as an effective tool for diagnosis of cognitive dysfunction in obstructive sleep apnea hypopnea syndrome patients.

  1. Single-molecule multiparameter fluorescence spectroscopy reveals directional MutS binding to mismatched bases in DNA

    NARCIS (Netherlands)

    M. Cristovao (Michele); E. Sisamakis (Evangelos); M.M. Hingorani (Manju); A.D. Marx (Andreas); C.P. Jung (Caroline); P.J. Rothwell (Paul); C.A.M. Seidel (Claus A.); P. Friedhoff (Peter)

    2012-01-01

    textabstractMismatch repair (MMR) corrects replication errors such as mismatched bases and loops in DNA. The evolutionarily conserved dimeric MMR protein MutS recognizes mismatches by stacking a phenylalanine of one subunit against one base of the mismatched pair. In all crystal structures of G:T mi

  2. DnaN clamp zones provide a platform for spatiotemporal coupling of mismatch detection to DNA replication.

    Science.gov (United States)

    Lenhart, Justin S; Sharma, Anushi; Hingorani, Manju M; Simmons, Lyle A

    2013-02-01

    Mismatch repair (MMR) increases the fidelity of DNA replication by identifying and correcting replication errors. Processivity clamps are vital components of DNA replication and MMR, yet the mechanism and extent to which they participate in MMR remains unclear. We investigated the role of the Bacillus subtilis processivity clamp DnaN, and found that it serves as a platform for mismatch detection and coupling of repair to DNA replication. By visualizing functional MutS fluorescent fusions in vivo, we find that MutS forms foci independent of mismatch detection at sites of replication (i.e. the replisome). These MutS foci are directed to the replisome by DnaN clamp zones that aid mismatch detection by targeting the search to nascent DNA. Following mismatch detection, MutS disengages from the replisome, facilitating repair. We tested the functional importance of DnaN-mediated mismatch detection for MMR, and found that it accounts for 90% of repair. This high dependence on DnaN can be bypassed by increasing MutS concentration within the cell, indicating a secondary mode of detection in vivo whereby MutS directly finds mismatches without associating with the replisome. Overall, our results provide new insight into the mechanism by which DnaN couples mismatch recognition to DNA replication in living cells.

  3. Rhythmic and melodic deviations in musical sequences recruit different cortical areas for mismatch detection.

    Science.gov (United States)

    Lappe, Claudia; Steinsträter, Olaf; Pantev, Christo

    2013-01-01

    The mismatch negativity (MMN), an event-related potential (ERP) representing the violation of an acoustic regularity, is considered as a pre-attentive change detection mechanism at the sensory level on the one hand and as a prediction error signal on the other hand, suggesting that bottom-up as well as top-down processes are involved in its generation. Rhythmic and melodic deviations within a musical sequence elicit a MMN in musically trained subjects, indicating that acquired musical expertise leads to better discrimination accuracy of musical material and better predictions about upcoming musical events. Expectation violations to musical material could therefore recruit neural generators that reflect top-down processes that are based on musical knowledge. We describe the neural generators of the musical MMN for rhythmic and melodic material after a short-term sensorimotor-auditory (SA) training. We compare the localization of musical MMN data from two previous MEG studies by applying beamformer analysis. One study focused on the melodic harmonic progression whereas the other study focused on rhythmic progression. The MMN to melodic deviations revealed significant right hemispheric neural activation in the superior temporal gyrus (STG), inferior frontal cortex (IFC), and the superior frontal (SFG) and orbitofrontal (OFG) gyri. IFC and SFG activation was also observed in the left hemisphere. In contrast, beamformer analysis of the data from the rhythm study revealed bilateral activation within the vicinity of auditory cortices and in the inferior parietal lobule (IPL), an area that has recently been implied in temporal processing. We conclude that different cortical networks are activated in the analysis of the temporal and the melodic content of musical material, and discuss these networks in the context of the dual-pathway model of auditory processing.

  4. Comparison of T7E1 and Surveyor Mismatch Cleavage Assays to Detect Mutations Triggered by Engineered Nucleases

    OpenAIRE

    Vouillot, Léna; Thélie, Aurore; Pollet, Nicolas

    2015-01-01

    Genome editing using engineered nucleases is used for targeted mutagenesis. But because genome editing does not target all loci with similar efficiencies, the mutation hit-rate at a given locus needs to be evaluated. The analysis of mutants obtained using engineered nucleases requires specific methods for mutation detection, and the enzyme mismatch cleavage method is used commonly for this purpose. This method uses enzymes that cleave heteroduplex DNA at mismatches and extrahelical loops form...

  5. Emotional intelligence and mismatching expressive and verbal messages: a contribution to detection of deception.

    Directory of Open Access Journals (Sweden)

    Jerzy Wojciechowski

    Full Text Available Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI. However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception.

  6. Unique magnetic signatures of mismatched base pairs in DNA

    Science.gov (United States)

    Apalkov, Vadim; Berashevich, Julia; Chakraborty, Tapash

    2010-02-01

    Magnetic properties of DNA containing mispairs, such as different conformations of the GṡA mispair, or a GṡT mispair inserted into the DNA chain, have been theoretically investigated. The essential ingredients for these studies, the charge transfer integrals, were evaluated from the DNA sequences containing the mispair and optimized in the solvent. We find that the magnetic susceptibilities of the host DNA chain containing a large number of Watson-Crick base pairs are significantly altered in the presence of the mispairs, and the effects depend on the choice of mispairs. In particular, insertion of even a single GṡA mispair changes the nature of magnetization (sign of the susceptibility) of the host DNA. We propose that measurement of the magnetic properties of DNA might provide a direct route to detection and identification of those mispairs.

  7. A simple and rapid quantitative method of detection of the common achondroplasia mutation: Analysis in mismatch repair deficient cells

    Directory of Open Access Journals (Sweden)

    Grewal Raji

    2004-01-01

    Full Text Available Achondroplasia is the most common form of dwarfism and has an incidence of approximately 1/7,500. In more than 97% of cases, it is caused by a recurrent point mutation, a G to A substitution at nucleotide position 1138 (G1138A of the fibroblast growth factor receptor 3 gene. Although this is an autosomal dominant condition, more than 90% of all mutations occur sporadically making this one of the most mutagenic sites in the human genome. The reasons for the high spontaneous G1138A mutation rate are not known. This investigation was performed by developing a simple and rapid semi-quantitative allele specific PCR based assay capable of reliably detecting more than 25 mutant G1138A copies in a pool of 300,000 wild type molecules. Using this assay, the G1138A mutation frequency was measured in cell lines deficient in mismatch repair (LoVo, SW48 and comparing it with controls. No differences were found in the frequency of this point mutation between the mismatch repair deficient and wild type cell lines.

  8. Examining the Mismatch between Pupil and Teacher Knowledge in Acid-Base Chemistry.

    Science.gov (United States)

    Erduran, Sibel

    2003-01-01

    Reports a mismatch between teacher and pupil knowledge of acid-base chemistry as a result of controversial episodes from three science lessons. Suggests that the teacher's knowledge is guided by textbook information while the pupil's knowledge is based on direct experimental experience. Proposes that classroom activities should support the…

  9. Automatic Change Detection to Facial Expressions in Adolescents: Evidence from Visual Mismatch Negativity Responses

    Directory of Open Access Journals (Sweden)

    Tongran eLiu

    2016-03-01

    Full Text Available Adolescence is a critical period for the neurodevelopment of social-emotional processing, wherein the automatic detection of changes in facial expressions is crucial for the development of interpersonal communication. Two groups of participants (an adolescent group and an adult group were recruited to complete an emotional oddball task featuring on happy and one fearful condition. The measurement of event-related potential (ERP was carried out via electroencephalography (EEG and electrooculography (EOG recording, to detect visual mismatch negativity (vMMN with regard to the automatic detection of changes in facial expressions between the two age groups. The current findings demonstrated that the adolescent group featured more negative vMMN amplitudes than the adult group in the fronto-central region during the 120-200 ms interval. During the time window of 370-450 ms, only the adult group showed better automatic processing on fearful faces than happy faces. The present study indicated that adolescents posses stronger automatic detection of changes in emotional expression relative to adults, and sheds light on the neurodevelopment of automatic processes concerning social-emotional information.

  10. Optimization of single-base-pair mismatch discrimination in oligonucleotide microarrays

    NARCIS (Netherlands)

    Urakawa, H.; Fantroussi, El S.; Smidt, H.; Smoot, J.C.; Tribou, E.H.; Kelly, J.J.; Noble, P.A.; Stahl, D.A.

    2003-01-01

    The discrimination between perfect-match and single-base-pair-mismatched nucleic acid duplexes was investigated by using oligonucleotide DNA microarrays and nonequilibrium dissociation rates (melting profiles). DNA and RNA versions of two synthetic targets corresponding to the 16S rRNA sequences of

  11. Impacts of Refraction Index Mismatch on Performance of Target Detection and Imaging by Using Flat LHM Lens

    Institute of Scientific and Technical Information of China (English)

    FANG Jie-Ran; GONG Yu; DONG Xiao-Ting; WANG Gang

    2008-01-01

    Refraction index mismatch between flat left-handed metamaterial(LHM)lens and its surrounding medium generally destroys the focusing of flat LHM lens and degrades the performance of near-field target detection by usingflat LHM lens.For LHM lens of refraction index mismatch within±30%,numerical simulations demonstrate that lenses with large refraction index may suffer less resolution degradation than lenses with small refraction index,and the enhancement of refocused microwave backscattered from target can be subsided bly up to approximately 5.5 dB.The refraction index mismatch will also shift the target position in the reconstructed image so that theoretical prediction of target position needs to be modified.

  12. Phase Error Caused by Speed Mismatch Analysis in the Line-Scan Defect Detection by Using Fourier Transform Technique

    Directory of Open Access Journals (Sweden)

    Eryi Hu

    2015-01-01

    Full Text Available The phase error caused by the speed mismatch issue is researched in the line-scan images capturing 3D profile measurement. The experimental system is constructed by a line-scan CCD camera, an object moving device, a digital fringe pattern projector, and a personal computer. In the experiment procedure, the detected object is moving relative to the image capturing system by using a motorized translation stage in a stable velocity. The digital fringe pattern is projected onto the detected object, and then the deformed patterns are captured and recorded in the computer. The object surface profile can be calculated by the Fourier transform profilometry. However, the moving speed mismatch error will still exist in most of the engineering application occasion even after an image system calibration. When the moving speed of the detected object is faster than the expected value, the captured image will be compressed in the moving direction of the detected object. In order to overcome this kind of measurement error, an image recovering algorithm is proposed to reconstruct the original compressed image. Thus, the phase values can be extracted much more accurately by the reconstructed images. And then, the phase error distribution caused by the speed mismatch is analyzed by the simulation and experimental methods.

  13. Cortical mapping of mismatch negativity with deviance detection property in rat.

    Directory of Open Access Journals (Sweden)

    Tomoyo Isoguchi Shiramatsu

    Full Text Available Mismatch Negativity (MMN is an N-methyl-d-aspartic acid (NMDA-mediated, negative deflection in human auditory evoked potentials in response to a cognitively discriminable change. MMN-like responses have been extensively investigated in animal models, but the existence of MMN equivalent is still controversial. In this study, we aimed to investigate how closely the putative MMN (MMNp in rats exhibited the comparable properties of human MMN. We used a surface microelectrode array with a grid of 10 × 7 recording sites within an area of 4.5 × 3.0 mm to densely map evoked potentials in the auditory cortex of anesthetized rats under the oddball paradigm. Firstly, like human MMN, deviant stimuli elicited negative deflections in auditory evoked potentials following the positive middle-latency response, termed P1. Secondly, MMNp exhibited deviance-detecting property, which could not be explained by simple stimulus specific adaptation (SSA. Thirdly, this MMNp occurred focally in the auditory cortex, including both the core and belt regions, while P1 activation focus was obtained in the core region, indicating that both P1 and MMNp are generated in the auditory cortex, yet the sources of these signals do not completely overlap. Fourthly, MMNp significantly decreased after the application of AP5 (D-(--2-amino-5-phosphonopentanoic acid, an antagonist at NMDA receptors. In stark contrast, AP5 affected neither P1 amplitude nor SSA of P1. These results provide compelling evidence that the MMNp we have examined in rats is functionally comparable to human MMN. The present work will stimulate translational research into MMN, which may help bridge the gap between electroencephalography (EEG/magnetoencephalography (MEG studies in humans and electrophysiological studies in animals.

  14. Detection of coding microsatellite frameshift mutations in DNA mismatch repair-deficient mouse intestinal tumors.

    Science.gov (United States)

    Woerner, Stefan M; Tosti, Elena; Yuan, Yan P; Kloor, Matthias; Bork, Peer; Edelmann, Winfried; Gebert, Johannes

    2015-11-01

    Different DNA mismatch repair (MMR)-deficient mouse strains have been developed as models for the inherited cancer predisposing Lynch syndrome. It is completely unresolved, whether coding mononucleotide repeat (cMNR) gene mutations in these mice can contribute to intestinal tumorigenesis and whether MMR-deficient mice are a suitable molecular model of human microsatellite instability (MSI)-associated intestinal tumorigenesis. A proof-of-principle study was performed to identify mouse cMNR-harboring genes affected by insertion/deletion mutations in MSI murine intestinal tumors. Bioinformatic algorithms were developed to establish a database of mouse cMNR-harboring genes. A panel of five mouse noncoding mononucleotide markers was used for MSI classification of intestinal matched normal/tumor tissues from MMR-deficient (Mlh1(-/-) , Msh2(-/-) , Msh2(LoxP/LoxP) ) mice. cMNR frameshift mutations of candidate genes were determined by DNA fragment analysis. Murine MSI intestinal tumors but not normal tissues from MMR-deficient mice showed cMNR frameshift mutations in six candidate genes (Elavl3, Tmem107, Glis2, Sdccag1, Senp6, Rfc3). cMNRs of mouse Rfc3 and Elavl3 are conserved in type and length in their human orthologs that are known to be mutated in human MSI colorectal, endometrial and gastric cancer. We provide evidence for the utility of a mononucleotide marker panel for detection of MSI in murine tumors, the existence of cMNR instability in MSI murine tumors, the utility of mouse subspecies DNA for identification of polymorphic repeats, and repeat conservation among some orthologous human/mouse genes, two of them showing instability in human and mouse MSI intestinal tumors. MMR-deficient mice hence are a useful molecular model system for analyzing MSI intestinal carcinogenesis.

  15. Maximum Likelihood A Priori Knowledge Interpolation-Based Handset Mismatch Compensation for Robust Speaker Identification

    Institute of Scientific and Technical Information of China (English)

    LIAO Yuanfu; ZHUANG Zhixian; YANG Jyhher

    2008-01-01

    Unseen handset mismatch is the major source of performance degradation in speaker identifica-tion in telecommunication environments.To alleviate the problem,a maximum likelihood a priori knowledge interpolation (ML-AKI)-based handset mismatch compensation approach is proposed.It first collects a set of handset characteristics of seen handsets to use as the a priori knowledge for representing the space of handsets.During evaluation the characteristics of an unknown test handset are optimally estimated by in-terpolation from the set of the a pdod knowledge.Experimental results on the HTIMIT database show that the ML-AKI method can improve the average speaker identification rate from 60.0% to 74.6% as compared with conventional maximum a posteriori-adapted Gaussian mixture models.The proposed ML-AKI method is a promising method for robust speaker identification.

  16. Mismatch Receptive Fields in Mouse Visual Cortex.

    Science.gov (United States)

    Zmarz, Pawel; Keller, Georg B

    2016-11-23

    In primary visual cortex, a subset of neurons responds when a particular stimulus is encountered in a certain location in visual space. This activity can be modeled using a visual receptive field. In addition to visually driven activity, there are neurons in visual cortex that integrate visual and motor-related input to signal a mismatch between actual and predicted visual flow. Here we show that these mismatch neurons have receptive fields and signal a local mismatch between actual and predicted visual flow in restricted regions of visual space. These mismatch receptive fields are aligned to the retinotopic map of visual cortex and are similar in size to visual receptive fields. Thus, neurons with mismatch receptive fields signal local deviations of actual visual flow from visual flow predicted based on self-motion and could therefore underlie the detection of objects moving relative to the visual flow caused by self-motion. VIDEO ABSTRACT.

  17. A Review for Model Plant Mismatch Measures in Process Monitoring

    Institute of Scientific and Technical Information of China (English)

    王洪; 谢磊; 宋执环

    2012-01-01

    Model is usually necessary for the design of a control loop. Due to simplification and unknown dynamics, model plant mismatch is inevitable in the control loop. In process monitoring, detection of mismatch and evaluation of its influences are demanded. In this paper several mismatch measures are presented based on different model descriptions. They are categorized into different groups from different perspectives and their potential in detection and diagnosis is evaluated. Two case studies on mixing process and distillation process demonstrate the efficacy of the framework of mismatch monitoring.

  18. AN INTEGRATED RANSAC AND GRAPH BASED MISMATCH ELIMINATION APPROACH FOR WIDE-BASELINE IMAGE MATCHING

    Directory of Open Access Journals (Sweden)

    M. Hasheminasab

    2015-12-01

    Full Text Available In this paper we propose an integrated approach in order to increase the precision of feature point matching. Many different algorithms have been developed as to optimizing the short-baseline image matching while because of illumination differences and viewpoints changes, wide-baseline image matching is so difficult to handle. Fortunately, the recent developments in the automatic extraction of local invariant features make wide-baseline image matching possible. The matching algorithms which are based on local feature similarity principle, using feature descriptor as to establish correspondence between feature point sets. To date, the most remarkable descriptor is the scale-invariant feature transform (SIFT descriptor , which is invariant to image rotation and scale, and it remains robust across a substantial range of affine distortion, presence of noise, and changes in illumination. The epipolar constraint based on RANSAC (random sample consensus method is a conventional model for mismatch elimination, particularly in computer vision. Because only the distance from the epipolar line is considered, there are a few false matches in the selected matching results based on epipolar geometry and RANSAC. Aguilariu et al. proposed Graph Transformation Matching (GTM algorithm to remove outliers which has some difficulties when the mismatched points surrounded by the same local neighbor structure. In this study to overcome these limitations, which mentioned above, a new three step matching scheme is presented where the SIFT algorithm is used to obtain initial corresponding point sets. In the second step, in order to reduce the outliers, RANSAC algorithm is applied. Finally, to remove the remained mismatches, based on the adjacent K-NN graph, the GTM is implemented. Four different close range image datasets with changes in viewpoint are utilized to evaluate the performance of the proposed method and the experimental results indicate its robustness and

  19. Comparison of T7E1 and surveyor mismatch cleavage assays to detect mutations triggered by engineered nucleases.

    Science.gov (United States)

    Vouillot, Léna; Thélie, Aurore; Pollet, Nicolas

    2015-01-07

    Genome editing using engineered nucleases is used for targeted mutagenesis. But because genome editing does not target all loci with similar efficiencies, the mutation hit-rate at a given locus needs to be evaluated. The analysis of mutants obtained using engineered nucleases requires specific methods for mutation detection, and the enzyme mismatch cleavage method is used commonly for this purpose. This method uses enzymes that cleave heteroduplex DNA at mismatches and extrahelical loops formed by single or multiple nucleotides. Bacteriophage resolvases and single-stranded nucleases are used commonly in the assay but have not been compared side-by-side on mutations obtained by engineered nucleases. We present the first comparison of the sensitivity of T7E1 and Surveyor EMC assays on deletions and point mutations obtained by zinc finger nuclease targeting in frog embryos. We report the mutation detection limits and efficiencies of T7E1 and Surveyor. In addition, we find that T7E1 outperforms the Surveyor nuclease in terms of sensitivity with deletion substrates, whereas Surveyor is better for detecting single nucleotide changes. We conclude that T7E1 is the preferred enzyme to scan mutations triggered by engineered nucleases.

  20. Quantifying the contributions of base selectivity, proofreading and mismatch repair to nuclear DNA replication in Saccharomyces cerevisiae.

    Science.gov (United States)

    St Charles, Jordan A; Liberti, Sascha E; Williams, Jessica S; Lujan, Scott A; Kunkel, Thomas A

    2015-07-01

    Mismatches generated during eukaryotic nuclear DNA replication are removed by two evolutionarily conserved error correction mechanisms acting in series, proofreading and mismatch repair (MMR). Defects in both processes are associated with increased susceptibility to cancer. To better understand these processes, we have quantified base selectivity, proofreading and MMR during nuclear DNA replication in Saccharomyces cerevisiae. In the absence of proofreading and MMR, the primary leading and lagging strand replicases, polymerase ɛ and polymerase δ respectively, synthesize DNA in vivo with somewhat different error rates and specificity, and with apparent base selectivity that is more than 100 times higher than measured in vitro. Moreover, leading and lagging strand replication fidelity rely on a different balance between proofreading and MMR. On average, proofreading contributes more to replication fidelity than does MMR, but their relative contributions vary from nearly all proofreading of some mismatches to mostly MMR of other mismatches. Thus accurate replication of the two DNA strands results from a non-uniform and variable balance between error prevention, proofreading and MMR.

  1. The effect of primer-template mismatches on the detection and quantification of nucleic acids using the 5′ nuclease assay

    NARCIS (Netherlands)

    R. Stadhouders (Ralph); S.D. Pas (Suzan); J. Anber (Jeer); J. Voermans (Jolanda); T.H.M. Mes; M. Schutten (Martin)

    2010-01-01

    textabstractReal-time polymerase chain reaction (PCR) is the current method of choice for detection and quantification of nucleic acids, especially for molecular diagnostics. Complementarity between primers and template is often crucial for PCR applications, as mismatches can severely reduce priming

  2. DREMECELS: A Curated Database for Base Excision and Mismatch Repair Mechanisms Associated Human Malignancies.

    Directory of Open Access Journals (Sweden)

    Ankita Shukla

    Full Text Available DNA repair mechanisms act as a warrior combating various damaging processes that ensue critical malignancies. DREMECELS was designed considering the malignancies with frequent alterations in DNA repair pathways, that is, colorectal and endometrial cancers, associated with Lynch syndrome (also known as HNPCC. Since lynch syndrome carries high risk (~40-60% for both cancers, therefore we decided to cover all three diseases in this portal. Although a large population is presently affected by these malignancies, many resources are available for various cancer types but no database archives information on the genes specifically for only these cancers and disorders. The database contains 156 genes and two repair mechanisms, base excision repair (BER and mismatch repair (MMR. Other parameters include some of the regulatory processes that have roles in these disease progressions due to incompetent repair mechanisms, specifically BER and MMR. However, our unique database mainly provides qualitative and quantitative information on these cancer types along with methylation, drug sensitivity, miRNAs, copy number variation (CNV and somatic mutations data. This database would serve the scientific community by providing integrated information on these disease types, thus sustaining diagnostic and therapeutic processes. This repository would serve as an excellent accompaniment for researchers and biomedical professionals and facilitate in understanding such critical diseases. DREMECELS is publicly available at http://www.bioinfoindia.org/dremecels.

  3. Optimization of energy window for {sup 90}Y bremsstrahlung SPECT imaging for detection tasks using the ideal observer with model-mismatch

    Energy Technology Data Exchange (ETDEWEB)

    Rong Xing; Ghaly, Michael; Frey, Eric C. [Department of Radiology, Johns Hopkins University, Baltimore, Maryland 21287-0859 (United States)

    2013-06-15

    Purpose: In yttrium-90 ({sup 90}Y) microsphere brachytherapy (radioembolization) of unresectable liver cancer, posttherapy {sup 90}Y bremsstrahlung single photon emission computed tomography (SPECT) has been used to document the distribution of microspheres in the patient and to help predict potential side effects. The energy window used during projection acquisition can have a significant effect on image quality. Thus, using an optimal energy window is desirable. However, there has been great variability in the choice of energy window due to the continuous and broad energy distribution of {sup 90}Y bremsstrahlung photons. The area under the receiver operating characteristic curve (AUC) for the ideal observer (IO) is a widely used figure of merit (FOM) for optimizing the imaging system for detection tasks. The IO implicitly assumes a perfect model of the image formation process. However, for {sup 90}Y bremsstrahlung SPECT there can be substantial model-mismatch (i.e., difference between the actual image formation process and the model of it assumed in reconstruction), and the amount of the model-mismatch depends on the energy window. It is thus important to account for the degradation of the observer performance due to model-mismatch in the optimization of the energy window. The purpose of this paper is to optimize the energy window for {sup 90}Y bremsstrahlung SPECT for a detection task while taking into account the effects of the model-mismatch. Methods: An observer, termed the ideal observer with model-mismatch (IO-MM), has been proposed previously to account for the effects of the model-mismatch on IO performance. In this work, the AUC for the IO-MM was used as the FOM for the optimization. To provide a clinically realistic object model and imaging simulation, the authors used a background-known-statistically and signal-known-statistically task. The background was modeled as multiple compartments in the liver with activity parameters independently following a

  4. Electrical impedance tomography for assessing ventilation/perfusion mismatch for pulmonary embolism detection without interruptions in respiration.

    Science.gov (United States)

    Nguyen, Doan Trang; Thiagalingam, Aravinda; Bhaskaran, Abhishek; Barry, Michael A; Pouliopoulos, Jim; Jin, Craig; McEwan, Alistair L

    2014-01-01

    Recent studies have shown high correlation between pulmonary perfusion mapping with impedance contrast enhanced Electrical Impedance Tomography (EIT) and standard perfusion imaging methods such as Computed Tomography (CT) and Single Photon Emission Computerized Tomography (SPECT). EIT has many advantages over standard imaging methods as it is highly portable and non-invasive. Contrast enhanced EIT uses hypertonic saline bolus instead of nephrotoxic contrast medium that are utilized by CT and nuclear Ventilation/Perfusion (V/Q) scans. However, current implementation of contrast enhanced EIT requires induction of an apnea period for perfusion measurement, rendering it disadvantageous compared with current gold standard imaging modalities. In the present paper, we propose the use of a wavelet denoising algorithm to separate perfusion signal from ventilation signal such that no interruption in patient's ventilation would be required. Furthermore, right lung to left lung perfusion ratio and ventilation ratio are proposed to assess the mismatch between ventilation and perfusion for detection of Pulmonary Embolism (PE). The proposed methodology was validated on an ovine model (n=3, 83.7±7.7 kg) with artificially induced PE in the right lung. The results showed a difference in right lung to left lung perfusion ratio between baseline and diseased states in all cases with all paired t-tests between baseline and PE yielding p <; 0.01, while the right lung to left lung ventilation ratio remained unchanged in two out of three experiments. Statistics were pooled from multiple repetitions of measurements per experiment.

  5. Automated detection of residual cells after sex-mismatched stem-cell transplantation – evidence for presence of disease-marker negative residual cells

    Directory of Open Access Journals (Sweden)

    Johannes Tilman

    2009-05-01

    Full Text Available Abstract Background A new chimerism analysis based on automated interphase fluorescence in situ hybridization (FISH evaluation was established to detect residual cells after allogene sex-mismatched bone marrow or blood stem-cell transplantation. Cells of 58 patients were characterized as disease-associated due to presence of a bcr/abl-gene-fusion or a trisomy 8 and/or a simultaneous hybridization of gonosome-specific centromeric probes. The automatic slide scanning platform Metafer with its module MetaCyte was used to analyse 3,000 cells per sample. Results Overall 454 assays of 58 patients were analyzed. 13 of 58 patients showed residual recipient cells at one stage of more than 4% and 12 of 58 showed residual recipient cells less than 4%, respectively. As to be expected, patients of the latter group were associated with a higher survival rate (48 vs. 34 month. In only two of seven patients with disease-marker positive residual cells between 0.1–1.3% a relapse was observed. Besides, disease-marker negative residual cells were found in two patients without relapse at a rate of 2.8% and 3.3%, respectively. Conclusion The definite origin and meaning of disease-marker negative residual cells is still unclear. Overall, with the presented automatic chimerism analysis of interphase FISH slides, a sensitive method for detection of disease-marker positive residual cells is on hand.

  6. Detection of refuge from enemies through phenological mismatching in multitrophic interactions requires season-wide estimation of host abundance

    NARCIS (Netherlands)

    Kerstes, N.A.G.; Jong, de P.W.

    2011-01-01

    The concept of ‘‘enemy-free space’’ (EFS) refers to ways of living that reduce or eliminate the vulnerability of a species to natural enemies. It has been invoked to explain host shifts of phytophagous insects. A demonstrated cause of EFS is escape from enemies in time, through phenological mismatch

  7. Mismatched base-pair simulations for ASFV Pol X/DNA complexes help interpret frequent G*G misincorporation.

    Science.gov (United States)

    Sampoli Benítez, Benedetta A; Arora, Karunesh; Balistreri, Lisa; Schlick, Tamar

    2008-12-31

    DNA polymerase X (pol X) from the African swine fever virus is a 174-amino-acid repair polymerase that likely participates in a viral base excision repair mechanism, characterized by low fidelity. Surprisingly, pol X's insertion rate of the G*G mispair is comparable to that of the four Watson-Crick base pairs. This behavior is in contrast with another X-family polymerase, DNA polymerase beta (pol beta), which inserts G*G mismatches poorly, and has higher DNA repair fidelity. Using molecular dynamics simulations, we previously provided support for an induced-fit mechanism for pol X in the presence of the correct incoming nucleotide. Here, we perform molecular dynamics simulations of pol X/DNA complexes with different incoming incorrect nucleotides in various orientations [C*C, A*G, and G*G (anti) and A*G and G*G (syn)] and compare the results to available kinetic data and prior modeling. Intriguingly, the simulations reveal that the G*G mispair with the incoming nucleotide in the syn configuration undergoes large-scale conformational changes similar to that observed in the presence of correct base pair (G*C). The base pairing in the G*G mispair is achieved via Hoogsteen hydrogen bonding with an overall geometry that is well poised for catalysis. Simulations for other mismatched base pairs show that an intermediate closed state is achieved for the A*G and G*G mispair with the incoming dGTP in anti conformation, while the protein remains near the open conformation for the C*C and the A*G syn mismatches. In addition, catalytic site geometry and base pairing at the nascent template-incoming nucleotide interaction reveal distortions and misalignments that range from moderate for A*G anti to worst for the C*C complex. These results agree well with kinetic data for pol X and provide a structural/dynamic basis to explain, at atomic level, the fidelity of this polymerase compared with other members of the X family. In particular, the more open and pliant active site of pol X

  8. Electrochemical Investigation of Interaction between a Bifunctional Probe and GG Mismatch Duplex.

    Science.gov (United States)

    Li, Jiao; He, Hanping; Peng, Xiaoqian; Huang, Min; Zhang, Xiuhua; Wang, Shengfu

    2015-01-01

    A bifunctional probe (FecNC), containing a recognition part and an electrochemical active center, was applied to electrochemical detection of GG mismatch duplexes. The preparation of gold electrodes modified by mismatch and complementatry duplexes was characterized by electrochemical impedance spectroscopy (EIS) and optimized for better detection in terms of self-assembly time, hybridization time, and incubation time. The interaction between FecNC and DNA duplexes modified on the surface of a gold electrode was explored by square wave voltammetry (SWV) and EIS. The results showed that the DNA duplexes with GG mismatch on the surface of a gold electrode was easily detected by the largest electrochemical signal of the bifunctional probe because of its selective binding to GG mismatches. The bifunctional probe could offer a simple, effective electrochemical detection of GG mismatches, and theoretical bases for development of electrochemical biosensors. Further, the method would be favorable for diagnosis of genetic diseases.

  9. Strategies for tuning phonon transport in multilayered structures using a mismatch-based particle model

    Science.gov (United States)

    Le, Nam Q.; Duda, John C.; English, Timothy S.; Hopkins, Patrick E.; Beechem, Thomas E.; Norris, Pamela M.

    2012-04-01

    The performance of many micro- and nanoscale devices depends on the ability to control interfacial thermal transport, which is predominantly mediated by phonons in semiconductor systems. The phonon transmissivity at an interface is therefore a quantity of interest. In this work, an empirical model, termed the thermal mismatch model, is developed to predict transmissivity at ideal interfaces between semiconductor materials, producing an excellent agreement with molecular dynamics simulations of wave packets. To investigate propagation through multilayered structures, this thermal mismatch model is then incorporated into a simulation scheme that represents wave packets as particles, showing a good agreement with a similar scheme that used molecular dynamics simulations as input [P. K. Schelling and S. R. Phillpot, J. Appl. Phys. 93, 5377 (2003)]. With these techniques validated for both single interfaces and superlattices, they are further used to identify ways to tune the transmissivity of multilayered structures. It is shown that by introducing intermediate layers of certain atomic masses, the total transmissivity can either be systematically enhanced or reduced compared to that of a single interface. Thus, this model can serve as a computationally inexpensive means of developing strategies to control phonon transmissivity in applications that may benefit from either enhancement (e.g., microelectronics) or reduction (e.g., thermoelectrics) in thermal transport.

  10. Atomistic understanding of the C·T mismatched DNA base pair tautomerization via the DPT: QM and QTAIM computational approaches.

    Science.gov (United States)

    Brovarets', Ol'ha O; Hovorun, Dmytro M

    2013-11-15

    It was established that the cytosine·thymine (C·T) mismatched DNA base pair with cis-oriented N1H glycosidic bonds has propeller-like structure (|N3C4C4N3| = 38.4°), which is stabilized by three specific intermolecular interactions-two antiparallel N4H…O4 (5.19 kcal mol(-1)) and N3H…N3 (6.33 kcal mol(-1)) H-bonds and a van der Waals (vdW) contact O2…O2 (0.32 kcal mol(-1)). The C·T base mispair is thermodynamically stable structure (ΔG(int) = -1.54 kcal mol(-1) ) and even slightly more stable than the A·T Watson-Crick DNA base pair (ΔG(int) = -1.43 kcal mol(-1)) at the room temperature. It was shown that the C·T ↔ C*·T* tautomerization via the double proton transfer (DPT) is assisted by the O2…O2 vdW contact along the entire range of the intrinsic reaction coordinate (IRC). The positive value of the Grunenberg's compliance constants (31.186, 30.265, and 22.166 Å/mdyn for the C·T, C*·T*, and TS(C·T ↔ C*·T*), respectively) proves that the O2…O2 vdW contact is a stabilizing interaction. Based on the sweeps of the H-bond energies, it was found that the N4H…O4/O4H…N4, and N3H…N3 H-bonds in the C·T and C*·T* base pairs are anticooperative and weaken each other, whereas the middle N3H…N3 H-bond and the O2…O2 vdW contact are cooperative and mutually reinforce each other. It was found that the tautomerization of the C·T base mispair through the DPT is concerted and asynchronous reaction that proceeds via the TS(C·T ↔ C*·T*) stabilized by the loosened N4-H-O4 covalent bridge, N3H…N3 H-bond (9.67 kcal mol(-1) ) and O2…O2 vdW contact (0.41 kcal mol(-1) ). The nine key points, describing the evolution of the C·T ↔ C*·T* tautomerization via the DPT, were detected and completely investigated along the IRC. The C*·T* mispair was revealed to be the dynamically unstable structure with a lifetime 2.13·× 10(-13) s. In this case, as for the A·T Watson-Crick DNA base pair, activates the mechanism of the quantum protection of the C

  11. Effect of LNA- and OMeN-modified oligonucleotide probes on the stability and discrimination of mismatched base pairs of duplexes

    Indian Academy of Sciences (India)

    Ying Yan; Jing Yan; Xianyu Piao; Tianbiao Zhang; Yifu Guan

    2012-06-01

    Locked nucleic acid (LNA) and 2′--methyl nucleotide (OMeN) are the most extensively studied nucleotide analogues. Although both LNA and OMeN are characterized by the C3′-endo sugar pucker conformation, which is dominant in A-form DNA and RNA nucleotides, they demonstrate different binding behaviours. Previous studies have focused attention on their properties of duplex stabilities, hybridization kinetics and resistance against nuclease digestion; however, their ability to discriminate mismatched hybridizations has been explored much less. In this study, LNA- and OMeN-modified oligonucleotide probes have been prepared and their effects on the DNA duplex stability have been examined: LNA modifications can enhance the duplex stability, whereas OMeN modifications reduce the duplex stability. Next, we studied how the LNA:DNA and OMeN:DNA mismatches reduced the duplex stability. Melting temperature measurement showed that different LNA:DNA or OMeN:DNA mismatches indeed influence the duplex stability differently. LNA purines can discriminate LNA:DNA mismatches more effectively than LNA pyrimidines as well as DNA nucleotides. Furthermore, we designed five LNA- and five OMeN-modified oligonucleotide probes to simulate realistic situations where target–probe duplexes contain a complementary LNA:DNA or OMeN:DNA base pairs and a DNA:DNA mismatch simultaneously. The measured collective effect showed that the duplex stability was enhanced by the complementary LNA:DNA base pair but decreased by the DNA:DNA mismatch in a position-dependent manner regardless of the chemical identity and position of the complementary LNA:DNA base pair. On the other hand, the OMeN-modified probes also showed that the duplex stability was reduced by both the OMeN modification and the OMeN:DNA mismatch in a position-dependent manner.

  12. Extraction of mismatch negativity using a resampling-based spatial filtering method

    Science.gov (United States)

    Lin, Yanfei; Wu, Wei; Wu, Chaohua; Liu, Baolin; Gao, Xiaorong

    2013-04-01

    Objective. It is currently a challenge to extract the mismatch negativity (MMN) waveform on the basis of a small number of EEG trials, which are typically unbalanced between conditions. Approach. In order to address this issue, a method combining the techniques of resampling and spatial filtering is proposed in this paper. Specifically, the first step of the method, termed ‘resampling difference’, randomly samples the standard and deviant sweeps, and then subtracts standard sweeps from deviant sweeps. The second step of the method employs the spatial filters designed by a signal-to-noise ratio maximizer (SIM) to extract the MMN component. The SIM algorithm can maximize the signal-to-noise ratio for event-related potentials (ERPs) to improve extraction. Simulation data were used to evaluate the influence of three parameters (i.e. trial number, repeated-SIM times and sampling times) on the performance of the proposed method. Main results. Results demonstrated that it was feasible and reliable to extract the MMN waveform using the method. Finally, an oddball paradigm with auditory stimuli of different frequencies was employed to record a few trials (50 trials of deviant sweeps and 250 trials of standard sweeps) of EEG data from 11 adult subjects. Results showed that the method could effectively extract the MMN using the EEG data of each individual subject. Significance. The extracted MMN waveform has a significantly larger peak amplitude and shorter latencies in response to the more deviant stimuli than in response to the less deviant stimuli, which agreed with the MMN properties reported in previous literature using grand-averaged EEG data of multi-subjects.

  13. Testing the transtheoretical model for fruit intake: comparing web-based tailored stage-matched and stage-mismatched feedback.

    Science.gov (United States)

    de Vet, Emely; de Nooijer, Jascha; de Vries, Nanne K; Brug, Johannes

    2008-04-01

    A match-mismatch test was conducted to test the transtheoretical model applied to fruit intake. Precontemplators and contemplators were randomly assigned to receive a web-based individualized precontemplation feedback (PCF), contemplation feedback (CF) or action feedback (AF) letter promoting fruit intake. Immediately and 1 week after reading this letter, post-test measures were obtained. Fruit intake increased significantly between pre- and post-test in contemplators, but not in precontemplators. No differences between the feedback conditions were found in fruit intake, stage progression, use or credibility of the feedback in precontemplators and contemplators. In precontemplators, also no differences between the conditions were found in personal relevance of the feedback. Contemplators, however, rated AF as more personally relevant than PCF or CF. To conclude, the present study failed to show superiority of stage-matched information in the promotion of fruit intake.

  14. HLAMatchmaker-based strategy to identify acceptable HLA class I mismatches for highly sensitized kidney transplant candidates.

    Science.gov (United States)

    Duquesnoy, Rene J; Witvliet, Marian; Doxiadis, Ilias I N; de Fijter, Hans; Claas, Frans H J

    2004-01-01

    HLAMatchmaker determines HLA compatibility at the level of polymorphic amino acid triplets in antibody-accessible sequence positions. Recent studies have shown that among HLA-DR-matched kidney transplants, the HLA-A,B antigen mismatches which are compatible at the triplet level have almost identical graft survival rates as the zero-HLA-A,B antigen mismatches. This finding provides the basis of a new strategy to identify HLA-mismatched organs that have similar success rates as the zero-HLA-antigen mismatches. This report describes how in conjunction with the Acceptable Mismatch program in Eurotransplant, HLAMatchmaker can expand the pool of potential donors for highly sensitized patients, for whom it is very difficult to find a compatible transplant. Sera from 35 highly sensitized kidney transplant candidates with an average PRA of 96% were screened by lymphocytotoxicity with HLA-typed panels that included cells that were selectively mismatched for one or two HLA antigens for each patient. Acceptable and unacceptable HLA-A,B antigen mismatches were determined from the serum reactivity with the cell panel. HLAMatchmaker analysis was applied to identify additional HLA class I antigens that were matched at the triplet level. For each patient, we calculated the probability of finding a donor (PFD) in the different match categories from HLA gene frequencies in the kidney donor population. The median PFD for a zero-antigen mismatch was 0.025%. Matching at the triplet level increased the median PFD to 0.037% ( P = 0.008). The median PFD was 0.058% for a 0-1-triplet mismatch and 0.226% for a 0-2-triplet mismatch. Serum screening identified acceptable antigen mismatches for 28 of 35 highly sensitized patients, and the median PFD increased to 0.307% for a zero/acceptable antigen mismatch. The application of HLAMatchmaker permitted for 33 patients (or 92%) the identification of additional antigens that were acceptable at the triplet level, and the median PFD for a zero

  15. Impact of lower- vs. upper-hemifield presentation on automatic colour-deviance detection: a visual mismatch negativity study.

    Science.gov (United States)

    Müller, Dagmar; Roeber, Urte; Winkler, István; Trujillo-Barreto, Nelson; Czigler, István; Schröger, Erich

    2012-09-07

    The automatic processing of deviances from the temporal context of the visual environment has become an important topic in visual cognitive sciences, which is often investigated using the visual mismatch negativity (vMMN). This event-related potential (ERP) component is elicited by an irregular stimulus (e.g., a red disc) presented in a series of stimuli (e.g., green discs) comprising a temporal regularity (e.g., colour repetition). We determined the influence of lower- vs. upper-hemifield presentation of the irregular stimulus on the vMMN while using whole-field stimulus displays controlling for sustained shifts in spatial attention. Deviances presented in the lower hemifield elicited a larger vMMN than the ones presented in the upper hemifield at a latency of 200-280ms. However, this asymmetry was preceded by deviance-related hemifield effects already emerging at an earlier latency (110-150ms), where upper-hemifield deviances elicited a positive potential but lower-hemifield deviances did not. With variable resolution electromagnetic tomography (VARETA) early deviance-related activity was localised to retinotopically organised regions of the visual cortex (BA 17/18) and vMMN-sources were localised to the middle/superior occipital gyrus, to higher areas along the temporal visual stream, but also to BA 17/18. We argue that the upper/lower-hemifield vMMN asymmetry relies at least partially on the hemifield-dependent differential sensitivity of early deviance-related activity generated in retinotopically organised regions of the visual cortex. However, a superior automatic processing of deviances presented in the lower visual hemifield may also contribute to the effect.

  16. Treatment referral for sex offenders based on clinical judgment versus actuarial risk assessment: match and analysis of mismatch.

    Science.gov (United States)

    Smid, Wineke J; Kamphuis, Jan Henk; Wever, Edwin C; Van Beek, Daan

    2013-07-01

    The Risk Need Responsivity (RNR) principles (Andrews & Bonta, 2010) dictate that higher risk sex offenders should receive more intensive treatment. The present study investigates how clinically based treatment assignment relates to risk level in a sex offender sample from The Netherlands. Correlational analyses served to identify sources of mismatches: that is, variables differing significantly in their relation between treatment selection and risk level. Our study sample consisted of 194 convicted rapists and 214 convicted child molesters. All participants' criminal files were retrospectively coded in terms of the items of the STATIC-99R, PCL: SV, and SVR-20. A low to moderate correlation was observed between clinical treatment selection and actuarial risk levels. A substantial part of the sex offenders, especially child molesters, received overly intensive treatment and another substantial part, especially rapists, received treatment of lesser intensity than indicated by their risk levels. General violent and antisocial risk factors seemed to be underemphasized in the clinical evaluation of sex offenders, especially rapists. A negative attitude toward intervention was negatively associated with clinical treatment selection. It is concluded that clinical treatment selection leads to an insufficient match between risk level and treatment level and systematic use of validated structured risk assessment instruments is necessary to ensure optimal adherence to the risk principle.

  17. A Novel Teaching-Learning-Based Optimization for Improved Mutagenic Primer Design in Mismatch PCR-RFLP SNP Genotyping.

    Science.gov (United States)

    Cheng, Yu-Huei

    2016-01-01

    Many single nucleotide polymorphisms (SNPs) for complex genetic diseases are genotyped by polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) in small-scale basic research studies. It is an essential work to design feasible PCR-RFLP primer pair and find out available restriction enzymes to recognize the target SNP for PCR experiments. However, many SNPs are incapable of performing PCR-RFLP makes SNP genotyping become unpractical. A genetic algorithm (GA) had been proposed for designing mutagenic primer and get available restriction enzymes, but it gives an unrefined solution in mutagenic primers. In order to improve the mutagenic primer design, we propose TLBOMPD (TLBO-based Mutagenic Primer Design) a novel computational intelligence-based method that uses the notion of "teaching and learning" to search for more feasible mutagenic primers and provide the latest available restriction enzymes. The original Wallace's formula for the calculation of melting temperature is maintained, and more accurate calculation formulas of GC-based melting temperature and thermodynamic melting temperature are introduced into the proposed method. Mutagenic matrix is also reserved to increase the efficiency of judging a hypothetical mutagenic primer if involve available restriction enzymes for recognizing the target SNP. Furthermore, the core of SNP-RFLPing version 2 is used to enhance the mining work for restriction enzymes based on the latest REBASE. Twenty-five SNPs with mismatch PCR-RFLP screened from 288 SNPs in human SLC6A4 gene are used to appraise the TLBOMPD. Also, the computational results are compared with those of the GAMPD. In the future, the usage of the mutagenic primers in the wet lab needs to been validated carefully to increase the reliability of the method. The TLBOMPD is implemented in JAVA and it is freely available at http://tlbompd.googlecode.com/.

  18. Temporal Processing Ability Is Related to Ear-Asymmetry for Detecting Time Cues in Sound: A Mismatch Negativity (MMN) Study

    Science.gov (United States)

    Todd, Juanita; Finch, Brayden; Smith, Ellen; Budd, Timothy W.; Schall, Ulrich

    2011-01-01

    Temporal and spectral sound information is processed asymmetrically in the brain with the left-hemisphere showing an advantage for processing the former and the right-hemisphere for the latter. Using monaural sound presentation we demonstrate a context and ability dependent ear-asymmetry in brain measures of temporal change detection. Our measure…

  19. Detection of CpG methylations in human mismatch repair gene hMLH1 promoter by denaturing high-performance liquid chromatography (DHPLC)

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Objectives: To develop a novel method to detect CpG methylation by DHPLC. Methods: After DNA was treated with sodium bisulfite, mismatch repair gene hMLH1 promoter was amplified by polymerase chain reaction (PCR). DHPLC was used to separate the PCR products at their partially denaturing temperatures. BstUI digestion assay was also used for comparison study. Results: A 294bp band was obtained by PCR from each DNA samples of colon cancer cell line RKO and gastric cancer cell line PACM82. These two bands could be separated completely by DHPLC at 53° C (retention time 6.7 min for RKO vs. 6.2 min for PACM82). We concluded that the hMLH1 promoter in RKO cells is methylated, while PACM82 is not methylated, since methylation can protect the conversion of C to T and keep higher C/G content after bisulfite treatment, leading to the delayed time. These results consistent with those from BstUI digestion assay. Conclusion: Methylation in CpG islands of hMLH1 could be detected conveniently by DHPLC after bisulfite modification.

  20. Zero energy buildings and mismatch compensation factors

    DEFF Research Database (Denmark)

    Lund, Henrik; Marszal, Anna Joanna; Heiselberg, Per

    2011-01-01

    This paper takes an overall energy system approach to analysing the mismatch problem of zero energy and zero emission buildings (ZEBs). The mismatch arises from hourly differences in energy production and consumption at the building level and results in the need for exchange of electricity via...... of the energy production unit. Based on historical data for the electricity supply area in western Denmark, this paper makes a first attempt to quantify mismatch compensation factors. The results indicate that such compensation factors are a little below one for buildings with photovoltaics (PV) and a little...... the public grid even though the building has an annual net-exchange of zero. This paper argues that, when looked upon from the viewpoint of the overall electricity supply system, a mismatch can be both negative and positive. Moreover, there are often both an element of levelling out mismatches between...

  1. Native and non-native speech sound processing and the neural mismatch responses: A longitudinal study on classroom-based foreign language learning.

    Science.gov (United States)

    Jost, Lea B; Eberhard-Moscicka, Aleksandra K; Pleisch, Georgette; Heusser, Veronica; Brandeis, Daniel; Zevin, Jason D; Maurer, Urs

    2015-06-01

    Learning a foreign language in a natural immersion context with high exposure to the new language has been shown to change the way speech sounds of that language are processed at the neural level. It remains unclear, however, to what extent this is also the case for classroom-based foreign language learning, particularly in children. To this end, we presented a mismatch negativity (MMN) experiment during EEG recordings as part of a longitudinal developmental study: 38 monolingual (Swiss-) German speaking children (7.5 years) were tested shortly before they started to learn English at school and followed up one year later. Moreover, 22 (Swiss-) German adults were recorded. Instead of the originally found positive mismatch response in children, an MMN emerged when applying a high-pass filter of 3 Hz. The overlap of a slow-wave positivity with the MMN indicates that two concurrent mismatch processes were elicited in children. The children's MMN in response to the non-native speech contrast was smaller compared to the native speech contrast irrespective of foreign language learning, suggesting that no additional neural resources were committed to processing the foreign language speech sound after one year of classroom-based learning.

  2. Potential for DNA-based identification of Great Lakes fauna: Match and mismatch between taxa inventories and DNA barcode libraries

    Science.gov (United States)

    DNA-based identification of mixed-organism samples offers the potential to greatly reduce the need for resource-intensive morphological identification, which would be of value both to biotic condition assessment and non-native species early-detection monitoring. However, the abi...

  3. A Mismatch EndoNuclease Array-Based Methodology (MENA for Identifying Known SNPs or Novel Point Mutations

    Directory of Open Access Journals (Sweden)

    Josep M. Comeron

    2016-04-01

    Full Text Available Accurate and rapid identification or confirmation of single nucleotide polymorphisms (SNPs, point mutations and other human genomic variation facilitates understanding the genetic basis of disease. We have developed a new methodology (called MENA (Mismatch EndoNuclease Array pairing DNA mismatch endonuclease enzymology with tiling microarray hybridization in order to genotype both known point mutations (such as SNPs as well as identify previously undiscovered point mutations and small indels. We show that our assay can rapidly genotype known SNPs in a human genomic DNA sample with 99% accuracy, in addition to identifying novel point mutations and small indels with a false discovery rate as low as 10%. Our technology provides a platform for a variety of applications, including: (1 genotyping known SNPs as well as confirming newly discovered SNPs from whole genome sequencing analyses; (2 identifying novel point mutations and indels in any genomic region from any organism for which genome sequence information is available; and (3 screening panels of genes associated with particular diseases and disorders in patient samples to identify causative mutations. As a proof of principle for using MENA to discover novel mutations, we report identification of a novel allele of the beethoven (btv gene in Drosophila, which encodes a ciliary cytoplasmic dynein motor protein important for auditory mechanosensation.

  4. A Mismatch EndoNuclease Array-Based Methodology (MENA) for Identifying Known SNPs or Novel Point Mutations

    Science.gov (United States)

    Comeron, Josep M.; Reed, Jordan; Christie, Matthew; Jacobs, Julia S.; Dierdorff, Jason; Eberl, Daniel F.; Manak, J. Robert

    2016-01-01

    Accurate and rapid identification or confirmation of single nucleotide polymorphisms (SNPs), point mutations and other human genomic variation facilitates understanding the genetic basis of disease. We have developed a new methodology (called MENA (Mismatch EndoNuclease Array)) pairing DNA mismatch endonuclease enzymology with tiling microarray hybridization in order to genotype both known point mutations (such as SNPs) as well as identify previously undiscovered point mutations and small indels. We show that our assay can rapidly genotype known SNPs in a human genomic DNA sample with 99% accuracy, in addition to identifying novel point mutations and small indels with a false discovery rate as low as 10%. Our technology provides a platform for a variety of applications, including: (1) genotyping known SNPs as well as confirming newly discovered SNPs from whole genome sequencing analyses; (2) identifying novel point mutations and indels in any genomic region from any organism for which genome sequence information is available; and (3) screening panels of genes associated with particular diseases and disorders in patient samples to identify causative mutations. As a proof of principle for using MENA to discover novel mutations, we report identification of a novel allele of the beethoven (btv) gene in Drosophila, which encodes a ciliary cytoplasmic dynein motor protein important for auditory mechanosensation. PMID:27600073

  5. Matching/Mismatching in Web-Based Learning: A Perspective Based on Cognitive Styles and Physiological Factors

    Science.gov (United States)

    Huang, Yueh-Min; Hwang, Jan-Pan; Chen, Sherry Y.

    2016-01-01

    Cognitive styles have been regarded as a crucial factor that affects the effectiveness of web-based learning (WBL). Previous research indicated that educational settings that match with students' cognitive styles can enhance students' learning performance, which is, however, linked to their emotion. Various physiological signals can be applied to…

  6. MutS recognition: Multiple mismatches and sequence context effects

    Indian Academy of Sciences (India)

    Amita Joshi; Basuthkar J Rao

    2001-12-01

    Escherichia coli MutS is a versatile repair protein that specifically recognizes not only various types of mismatches but also single stranded loops of up to 4 nucleotides in length. Specific binding, followed by the next step of tracking the DNA helix that locates hemi-methylated sites, is regulated by the conformational state of the protein as a function of ATP binding/hydrolysis. Here, we study how various molecular determinants of a heteroduplex regulate mismatch recognition by MutS, the critical first step of mismatch repair. Using classical DNase I footprinting assays, we demonstrate that the hierarchy of MutS binding to various types of mismatches is identical whether the mismatches are present singly or in multiples. Moreover, this unique hierarchy is indifferent both to the differential level of DNA helical flexibility and to the unpaired status of the mismatched bases in a heteroduplex. Surprisingly, multiple mismatches exhibit reduced affinity of binding to MutS, compared to that of a similar single mismatch. Such a reduction in the affinity might be due to sequence context effects, which we established more directly by studying two identical single mismatches in an altered sequence background. A mismatch, upon simply being flipped at the same location, elicits changes in MutS specific contacts, thereby underscoring the importance of sequence context in modulating MutS binding to mismatches.

  7. Immunity Based Worm Detection System

    Institute of Scientific and Technical Information of China (English)

    HONG Zheng; WU Li-fa; WANG Yuan-yuan

    2007-01-01

    Current worm detection methods are unable to detect multi-vector polymorphic worms effectively.Based on negative selection mechanism of the immune system,a local network worm detection system that detects worms was proposed.Normal network service requests were represented by self-strings,and the detection system used self-strings to monitor the network for anomaly.According to the properties of worm propagation,a control center correlated the anomalies detected in the form of binary trees to ensure the accuracy of worm detection.Experiments show the system to be effective in detecting the traditional as well as multi-vector polymorphic worms.

  8. The Eukaryotic Mismatch Recognition Complexes Track with the Replisome during DNA Synthesis.

    Directory of Open Access Journals (Sweden)

    Joanna E Haye

    2015-12-01

    Full Text Available During replication, mismatch repair proteins recognize and repair mispaired bases that escape the proofreading activity of DNA polymerase. In this work, we tested the model that the eukaryotic mismatch recognition complex tracks with the advancing replisome. Using yeast, we examined the dynamics during replication of the leading strand polymerase Polε using Pol2 and the eukaryotic mismatch recognition complex using Msh2, the invariant protein involved in mismatch recognition. Specifically, we synchronized cells and processed samples using chromatin immunoprecipitation combined with custom DNA tiling arrays (ChIP-chip. The Polε signal was not detectable in G1, but was observed at active origins and replicating DNA throughout S-phase. The Polε signal provided the resolution to track origin firing timing and efficiencies as well as replisome progression rates. By detecting Polε and Msh2 dynamics within the same strain, we established that the mismatch recognition complex binds origins and spreads to adjacent regions with the replisome. In mismatch repair defective PCNA mutants, we observed that Msh2 binds to regions of replicating DNA, but the distribution and dynamics are altered, suggesting that PCNA is not the sole determinant for the mismatch recognition complex association with replicating regions, but may influence the dynamics of movement. Using biochemical and genomic methods, we provide evidence that both MutS complexes are in the vicinity of the replisome to efficiently repair the entire spectrum of mutations during replication. Our data supports the model that the proximity of MutSα/β to the replisome for the efficient repair of the newly synthesized strand before chromatin reassembles.

  9. Current status of the Scandiatransplant acceptable mismatch program.

    Science.gov (United States)

    Weinreich, I D; Pedersen, F; Grunnet, N

    2013-04-01

    This article describes the Scandiatransplant Acceptable Mismatch Program (STAMP), which was set into action in 2009. The aim of STAMP is to define human leukocyte antigens (HLA) toward which the potential kidney recipient has not developed antibodies, as "acceptable mismatches" in the Scandiatransplant database. In many cases this may improve the probability for a highly immunized recipient to receive a suitable kidney graft from a deceased donor. Using data extracted from the Scandiatransplant database on the outcomes of the program after the first 3 years, 31/115 recipients included in the program have undergone transplantation. From 2008 to 2011 the mean waiting time for highly immunized patients has decreased from 42 to 37 months. Continuous evaluation and follow-up of the program is essential to improve the procedures and outcomes. Calculation of transplantability based on a given set of acceptable mismatches was added to the program in 2011, based on the historical deceased donor pool providing the possibility of a specific patient to receive a kidney through STAMP. It is still a challenge for the tissue typing laboratories to determine which detected HLA antibodies are clinical relevant. We concluded that STAMP has had the intended effects, however adjustments and improvements is an ongoing process. As an improvment of the program HLA-C was added to the STAMP search algorithm in September 2012.

  10. Metrology of ground-based satellite validation: co-location mismatch and smoothing issues of total ozone comparisons

    Directory of Open Access Journals (Sweden)

    T. Verhoelst

    2015-12-01

    Full Text Available Comparisons with ground-based correlative measurements constitute a key component in the validation of satellite data on atmospheric composition. The error budget of these comparisons contains not only the measurement errors but also several terms related to differences in sampling and smoothing of the inhomogeneous and variable atmospheric field. A versatile system for Observing System Simulation Experiments (OSSEs, named OSSSMOSE, is used here to quantify these terms. Based on the application of pragmatic observation operators onto high-resolution atmospheric fields, it allows a simulation of each individual measurement, and consequently, also of the differences to be expected from spatial and temporal field variations between both measurements making up a comparison pair. As a topical case study, the system is used to evaluate the error budget of total ozone column (TOC comparisons between GOME-type direct fitting (GODFITv3 satellite retrievals from GOME/ERS2, SCIAMACHY/Envisat, and GOME-2/MetOp-A, and ground-based direct-sun and zenith–sky reference measurements such as those from Dobsons, Brewers, and zenith-scattered light (ZSL-DOAS instruments, respectively. In particular, the focus is placed on the GODFITv3 reprocessed GOME-2A data record vs. the ground-based instruments contributing to the Network for the Detection of Atmospheric Composition Change (NDACC. The simulations are found to reproduce the actual measurements almost to within the measurement uncertainties, confirming that the OSSE approach and its technical implementation are appropriate. This work reveals that many features of the comparison spread and median difference can be understood as due to metrological differences, even when using strict co-location criteria. In particular, sampling difference errors exceed measurement uncertainties regularly at most mid- and high-latitude stations, with values up to 10 % and more in extreme cases. Smoothing difference errors only

  11. Metrology of ground-based satellite validation: co-location mismatch and smoothing issues of total ozone comparisons

    Science.gov (United States)

    Verhoelst, T.; Granville, J.; Hendrick, F.; Köhler, U.; Lerot, C.; Pommereau, J.-P.; Redondas, A.; Van Roozendael, M.; Lambert, J.-C.

    2015-12-01

    Comparisons with ground-based correlative measurements constitute a key component in the validation of satellite data on atmospheric composition. The error budget of these comparisons contains not only the measurement errors but also several terms related to differences in sampling and smoothing of the inhomogeneous and variable atmospheric field. A versatile system for Observing System Simulation Experiments (OSSEs), named OSSSMOSE, is used here to quantify these terms. Based on the application of pragmatic observation operators onto high-resolution atmospheric fields, it allows a simulation of each individual measurement, and consequently, also of the differences to be expected from spatial and temporal field variations between both measurements making up a comparison pair. As a topical case study, the system is used to evaluate the error budget of total ozone column (TOC) comparisons between GOME-type direct fitting (GODFITv3) satellite retrievals from GOME/ERS2, SCIAMACHY/Envisat, and GOME-2/MetOp-A, and ground-based direct-sun and zenith-sky reference measurements such as those from Dobsons, Brewers, and zenith-scattered light (ZSL-)DOAS instruments, respectively. In particular, the focus is placed on the GODFITv3 reprocessed GOME-2A data record vs. the ground-based instruments contributing to the Network for the Detection of Atmospheric Composition Change (NDACC). The simulations are found to reproduce the actual measurements almost to within the measurement uncertainties, confirming that the OSSE approach and its technical implementation are appropriate. This work reveals that many features of the comparison spread and median difference can be understood as due to metrological differences, even when using strict co-location criteria. In particular, sampling difference errors exceed measurement uncertainties regularly at most mid- and high-latitude stations, with values up to 10 % and more in extreme cases. Smoothing difference errors only play a role in the

  12. An analytical study of mismatched complementary media

    CERN Document Server

    Zhu, Lin; Ma, Hongru

    2016-01-01

    Complementary media (CM) interacting with arbitrarily situated obstacles are usually less discussed. In this paper, an analytical framework based on multiple scattering theory is established for analyzing such a mismatched case. As examples, CM-based devices, i.e., a superlens and superscatterer, are discussed. From an analysis, the cancellation mechanism of the mismatched CM is studied. In addition, numerical results are provided for illustration. Moreover, further study shows that such cancellation effects might rely on specific conditions. Actually, the conclusions are not restricted to any specific frequencies; they could be extended to many other areas including applications to active cloaking, antennas, and wireless power transfer.

  13. Mammalian mismatch repair

    DEFF Research Database (Denmark)

    Pena Diaz, Javier; Jiricny, Josef

    2012-01-01

    A considerable surge of interest in the mismatch repair (MMR) system has been brought about by the discovery of a link between Lynch syndrome, an inherited predisposition to cancer of the colon and other organs, and malfunction of this key DNA metabolic pathway. This review focuses on recent...... advances in our understanding of the molecular mechanisms of canonical MMR, which improves replication fidelity by removing misincorporated nucleotides from the nascent DNA strand. We also discuss the involvement of MMR proteins in two other processes: trinucleotide repeat expansion and antibody maturation...

  14. Metrology of ground-based satellite validation: co-location mismatch and smoothing issues of total ozone comparisons

    Directory of Open Access Journals (Sweden)

    T. Verhoelst

    2015-08-01

    Full Text Available Comparisons with ground-based correlative measurements constitute a key component in the validation of satellite data on atmospheric composition. The error budget of these comparisons contains not only the measurement uncertainties but also several terms related to differences in sampling and smoothing of the inhomogeneous and variable atmospheric field. A versatile system for Observing System Simulation Experiments (OSSEs, named OSSSMOSE, is used here to quantify these terms. Based on the application of pragmatic observation operators onto high-resolution atmospheric fields, it allows a simulation of each individual measurement, and consequently also of the differences to be expected from spatial and temporal field variations between both measurements making up a comparison pair. As a topical case study, the system is used to evaluate the error budget of total ozone column (TOC comparisons between on the one hand GOME-type direct fitting (GODFITv3 satellite retrievals from GOME/ERS2, SCIAMACHY/Envisat, and GOME-2/MetOp-A, and on the other hand direct-sun and zenith-sky reference measurements such as from Dobsons, Brewers, and zenith scattered light (ZSL-DOAS instruments respectively. In particular, the focus is placed on the GODFITv3 reprocessed GOME-2A data record vs. the ground-based instruments contributing to the Network for the Detection of Atmospheric Composition Change (NDACC. The simulations are found to reproduce the actual measurements almost to within the measurement uncertainties, confirming that the OSSE approach and its technical implementation are appropriate. This work reveals that many features of the comparison spread and median difference can be understood as due to metrological differences, even when using strict co-location criteria. In particular, sampling difference errors exceed measurement uncertainties regularly at most mid- and high-latitude stations, with values up to 10 % and more in extreme cases. Smoothing

  15. Machine Learning Based Malware Detection

    Science.gov (United States)

    2015-05-18

    A TRIDENT SCHOLAR PROJECT REPORT NO. 440 Machine Learning Based Malware Detection by Midshipman 1/C Zane A. Markel, USN...public release and sale; its distribution is limited. U.S.N.A. --- Trident Scholar project report; no. 440 (2015) MACHINE LEARNING BASED MALWARE...COVERED (From - To) 4. TITLE AND SUBTITLE Machine Learning Based Malware Detection 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  16. Features Based Text Similarity Detection

    CERN Document Server

    Kent, Chow Kok

    2010-01-01

    As the Internet help us cross cultural border by providing different information, plagiarism issue is bound to arise. As a result, plagiarism detection becomes more demanding in overcoming this issue. Different plagiarism detection tools have been developed based on various detection techniques. Nowadays, fingerprint matching technique plays an important role in those detection tools. However, in handling some large content articles, there are some weaknesses in fingerprint matching technique especially in space and time consumption issue. In this paper, we propose a new approach to detect plagiarism which integrates the use of fingerprint matching technique with four key features to assist in the detection process. These proposed features are capable to choose the main point or key sentence in the articles to be compared. Those selected sentence will be undergo the fingerprint matching process in order to detect the similarity between the sentences. Hence, time and space usage for the comparison process is r...

  17. Evidence for Base Substitutions and Repair of DNA Mismatch Damage Induced by Low Energy N+ Ion Beam Implantation in E. coli

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    Ever since the low energy N+ ion beam has been accepted, the mutations of ionizing radiation are attributable mainly to avoidance of DNA damages repair. Evidences based on in vivo proof results are limited. Using the E.coli wild type and mutator strains, the mutant frequencies suggest that base substitutions in rpoB gene are induced by the N+ implantation. A highly conserved region is selected to get the direct evidence for base substitutions by sequence of the high fidelity PCR amplification products in mutants. Most of the mutants (90.9%, 40/44) have at least one base substitution in the amplification region. The evidences for CG to TA (55%, 22/40), AT to GC (20%, 8/40) and TA to CG (5%, 2/40) transitions are identified. The transversions are AT to TA (15%, 6/40) and GC to CG (5%, 2/40). It is suggested that DNA cytosine methylase might play an important role in mismatch repair of DNA damage induced by N+ implantation by analysis of the mutant frequencies of mutator strains.

  18. A periodic table of symmetric tandem mismatches in RNA.

    Science.gov (United States)

    Wu, M; McDowell, J A; Turner, D H

    1995-03-14

    The stabilities and structures of a series of RNA octamers containing symmetric tandem mismatches were studied by UV melting and imino proton NMR. The free energy increments for tandem mismatch formation are found to depend upon both mismatch sequence and adjacent base pairs. The observed sequence dependence of tandem mismatch stability is UGGU > GUUG > GAAG > or = AGGA > UUUU > CAAC > or = CUUC approximately UCCU approximately CCCC approximately ACCA approximately AAAA, and the closing base pair dependence is 5'G3'C > 5'C3'G > 5'U3'A approximately 5'A3'U. These results differ from expectations based on models used in RNA folding algorithms and from the sequence dependence observed for folding of RNA hairpins. Imino proton NMR results indicate the sequence dependence is partially due to hydrogen bonding within mismatches.

  19. Optimisation of the CT h4S bioassay for detection of human interleukin-4 secreted by mononuclear cells stimulated by phytohaemaglutinin or by human leukocyte antigen mismatched mixed lymphocyte culture

    DEFF Research Database (Denmark)

    Petersen, Søren Lykke; Russell, Charlotte Astrid; Bendtzen, Klaus;

    2002-01-01

    bioassay with regards to specificity, sensitivity, detection limit, and reproducibility. We have found the optimal assay conditions to be 1 x 10 (4) CT.h4S cells/well deprived of IL-4 for 24 h and preincubated for 7 h followed by 18 h of incubation with tritiated methyl-thymidine. In this setting the CT.h4......S bioassay detects 5 pg/ml of human recombinant IL-4 with no detection of IL-2 in concentrations below 500 pg/ml. We have found 72 h of culture optimal for detection of IL-2 and IL-4 produced by human mononuclear cells (MNC) in response to stimulation with phytohaemaglutinin and for detection of IL...... of IL-4 detection was not due to high amounts of soluble IL-4 receptor. With the use of 1x10(6) responder cells/well in HLA-mismatched MLC, we found limited IL-4 accumulation still increasing at day 12. We conclude that the CT.h4S bioassay is a reliable and specific method for quantification of IL-4...

  20. Mismatch base pairing of the mutagen 8-oxoguanine and its derivatives with adenine: A theoretical search for possible antimutagenic agents

    Science.gov (United States)

    Singh, A. K.; Mishra, P. C.

    Molecular geometries of 8-oxoguanine (8OG), those of its substituted derivatives with the substitutions CH2, CF2, CO, CNH, O, and S in place of the N7H7 group, adenine (A), and the base pairs of 8OG and its substituted derivatives with adenine were optimized using the RHF/6-31+G* and B3LYP/6-31+G* methods in gas phase. All the molecules and their hydrogen-bonded complexes were solvated in aqueous media employing the polarized continuum model (PCM) of the self-consistent reaction field (SCRF) theory using the RHF/6-31+G* and B3LYP/6-31+G* methods. The optimized geometrical parameters of the 8OG-A base pair at the RHF/6-31+G* and B3LYP/6-31+G* levels of theory agree satisfactorily with those of an oligonucleotide containing the base pair found from X-ray crystallography. The pattern of hydrogen bonding in the CF2- and O-substituted 8OG-A base pair is of Watson-Crick type and that in the unsubstituted and CH2-, CNH-, and S-substituted base pairs is of Hoogsteen type. In the CO-substituted base pair, the hydrogen bonding pattern is of neither Watson-Crick nor Hoogsteen type. The CF2-substitution appears to introduce steric hindrance for stacking of DNA bases. On the basis of these results, it appears that among all the substituted 8OG molecules considered here, the O-substituted derivative may be useful as an antimutagenic drug. It is, however, subject to experimental verification. Content:text/plain; charset="UTF-8"

  1. Treatment referral for sex offenders based on clinical judgment versus actuarial risk assessment: match and analysis of mismatch

    NARCIS (Netherlands)

    Smid, W.J.; Kamphuis, J.H.; Wever, E.C.; van Beek, D.

    2013-01-01

    The Risk Need Responsivity (RNR) principles (Andrews & Bonta, 2010) dictate that higher risk sex offenders should receive more intensive treatment. The present study investigates how clinically based treatment assignment relates to risk level in a sex offender sample from The Netherlands. Correlatio

  2. The Mismatch between Students' Mental Models of Acids/Bases and their Sources and their Teacher's Anticipations thereof

    Science.gov (United States)

    Lin, Jing-Wen; Chiu, Mei-Hung

    2010-08-01

    The aim of this study is to compare the characteristics and sources of students' mental models of acids and bases with a teacher's anticipations and, based on this comparison, to explore some possible explanations why motivated students might fail to learn from a subject-knowledgeable chemistry teacher. The study involves a chemistry teacher and her 38 ninth graders and focuses on the mental models of three high achievers and three low achievers who were interviewed in depth. Four students' mental models of acid and base are identified. The mental models and sources of students' conceptions of acids and bases that influenced the high achievers are compared to those of the low achievers. We find that the teacher in the study made accurate anticipations of her students' mental models in the case of the high achievers but inaccurate anticipations of the low-achievers' mental models and the diverse sources influencing their mental models. In addition, the teacher incorrectly attributed the poor achievement of the low-achieving students to their intuition and underestimated the effects of her teaching on the achievement of these students. As a result, the teacher's instruction reinforced the low-achievers' incorrect mental models. Finally, the different approaches for teaching students with different achievements are emphasized according to the empirical data in this study.

  3. How many tautomerization pathways connect Watson-Crick-like G*·T DNA base mispair and wobble mismatches?

    Science.gov (United States)

    Brovarets', Ol'ha O; Hovorun, Dmytro M

    2015-01-01

    In this study, we have theoretically demonstrated the intrinsic ability of the wobble G·T(w)/G*·T*(w)/G·T(w1)/G·T(w2) and Watson-Crick-like G*·T(WC) DNA base mispairs to interconvert into each other via the DPT tautomerization. We have established that among all these transitions, only one single G·T(w) ↔ G*·T(WC) pathway is eligible from a biological perspective. It involves short-lived intermediate - the G·T*(WC) base mispair - and is governed by the planar, highly stable, and zwitterionic [Formula: see text] transition state stabilized by the participation of the unique pattern of the five intermolecular O6(+)H⋯O4(-), O6(+)H⋯N3(-), N1(+)H⋯N3(-), N1(+)H⋯O2(-), and N2(+)H⋯O2(-) H-bonds. This non-dissociative G·T(w) ↔ G*·T(WC) tautomerization occurs without opening of the pair: Bases within mispair remain connected by 14 different patterns of the specific intermolecular interactions that successively change each other along the IRC. Novel kinetically controlled mechanism of the thermodynamically non-equilibrium spontaneous point GT/TG incorporation errors has been suggested. The mutagenic effect of the analogues of the nucleotide bases, in particular 5-bromouracil, can be attributed to the decreasing of the barrier of the acquisition by the wobble pair containing these compounds of the enzymatically competent Watson-Crick's geometry via the intrapair mutagenic tautomerization directly in the essentially hydrophobic recognition pocket of the replication DNA-polymerase machinery. Proposed approaches are able to explain experimental data, namely growth of the rate of the spontaneous point incorporation errors during DNA biosynthesis with increasing temperature.

  4. Heterogenous mismatch-repair status in colorectal cancer

    DEFF Research Database (Denmark)

    Joost, Patrick; Veurink, Nynke; Holck, Susanne;

    2014-01-01

    , heterogenous mismatch repair protein staining in order to delineate expression patterns and underlying mechanisms. METHODS: Heterogenous staining patterns that affected at least one of the mismatch repair proteins MLH1, PMS2, MSH2 and MSH6 were identified in 14 colorectal cancers. Based on alternative...... expression patterns macro-dissected and micro-dissected tumor areas were separately analyzed for microsatellite instability and MLH1 promoter methylation. RESULTS: Heterogenous retained/lost mismatch repair protein expression could be classified as intraglandular (within or in-between glandular formations....... CONCLUSIONS: Heterogenous mismatch repair status can be demonstrated in colorectal cancer. Though rare, attention to this phenomenon is recommended since it corresponds to differences in mismatch repair status that are relevant for correct classification. VIRTUAL SLIDES: The virtual slide(s) for this article...

  5. Design and analysis of mismatch probes for long oligonucleotide microarrays

    Energy Technology Data Exchange (ETDEWEB)

    Deng, Ye; He, Zhili; Van Nostrand, Joy D.; Zhou, Jizhong

    2008-08-15

    Nonspecific hybridization is currently a major concern with microarray technology. One of most effective approaches to estimating nonspecific hybridizations in oligonucleotide microarrays is the utilization of mismatch probes; however, this approach has not been used for longer oligonucleotide probes. Here, an oligonucleotide microarray was constructed to evaluate and optimize parameters for 50-mer mismatch probe design. A perfect match (PM) and 28 mismatch (MM) probes were designed for each of ten target genes selected from three microorganisms. The microarrays were hybridized with synthesized complementary oligonucleotide targets at different temperatures (e.g., 42, 45 and 50 C). In general, the probes with evenly distributed mismatches were more distinguishable than those with randomly distributed mismatches. MM probes with 3, 4 and 5 mismatched nucleotides were differentiated for 50-mer oligonucleotide probes hybridized at 50, 45 and 42 C, respectively. Based on the experimental data generated from this study, a modified positional dependent nearest neighbor (MPDNN) model was constructed to adjust the thermodynamic parameters of matched and mismatched dimer nucleotides in the microarray environment. The MM probes with four flexible positional mismatches were designed using the newly established MPDNN model and the experimental results demonstrated that the redesigned MM probes could yield more consistent hybridizations. Conclusions: This study provides guidance on the design of MM probes for long oligonucleotides (e.g., 50 mers). The novel MPDNN model has improved the consistency for long MM probes, and this modeling method can potentially be used for the prediction of oligonucleotide microarray hybridizations.

  6. A liquid-crystal-based DNA biosensor for pathogen detection

    Science.gov (United States)

    Khan, Mashooq; Khan, Abdur Rahim; Shin, Jae-Ho; Park, Soo-Young

    2016-03-01

    A liquid-crystal (LC)-filled transmission electron microscopy (TEM) grid cell coated with the cationic surfactant dodecyltrimethylammonium bromide (DTAB), to which a single-stranded deoxyribonucleic acid probe (ssDNAprobe) was adsorbed at the LC/aqueous interface (TEMDTAB/DNA), was applied for the highly specific detection of target DNA molecules. The DTAB-coated E7 (used LC mixture) in the TEM grid (TEMDTAB) exhibited a homeotropic orientation, and changed to a planar orientation upon adsorption of the ssDNAprobe. The TEMDTAB/DNA was then exposed to complementary (target) ssDNA, which resulted in a planar-to-homeotropic configurational change of E7 that could be observed through a polarized optical microscope under crossed polarizers. The optimum adsorption density (2 μM) of ssDNAprobe enabled the detection of ≥0.05 nM complementary ssDNA. This TEMDTAB/DNA biosensor could differentiate complementary ssDNA from mismatched ssDNA as well as double-stranded DNA. It also successfully detected the genomic DNAs of the bacterium Erwinia carotovora and the fungi Rhazictonia solani. Owe to the high specificity, sensitivity, and label-free detection, this biosensor may broaden the applications of LC-based biosensors to pathogen detection.

  7. Mismatch discrimination in fluorescent in situ hybridization using different types of nucleic acids

    DEFF Research Database (Denmark)

    Fontenete, Sílvia; Joana, Barros; Pedro, Madureira

    2015-01-01

    in biological targets, Helicobacter pylori and Helicobacter acinonychis. This is also the first study where unlocked nucleic acids (UNA) were used as chemistry modification in oligonucleotides for FISH methodologies. The effectiveness in detecting the specific target and in mismatch discrimination appears...... acid monomers might be crucial to the success of the analysis. To achieve the expected accuracy in detection, FISH probes should have high binding affinity towards their complementary strands and discriminate effectively the noncomplementary strands. In this study, we investigate the effect...... of different chemical modifications in fluorescent probes on their ability to successfully detect the complementary target and discriminate the mismatched base pairs by FISH. To our knowledge, this paper presents the first study where this analysis is performed with different types of FISH probes directly...

  8. A new general model for predicting melting thermodynamics of complementary and mismatched B-form duplexes containing locked nucleic acids: application to probe design for digital PCR detection of somatic mutations.

    Science.gov (United States)

    Hughesman, Curtis; Fakhfakh, Kareem; Bidshahri, Roza; Lund, H Louise; Haynes, Charles

    2015-02-17

    Advances in real-time polymerase chain reaction (PCR), as well as the emergence of digital PCR (dPCR) and useful modified nucleotide chemistries, including locked nucleic acids (LNAs), have created the potential to improve and expand clinical applications of PCR through their ability to better quantify and differentiate amplification products, but fully realizing this potential will require robust methods for designing dual-labeled hydrolysis probes and predicting their hybridization thermodynamics as a function of their sequence, chemistry, and template complementarity. We present here a nearest-neighbor thermodynamic model that accurately predicts the melting thermodynamics of a short oligonucleotide duplexed either to its perfect complement or to a template containing mismatched base pairs. The model may be applied to pure-DNA duplexes or to duplexes for which one strand contains any number and pattern of LNA substitutions. Perturbations to duplex stability arising from mismatched DNA:DNA or LNA:DNA base pairs are treated at the Gibbs energy level to maintain statistical significance in the regressed model parameters. This approach, when combined with the model's accounting of the temperature dependencies of the melting enthalpy and entropy, permits accurate prediction of T(m) values for pure-DNA homoduplexes or LNA-substituted heteroduplexes containing one or two independent mismatched base pairs. Terms accounting for changes in solution conditions and terminal addition of fluorescent dyes and quenchers are then introduced so that the model may be used to accurately predict and thereby tailor the T(m) of a pure-DNA or LNA-substituted hydrolysis probe when duplexed either to its perfect-match template or to a template harboring a noncomplementary base. The model, which builds on classic nearest-neighbor thermodynamics, should therefore be of use to clinicians and biologists who require probes that distinguish and quantify two closely related alleles in either a

  9. Molecularly resolved label-free sensing of single nucleobase mismatches by interfacial LNA probes

    Science.gov (United States)

    Mishra, Sourav; Lahiri, Hiya; Banerjee, Siddhartha; Mukhopadhyay, Rupa

    2016-01-01

    So far, there has been no report on molecularly resolved discrimination of single nucleobase mismatches using surface-confined single stranded locked nucleic acid (ssLNA) probes. Herein, it is exemplified using a label-independent force-sensing approach that an optimal coverage of 12-mer ssLNA sensor probes formed onto gold(111) surface allows recognition of ssDNA targets with twice stronger force sensitivity than 12-mer ssDNA sensor probes. The force distributions are reproducible and the molecule-by-molecule force measurements are largely in agreement with ensemble on-surface melting temperature data. Importantly, the molecularly resolved detection is responsive to the presence of single nucleobase mismatches in target sequences. Since the labelling steps can be eliminated from protocol, and each force-based detection event occurs within milliseconds' time scale, the force-sensing assay is potentially capable of rapid detection. The LNA probe performance is indicative of versatility in terms of substrate choice - be it gold (for basic research and array-based applications) or silicon (for ‘lab-on-a-chip’ type devices). The nucleic acid microarray technologies could therefore be generally benefited by adopting the LNA films, in place of DNA. Since LNA is nuclease-resistant, unlike DNA, and the LNA-based assay is sensitive to single nucleobase mismatches, the possibilities for label-free in vitro rapid diagnostics based on the LNA probes may be explored. PMID:27025649

  10. Mechanisms and functions of DNA mismatch repair

    Institute of Scientific and Technical Information of China (English)

    Guo MinLi

    2008-01-01

    DNA mismatch repair (MMR) is a highly conserved biological pathway that plays a key role in maintaining genomic stability. The specificity of MMR is primarily for base-base mismatches and insertion/deletion mispairs generated dur-ing DNA replication and recombination. MMR also suppresses homeologous recombination and was recently shown to play a role in DNA damage signaling in eukaryotic cells. Escherichia coli MutS and MutL and their eukaryotic homo-logs, MutSα and MutLα, respectively, are key players in MMR-associated genome maintenance. Many other protein components that participate in various DNA metabolic pathways, such as PCNA and RPA, are also essential for MMR. Defects in MMR are associated with genome-wide instability, predisposition to certain types of cancer including he-reditary non-polyposis colorectal cancer, resistance to certain chemotherapeutic agents, and abnormalities in meiosis and sterility in mammalian systems.

  11. A Neuronal Model of Predictive Coding Accounting for the Mismatch Negativity

    OpenAIRE

    Wacongne, Catherine; Changeux, Jean-Pierre; Dehaene, Stanislas

    2012-01-01

    International audience; The mismatch negativity (MMN) is thought to index the activation of specialized neural networks for active prediction and deviance detection. However, a detailed neuronal model of the neurobiological mechanisms underlying the MMN is still lacking, and its computational foundations remain debated. We propose here a detailed neuronal model of auditory cortex, based on predictive coding, that accounts for the critical features of MMN. The model is entirely composed of spi...

  12. Effects of Mismatched Parameter on Chaotic Synchronization

    Institute of Scientific and Technical Information of China (English)

    PENGJiang-hua; FANGJin-qing

    2003-01-01

    Chaos-based security communication has become one of the most interesting hot subjects for research of chaotic theory in real world since. In recent years, secure communication via synchronized chaos has been intensely studied. However, in practical application it is difficult to construct two complete identical chaotic systems since there are many reasons to induce parameter mismatch between two systems (response system and drive system).

  13. Robust Control of Urban Industrial Water Mismatching Uncertain System

    Directory of Open Access Journals (Sweden)

    LI Kebai

    2013-02-01

    Full Text Available Urban industrial water system parameter fluctuation producing uncertainty may not occur in a control input channel, can be applied mismatching uncertain system to describe. Based on Lyapunov direct method and linear matrix inequality, design the urban industrial water mismatching uncertain system feedback stabilization robust control scheme. Avoid the defects that the feedback stabilization control method based on the matrix Riccati equation need to preset equation parameters, easier to solve and can reduce the conservative.

  14. Optimisation of the CT h4S bioassay for detection of human interleukin-4 secreted by mononuclear cells stimulated by phytohaemaglutinin or by human leukocyte antigen mismatched mixed lymphocyte culture

    DEFF Research Database (Denmark)

    Petersen, Søren Lykke; Russell, Charlotte Astrid; Bendtzen, Klaus;

    2002-01-01

    bioassay with regards to specificity, sensitivity, detection limit, and reproducibility. We have found the optimal assay conditions to be 1 x 10 (4) CT.h4S cells/well deprived of IL-4 for 24 h and preincubated for 7 h followed by 18 h of incubation with tritiated methyl-thymidine. In this setting the CT.h4...... of IL-4 detection was not due to high amounts of soluble IL-4 receptor. With the use of 1x10(6) responder cells/well in HLA-mismatched MLC, we found limited IL-4 accumulation still increasing at day 12. We conclude that the CT.h4S bioassay is a reliable and specific method for quantification of IL-4......Limiting dilution analysis has been used in the context of allogeneic bone marrow transplantation to determine anti-recipient interleukin-2 (IL-2) producing helper T lymphocyte precursor (HTLp) frequencies, which in several studies have been predictive of graft-versus-host disease (GVHD). Recently...

  15. Bacteriophage-Based Pathogen Detection

    Science.gov (United States)

    Ripp, Steven

    Considered the most abundant organism on Earth, at a population approaching 1031, bacteriophage, or phage for short, mediate interactions with myriad bacterial hosts that has for decades been exploited in phage typing schemes for signature identification of clinical, food-borne, and water-borne pathogens. With over 5,000 phage being morphologically characterized and grouped as to susceptible host, there exists an enormous cache of bacterial-specific sensors that has more recently been incorporated into novel bio-recognition assays with heightened sensitivity, specificity, and speed. These assays take many forms, ranging from straightforward visualization of labeled phage as they attach to their specific bacterial hosts to reporter phage that genetically deposit trackable signals within their bacterial hosts to the detection of progeny phage or other uniquely identifiable elements released from infected host cells. A comprehensive review of these and other phage-based detection assays, as directed towards the detection and monitoring of bacterial pathogens, will be provided in this chapter.

  16. Circle Detection Based on HSI Color Space

    Institute of Scientific and Technical Information of China (English)

    MAOXia; LIXing-xin; XUEYu-li

    2005-01-01

    A method based on HSI color space is presented to solve the problem of circle detection from color images. In terms of the evaluation to the edge detection method based on intensity, the edge detection based on hue is chosen to process the color image, and the simplified calculation of hue transform is discussed. Then the algorithm of circle detection based on Canny edge detection is proposed. Due to the dispersive distribution of the detected result, Hough transformation and template smooth are used in circle detection, and the proposed method gives a quite good result.

  17. Application of detecting algorithm based on network

    Institute of Scientific and Technical Information of China (English)

    张凤斌; 杨永田; 江子扬; 孙冰心

    2004-01-01

    Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively,according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithms into an intrusion detection system, and a detection algorithm based on network traffic is proposed. This algorithm is a real-time and self-study algorithm and can detect undefined intrusion behaviors effectively.

  18. Pairing Mismatched ssDNA to dsDNA Studied with Reflectometric Interference Spectroscopy Sensor

    Institute of Scientific and Technical Information of China (English)

    Qing-Qing Wu; Kai-Ge Wang; Dan Sun; Shuang Wang; Chen Zhang; Wei Zhao

    2016-01-01

    The interaction between two single-stranded DNA (ssDNA) molecules as pairing to a double-stranded DNA (dsDNA) molecule is studied by the reflectometric interference spectroscopy (RIFS) technology.A nano-porous anode alumina membrane coated an Au layer is employed as the sensor substrate.The results indicate that when there are mismatched nucleotide bases,the effective optical thicknesses (OTeff) have obvious difference,and the changes of OTeff are connected with the sensor layer thickness and the effective refractive index.It is also demonstrated that the RIFS technique can be used to precisely detect the ssDNA molecules with individual base mismatched as pairing to dsDNA.

  19. Elastic-plastic fracture mechanics of strength-mismatching

    Energy Technology Data Exchange (ETDEWEB)

    Parks, D.M.; Ganti, S.; McClintock, F.A. [Massachusetts Institute of Technology, Cambridge, MA (United States)

    1996-12-31

    Approximate solutions to stress-fields are provided for a strength-mismatched interface crack in small-scale yielding (SSY) for non-hardening and low hardening materials. Variations of local deformation intensities, characterized by a J-type contour integral, are proposed. The softer material experiences a higher deformation intensity level, J{sub S}, while the harder material sees a much lower deformation intensity level, J{sub H}, compared to that obtained from the applied J near the respective homogeneous crack-tips. For a low hardening material, the stress fields are obtained by scaling from an elastic/perfectly-plastic problem, based on an effective mismatch, M{sub eff}, which is a function of mismatch, M, and the hardening exponent, n. Triaxial stress build-up is discussed quantitatively in terms of M. The influence of strength-mismatch on cleavage fracture is discussed using Weibull statistics.

  20. Zepto-molar electrochemical detection of Brucella genome based on gold nanoribbons covered by gold nanoblooms

    Science.gov (United States)

    Rahi, Amid; Sattarahmady, Naghmeh; Heli, Hossein

    2015-12-01

    Gold nanoribbons covered by gold nanoblooms were sonoelectrodeposited on a polycrystalline gold surface at -1800 mV (vs. AgCl) with the assistance of ultrasound and co-occurrence of the hydrogen evolution reaction. The nanostructure, as a transducer, was utilized to immobilize a Brucella-specific probe and fabrication of a genosensor, and the process of immobilization and hybridization was detected by electrochemical methods, using methylene blue as a redox marker. The proposed method for detection of the complementary sequence, sequences with base-mismatched (one-, two- and three-base mismatches), and the sequence of non-complementary sequence was assayed. The fabricated genosensor was evaluated for the assay of the bacteria in the cultured and human samples without polymerase chain reactions (PCR). The genosensor could detect the complementary sequence with a calibration sensitivity of 0.40 μA dm3 mol-1, a linear concentration range of 10 zmol dm-3 to 10 pmol dm-3, and a detection limit of 1.71 zmol dm-3.

  1. 纳米粒子三明治型传感器的组装及其在 BRCA -1检测中的应用%Nanoparticles -fabricated Sandwich Biosensor for Single -mismatched BRCA -1 Detection

    Institute of Scientific and Technical Information of China (English)

    展宗瑞; 席静; 胡久平

    2016-01-01

    采用纳米磁、DNA、纳米金组装三明治型生物传感器。其中,纳米磁粒子(PMPS)用于捕获并分离目标 DNA,而被基因探针序列修饰过的纳米金(Au -NPs)则扮演识别序列及产生信号的角色,从而使目标 DNA 序列量转化为光信号,继而通过紫外分光光度计进行定量分析。这种基于纳米金修饰的 DNA 探针的新型基因诊断技术,可以用来定量检测分析目标 DNA。结果显示,这是一种非常简单经济且实用的检测单个突变基因序列的新方法。%In this study,a sandwich biosensor consisting of PMP (para -magnetic particles)/DNA /Au -NPs (gold nanoparticles)was fabricated.PMPs captured and separated target DNA while Au -NPs modified with oligonucleotide detection sequences played a role in recognition and signal production.There-fore,quantitative information concerning the target analyte was translated into a colorimetric signal,which could be easily and quantitatively measured by low -cost UV -vis spectrophotometric analysis.The results indicated that it was a very simple and economic strategy for detection of single -mismatched DNA strands.

  2. Detection Algorithm for LFM Echo of Underwater Moving Targets Based on Discrete Fractional Fourier Transform

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The mismatch between echo and replica caused by underwater moving target(UMT)'s radial velocity degrades the detection performance of the matched filter(MF) for the linear frequency modulation(LFM) signal. By using the focusing property of fractional Fourier transform(FRFT) to that signal, a detection algorithm for UMT's LFM echo based on the discrete fractional Fourier transform(DFRFT) is proposed. This algorithm is less affected by the target's radial velocity compared with the other MF detection algorithm utilizing zero radial velocity replica(ZRVR), and the mathematical relation between the output peak positions of these two algorithms exists in the case of existence of target echo. The algorithm can also estimate the target distance by using this relation. The simulation and experiment show that this algorithm's detection performance is better than or equivalent to that of the other MF algorithm utilizing ZRVR for the LFM echo of UMT with unknown radial velocity under reverberation noise background.

  3. On String Matching with Mismatches

    Directory of Open Access Journals (Sweden)

    Marius Nicolae

    2015-05-01

    Full Text Available In this paper, we consider several variants of the pattern matching with mismatches problem. In particular, given a text \\(T=t_1 t_2\\cdots t_n\\ and a pattern \\(P=p_1p_2\\cdots p_m\\, we investigate the following problems: (1 pattern matching with mismatches: for every \\(i, 1\\leq i \\leq n-m+1\\ output, the distance between \\(P\\ and \\(t_i t_{i+1}\\cdots t_{i+m-1}\\; and (2 pattern matching with \\(k\\ mismatches: output those positions \\(i\\ where the distance between \\(P\\ and \\(t_i t_{i+1}\\cdots t_{i+m-1}\\ is less than a given threshold \\(k\\. The distance metric used is the Hamming distance. We present some novel algorithms and techniques for solving these problems. We offer deterministic, randomized and approximation algorithms. We consider variants of these problems where there could be wild cards in either the text or the pattern or both. We also present an experimental evaluation of these algorithms. The source code is available at http://www.engr.uconn.edu/\\(\\sim\\man09004/kmis.zip.

  4. Edge detection based on morphological amoebas

    CERN Document Server

    Lee, Won Yeol; Kim, Se Yun; Lim, Jae Young; Lim, Dong Hoon

    2011-01-01

    Detecting the edges of objects within images is critical for quality image processing. We present an edge-detecting technique that uses morphological amoebas that adjust their shape based on variation in image contours. We evaluate the method both quantitatively and qualitatively for edge detection of images, and compare it to classic morphological methods. Our amoeba-based edge-detection system performed better than the classic edge detectors.

  5. Mismatch estimation for parallel time-interleaved sampling system based on subspace projection%基于子空间投影的并行交替采样系统误差估计

    Institute of Scientific and Technical Information of China (English)

    马仑; 廖桂生; 卢丹

    2012-01-01

    并行交替采样技术可以有效解决单片模数转换器( analog-to-digital converter,ADC)转换速率与量化精度间的矛盾,但是多通道问的失配误差将严重降低系统性能.提出了一种基于子空间投影技术的系统误差估计方法,利用多通道时延对应的频域线性相位矢量与噪声子空间的正交特性实现增益误差以及时基误差的精确估计.该方法迭代次数少,估计精度较高,对噪声以及偏置误差稳健,并且可以同时完成信号重构.仿真数据的处理结果验证了该方法的有效性.%The parallel time-interleaved sampling system can avoid the conflict between sampling race and quantization precision of a single-chip analog-to-digital converter (ADC). However, the multi-channel mismatch may degrade the performance of the system greatly. A novel multi-channel sampling system mismatch estimation method based on suhspace projection technique is presented. The method, which carries out timing and gain mismatch estimation simultaneously by exploiting the properties of the phase differences caused by the time interleaved array in frequency domain, is robust to residual offset error and noise. The effectiveness of the proposed approach is verified by simulated data.

  6. Mismatch-mediated error prone repair at the immunoglobulin genes.

    Science.gov (United States)

    Chahwan, Richard; Edelmann, Winfried; Scharff, Matthew D; Roa, Sergio

    2011-12-01

    The generation of effective antibodies depends upon somatic hypermutation (SHM) and class-switch recombination (CSR) of antibody genes by activation induced cytidine deaminase (AID) and the subsequent recruitment of error prone base excision and mismatch repair. While AID initiates and is required for SHM, more than half of the base changes that accumulate in V regions are not due to the direct deamination of dC to dU by AID, but rather arise through the recruitment of the mismatch repair complex (MMR) to the U:G mismatch created by AID and the subsequent perversion of mismatch repair from a high fidelity process to one that is very error prone. In addition, the generation of double-strand breaks (DSBs) is essential during CSR, and the resolution of AID-generated mismatches by MMR to promote such DSBs is critical for the efficiency of the process. While a great deal has been learned about how AID and MMR cause hypermutations and DSBs, it is still unclear how the error prone aspect of these processes is largely restricted to antibody genes. The use of knockout models and mice expressing mismatch repair proteins with separation-of-function point mutations have been decisive in gaining a better understanding of the roles of each of the major MMR proteins and providing further insight into how mutation and repair are coordinated. Here, we review the cascade of MMR factors and repair signals that are diverted from their canonical error free role and hijacked by B cells to promote genetic diversification of the Ig locus. This error prone process involves AID as the inducer of enzymatically-mediated DNA mismatches, and a plethora of downstream MMR factors acting as sensors, adaptors and effectors of a complex and tightly regulated process from much of which is not yet well understood.

  7. Bilayer thickness mismatch controls domain size in biomimetic membranes

    Science.gov (United States)

    Heberle, Frederick A.; Petruzielo, Robin S.; Pan, Jianjun; Drazba, Paul; Kučerka, Norbert; Standaert, Robert F.; Feigenson, Gerald W.; Katsara, John

    2013-03-01

    In order to promote functionality, cells may alter the spatial organization of membrane lipids and proteins, including separation of liquid phases into distinct domains. In model membranes, domain size and morphology depend strongly on composition and temperature, but the physicochemical mechanisms controlling them are poorly understood. Theoretical work suggests a role for interfacial energy at domain boundaries, which may be driven in part by thickness mismatch between a domain and its surrounding bilayer. However, no direct evidence linking thickness mismatch to domain size in free-standing bilayers has been reported. We describe the use of Small Angle Neutron Scattering (SANS) to detect domains in simplified lipid-only models that mimic the composition of plasma membrane. We find that domain size is controlled by the degree of acyl chain unsaturation of low-melting temperature lipids, and that this size transition is correlated to changes in the thickness mismatch between coexisting liquid phases.

  8. Native mass spectrometry provides direct evidence for DNA mismatch-induced regulation of asymmetric nucleotide binding in mismatch repair protein MutS

    NARCIS (Netherlands)

    M.C. Monti; S.X. Cohen (Serge); A. Fish (Alexander); H.H.K. Winterwerp (Herrie); A. Barendregt (Arjan); P. Friedhoff (Peter); A. Perrakis (Anastassis); A.J.R. Heck (Albert); T.K. Sixma (Titia); R.H.H. van den Heuvel (Robert); J.H.G. Lebbink (Joyce)

    2011-01-01

    textabstractThe DNA mismatch repair protein MutS recognizes mispaired bases in DNA and initiates repair in an ATP-dependent manner. Understanding of the allosteric coupling between DNA mismatch recognition and two asymmetric nucleotide binding sites at opposing sides of the MutS dimer requires ident

  9. Vision-based Vehicle Detection Survey

    Directory of Open Access Journals (Sweden)

    Alex David S

    2016-03-01

    Full Text Available Nowadays thousands of drivers and passengers were losing their lives every year on road accident, due to deadly crashes between more than one vehicle. There are number of many research focuses were dedicated to the development of intellectual driver assistance systems and autonomous vehicles over the past decade, which reduces the danger by monitoring the on-road environment. In particular, researchers attracted towards the on-road detection of vehicles in recent years. Different parameters have been analyzed in this paper which includes camera placement and the various applications of monocular vehicle detection, common features and common classification methods, motion- based approaches and nighttime vehicle detection and monocular pose estimation. Previous works on the vehicle detection listed based on camera poisons, feature based detection and motion based detection works and night time detection.

  10. Mismatch repair balances leading and lagging strand DNA replication fidelity.

    Directory of Open Access Journals (Sweden)

    Scott A Lujan

    Full Text Available The two DNA strands of the nuclear genome are replicated asymmetrically using three DNA polymerases, α, δ, and ε. Current evidence suggests that DNA polymerase ε (Pol ε is the primary leading strand replicase, whereas Pols α and δ primarily perform lagging strand replication. The fact that these polymerases differ in fidelity and error specificity is interesting in light of the fact that the stability of the nuclear genome depends in part on the ability of mismatch repair (MMR to correct different mismatches generated in different contexts during replication. Here we provide the first comparison, to our knowledge, of the efficiency of MMR of leading and lagging strand replication errors. We first use the strand-biased ribonucleotide incorporation propensity of a Pol ε mutator variant to confirm that Pol ε is the primary leading strand replicase in Saccharomyces cerevisiae. We then use polymerase-specific error signatures to show that MMR efficiency in vivo strongly depends on the polymerase, the mismatch composition, and the location of the mismatch. An extreme case of variation by location is a T-T mismatch that is refractory to MMR. This mismatch is flanked by an AT-rich triplet repeat sequence that, when interrupted, restores MMR to > 95% efficiency. Thus this natural DNA sequence suppresses MMR, placing a nearby base pair at high risk of mutation due to leading strand replication infidelity. We find that, overall, MMR most efficiently corrects the most potentially deleterious errors (indels and then the most common substitution mismatches. In combination with earlier studies, the results suggest that significant differences exist in the generation and repair of Pol α, δ, and ε replication errors, but in a generally complementary manner that results in high-fidelity replication of both DNA strands of the yeast nuclear genome.

  11. Linear feature detection based on ridgelet

    Institute of Scientific and Technical Information of China (English)

    HOU; Biao; (侯彪); LIU; Fang; (刘芳); JIAO; Licheng; (焦李成)

    2003-01-01

    Linear feature detection is very important in image processing. The detection efficiency will directly affect the perfomance of pattern recognition and pattern classification. Based on the idea of ridgelet, this paper presents a new discrete localized ridgelet transform and a new method for detecting linear feature in anisotropic images. Experimental results prove the efficiency of the proposed method.

  12. Image Edge Detection Based on Oscillation

    Institute of Scientific and Technical Information of China (English)

    FAN Hong; WANG Zhi-jie

    2005-01-01

    A new method for image edge detection based on a pulse neural network is proposed in this paper. The network is locally connected. The external input of each neuron of the network is gray value of the corresponding pixel. The synchrony of the neuron and its neighbors is detected by detection neurons. The edge of the image can be read off at minima of the total activity of the detection neurons.

  13. Signature Based Intrusion Detection System Using SNORT

    Directory of Open Access Journals (Sweden)

    Vinod Kumar

    2012-11-01

    Full Text Available Now a day’s Intrusion Detection systems plays very important role in Network security. As the use of internet is growing rapidly the possibility of attack is also increasing in that ratio. People are using signature based IDS’s. Snort is mostly used signature based IDS because of it is open source software. World widely it is used in intrusion detection and prevention domain. Basic analysis and security engine (BASE is also used to see the alerts generated by Snort. In the paper we have implementation the signature based intrusion detection using Snort. Our work will help to novel user to understand the concept of Snort based IDS.

  14. Does the tautomeric status of the adenine bases change upon the dissociation of the A*·A(syn) Topal-Fresco DNA mismatch? A combined QM and QTAIM atomistic insight.

    Science.gov (United States)

    Brovarets', Ol'ha O; Zhurakivsky, Roman O; Hovorun, Dmytro M

    2014-02-28

    We have scrupulously explored the tautomerisation mechanism via the double proton transfer of the A*·A(syn) Topal-Fresco base mispair (C(s) symmetry), formed by the imino and amino tautomers of the adenine DNA base in the anti- and syn-conformations, respectively, bridging quantum-mechanical calculations with Bader's quantum theory of atoms in molecules. It was found that the A*·A(syn) ↔ A·A*(syn) tautomerisation is the asynchronous concerted process. It was established that the A*·A(syn) DNA mismatch is stabilized by the N6H···N6 (6.35) and N1H···N7 (6.17) hydrogen (H) bonds, whereas the A·A*(syn) base mispair (Cs) by the N6H···N6 (8.82) and N7H···N1 (9.78) H-bonds and the C8H···HC2 HH-bond (0.30 kcal mol(-1)). Using the sweeps of the energies of the intermolecular H-bonds, it was observed that the N6H···N6 and N1H···N7/N7H···N1 H-bonds are anti-cooperative and mutually weaken each other in the A*·A(syn) and A·A*(syn) mispairs. It was revealed that the A·A*(syn) DNA mismatch is a dynamically unstable structure with a short lifetime of 1.12 × 10(-13) s and any of its 6 low-frequency intermolecular vibrations can develop during this period of time. This observation makes it impossible to change the tautomeric status of the A bases upon the dissociation of the A*·A(syn) base mispair into the monomers during DNA replication.

  15. Optical flow based finger stroke detection

    Science.gov (United States)

    Zhu, Zhongdi; Li, Bin; Wang, Kongqiao

    2010-07-01

    Finger stroke detection is an important topic in hand based Human Computer Interaction (HCI) system. Few research studies have carried out effective solutions to this problem. In this paper, we present a novel approach for stroke detection based on mono vision. Via analyzing the optical flow field within the finger area, our method is able to detect finger stroke under various camera position and visual angles. We present a thorough evaluation for each component of the algorithm, and show its efficiency and effectiveness on solving difficult stroke detection problems.

  16. Daytime Water Detection Based on Sky Reflections

    Science.gov (United States)

    Rankin, Arturo; Matthies, Larry; Bellutta, Paolo

    2011-01-01

    A water body s surface can be modeled as a horizontal mirror. Water detection based on sky reflections and color variation are complementary. A reflection coefficient model suggests sky reflections dominate the color of water at ranges > 12 meters. Water detection based on sky reflections: (1) geometrically locates the pixel in the sky that is reflecting on a candidate water pixel on the ground (2) predicts if the ground pixel is water based on color similarity and local terrain features. Water detection has been integrated on XUVs.

  17. Image edge detection based on beamlet transform

    Institute of Scientific and Technical Information of China (English)

    Li Jing; Huang Peikang; Wang Xiaohu; Pan Xudong

    2009-01-01

    Combining beamlet transform with steerable filters, a new edge detection method based on line gra-dient is proposed. Compared with operators based on point local properties, the edge-detection results with this method achieve higher SNR and position accuracy, and are quite helpful for image registration, object identification, etc. Some edge-detection experiments on optical and SAR images that demonstrate the significant improvement over classical edge operators are also presented. Moreover, the template matching result based on edge information of optical reference image and SAR image also proves the validity of this method.

  18. BEPS Action 2: Neutralizing the Effects on Hybrid Mismatch Arrangements

    NARCIS (Netherlands)

    de Boer, R.; Marres, O.

    2015-01-01

    Curbing tax arbitrage is one of the main priorities of the Organization for Economic Cooperation and Development (OECD) (endorsed by the G20 and the G8) ever since the public debate on base erosion fully erupted. Neutralizing the effect of hybrid mismatch arrangements has become Action No. 2 of the

  19. Photonic crystal fiber based antibody detection

    DEFF Research Database (Denmark)

    Duval, A; Lhoutellier, M; Jensen, J B

    2004-01-01

    An original approach for detecting labeled antibodies based on strong penetration photonic crystal fibers is introduced. The target antibody is immobilized inside the air-holes of a photonic crystal fiber and the detection is realized by the means of evanescent-wave fluorescence spectroscopy...

  20. Immune based computer virus detection approaches

    Institute of Scientific and Technical Information of China (English)

    TAN Ying; ZHANG Pengtao

    2013-01-01

    The computer virus is considered one of the most horrifying threats to the security of computer systems worldwide.The rapid development of evasion techniques used in virus causes the signature based computer virus detection techniques to be ineffective.Many novel computer virus detection approaches have been proposed in the past to cope with the ineffectiveness,mainly classified into three categories:static,dynamic and heuristics techniques.As the natural similarities between the biological immune system (BIS),computer security system (CSS),and the artificial immune system (AIS) were all developed as a new prototype in the community of anti-virus research.The immune mechanisms in the BIS provide the opportunities to construct computer virus detection models that are robust and adaptive with the ability to detect unseen viruses.In this paper,a variety of classic computer virus detection approaches were introduced and reviewed based on the background knowledge of the computer virus history.Next,a variety of immune based computer virus detection approaches were also discussed in detail.Promising experimental results suggest that the immune based computer virus detection approaches were able to detect new variants and unseen viruses at lower false positive rates,which have paved a new way for the anti-virus research.

  1. Photonic crystal fiber based antibody detection

    OpenAIRE

    Duval, A.; Lhoutellier, M; Jensen, J. B.; Hoiby, P E; Missier, V; Pedersen, L. H.; Hansen, Theis Peter; Bjarklev, Anders Overgaard; Bang, Ole

    2004-01-01

    An original approach for detecting labeled antibodies based on strong penetration photonic crystal fibers is introduced. The target antibody is immobilized inside the air-holes of a photonic crystal fiber and the detection is realized by the means of evanescent-wave fluorescence spectroscopy and the use of a transversal illumination setup.

  2. Sociolect-Based Community Detection

    Energy Technology Data Exchange (ETDEWEB)

    Reynolds, William N.; Salter, William J.; Farber, Robert M.; Corley, Courtney D.; Dowling, Chase P.; Beeman, William O.; Smith-Lovin, Lynn; Choi, Joon Nak

    2013-06-06

    "Sociolects" are specialized vocabularies used by social subgroups defined by common interests or origins. We applied methods to retrieve large quantities of Twitter data based on expert-identified sociolects and then applied and developed network-analysis methods to relate sociolect use to network (sub-) structure. We show that novel methods including consideration of node populations, as well as edge counts, provide substantially enhanced performance compared to standard assortativity. We explain these methods, show their utility in analyzing large corpora of social media data, and discuss their further extensions and potential applications.

  3. Modelling trial-by-trial changes in the mismatch negativity.

    Directory of Open Access Journals (Sweden)

    Falk Lieder

    Full Text Available The mismatch negativity (MMN is a differential brain response to violations of learned regularities. It has been used to demonstrate that the brain learns the statistical structure of its environment and predicts future sensory inputs. However, the algorithmic nature of these computations and the underlying neurobiological implementation remain controversial. This article introduces a mathematical framework with which competing ideas about the computational quantities indexed by MMN responses can be formalized and tested against single-trial EEG data. This framework was applied to five major theories of the MMN, comparing their ability to explain trial-by-trial changes in MMN amplitude. Three of these theories (predictive coding, model adjustment, and novelty detection were formalized by linking the MMN to different manifestations of the same computational mechanism: approximate Bayesian inference according to the free-energy principle. We thereby propose a unifying view on three distinct theories of the MMN. The relative plausibility of each theory was assessed against empirical single-trial MMN amplitudes acquired from eight healthy volunteers in a roving oddball experiment. Models based on the free-energy principle provided more plausible explanations of trial-by-trial changes in MMN amplitude than models representing the two more traditional theories (change detection and adaptation. Our results suggest that the MMN reflects approximate Bayesian learning of sensory regularities, and that the MMN-generating process adjusts a probabilistic model of the environment according to prediction errors.

  4. Collaborative regression-based anatomical landmark detection

    Science.gov (United States)

    Gao, Yaozong; Shen, Dinggang

    2015-12-01

    Anatomical landmark detection plays an important role in medical image analysis, e.g. for registration, segmentation and quantitative analysis. Among the various existing methods for landmark detection, regression-based methods have recently attracted much attention due to their robustness and efficiency. In these methods, landmarks are localised through voting from all image voxels, which is completely different from the classification-based methods that use voxel-wise classification to detect landmarks. Despite their robustness, the accuracy of regression-based landmark detection methods is often limited due to (1) the inclusion of uninformative image voxels in the voting procedure, and (2) the lack of effective ways to incorporate inter-landmark spatial dependency into the detection step. In this paper, we propose a collaborative landmark detection framework to address these limitations. The concept of collaboration is reflected in two aspects. (1) Multi-resolution collaboration. A multi-resolution strategy is proposed to hierarchically localise landmarks by gradually excluding uninformative votes from faraway voxels. Moreover, for informative voxels near the landmark, a spherical sampling strategy is also designed at the training stage to improve their prediction accuracy. (2) Inter-landmark collaboration. A confidence-based landmark detection strategy is proposed to improve the detection accuracy of ‘difficult-to-detect’ landmarks by using spatial guidance from ‘easy-to-detect’ landmarks. To evaluate our method, we conducted experiments extensively on three datasets for detecting prostate landmarks and head & neck landmarks in computed tomography images, and also dental landmarks in cone beam computed tomography images. The results show the effectiveness of our collaborative landmark detection framework in improving landmark detection accuracy, compared to other state-of-the-art methods.

  5. Power Consumption Based Android Malware Detection

    Directory of Open Access Journals (Sweden)

    Hongyu Yang

    2016-01-01

    Full Text Available In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. Firstly, the mobile battery consumption status information was obtained, and the Gaussian mixture model (GMM was built by using Mel frequency cepstral coefficients (MFCC. Then, the GMM was used to analyze power consumption; malicious software can be classified and detected through classification processing. Experiment results demonstrate that the function of an application and its power consumption have a close relationship, and our method can detect some typical malicious application software accurately.

  6. Brain functional network analysis based on mismatch negativity%基于失匹配负波的大脑功能性网络分析

    Institute of Scientific and Technical Information of China (English)

    许学添; 齐德昱; 蔡跃新

    2016-01-01

    根据正常人与听力损伤患者的失匹配负波(MMN)数据建立大脑功能性网络,计算该大脑功能性网络的复杂网络统计特性,发现所建立的功能性网络相对于随机网络具有类似无标度特性,而且具有高聚类系数、小特征路径长度的小世界网络特性;另外,还计算了功能性网络的平均度和网络结构熵,结果发现正常人的功能性网络的平均度、聚类系数、结构熵等参数均高于听力损伤患者的相应参数,提示了听力损伤后脑功能网络连接减弱可能是声源分辨能力下降的中枢表现,同时也反映了平均度、聚类系数、结构熵等功能性网络参数可作为反应听力损伤后声源分辨能力下降的诊断标志。%It establishes a functional brain network according to the Mismatch Negative(MMN)wave data of normal people and patients with hearing impairment. With calculated the complex networks statistical characteristics of the functional brain network, it finds that the established functional brain network has similar no scaling properties with respect to the random network, but also has high clustering coefficient, small characteristic path lengths of small world network charac-teristics. In addition, the average degree of functional network and network structure entropy are calculated. The results show that the average degree, clustering coefficient and structure entropy of the functional network are higher than those of the patients with hearing impairment. It indicates the reduction of functional connectivity after hearing loss may contribute to the decreased spatial discrimination. The functional network parameters of average degree, clustering coefficient and network structure entropy may be considered as the central markers with reflecting the capability of spatial discrimination.

  7. EFFICIENT IRIS SEGMENTATION BASED ON EYELID DETECTION

    Directory of Open Access Journals (Sweden)

    ABDULJALIL RADMAN

    2013-08-01

    Full Text Available This paper proposes a computationally efficient eyelid detection algorithm for detecting eyelid boundaries in iris images acquired under less constrained imaging conditions. The proposed eyelid detection algorithm is developed based on the live-wire technique. The major advantage of the proposed algorithm is its computational simplicity as compared to the prior eyelid detection algorithms. The saturation color features of the sclera region of the HSI color space of the iris image are exploited to determine the two intersection points between each eyelid and the outer iris boundary. The strongly connected edges between these two points are detected using the live wire technique that is likely to be the eyelid boundary. The experimental results obtained from UBIRIS.v1 database reveal that the eyelid detection algorithm which proposed in this paper improves the segmentation accuracy for the less constrained iris images.

  8. Grey-theory based intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    Qin Boping; Zhou Xianwei; Yang Jun; Song Cunyi

    2006-01-01

    To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling.With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.

  9. Discriminating DNA mismatches by electrochemical and gravimetric techniques.

    Science.gov (United States)

    Mazouz, Zouhour; Fourati, Najla; Zerrouki, Chouki; Ommezine, Asma; Rebhi, Lamia; Yaakoubi, Nourdin; Kalfat, Rafik; Othmane, Ali

    2013-10-15

    A silicon nitride functionalized electrode and a 104 MHz lithium tantalate (LiTaO₃) surface acoustic wave (SAW) sensor have been used to investigate target-probe recognition processes. Electrochemical and gravimetric measurements have been considered to monitor hybridization of single base mismatch (SBM) in synthetic oligonucleotides and single-nucleotide polymorphisms ApoE in real clinical genotypes. Obvious discrimination of SBM in nucleotides has been shown by both gravimetric and electrochemical techniques, without labeling nor amplification. Investigations on mismatches nature and position have also been considered. For guanine-adenine (GA), guanine-thymine (GT) and guanine-guanine (GG) mismatches, the sensors responses present a dependence upon positions. Considering the capacitance variations and hybridization rates, results showed that gravimetric transduction is more sensitive than electrochemical one. Moreover, the highest value of GT hybridization rate (in the middle position) was found in accordance with the nearest-neighbor model, where the considered configuration appears as the most thermodynamically stable. For the real samples, where the electrochemical transduction, by combining capacitance and flat-band potential measurements, were found more sensitive, the results show that the realized sensor permits an unambiguous discrimination of recognition between fully complementary, non-complementary and single base mismatched targets, and even between the combination of differently matched strands.

  10. Single-stranded DNA detection by solvent-induced assemblies of a metallo-peptide-based complex

    Science.gov (United States)

    Das, Priyadip; Reches, Meital

    2016-05-01

    DNA detection is highly important for the sensitive sensing of different pathogenic bacteria and viruses. The major challenge is to create a sensor that can selectively detect very small concentrations of DNA without the need for amplification or complicated equipment. Different technologies such as optical, electrochemical and microgravimetric approaches can detect DNA fragments. Here we show, for the first time, the use of self-assembled nanostructures generated by a metallo-peptide as an optical sensing platform for DNA detection. The system can selectively detect single stranded DNA fragments by fluorescence measurements as it can discriminate even one base mismatch and can perform in the presence of other interfering proteins. This system may be useful in lab-on-a-chip applications.DNA detection is highly important for the sensitive sensing of different pathogenic bacteria and viruses. The major challenge is to create a sensor that can selectively detect very small concentrations of DNA without the need for amplification or complicated equipment. Different technologies such as optical, electrochemical and microgravimetric approaches can detect DNA fragments. Here we show, for the first time, the use of self-assembled nanostructures generated by a metallo-peptide as an optical sensing platform for DNA detection. The system can selectively detect single stranded DNA fragments by fluorescence measurements as it can discriminate even one base mismatch and can perform in the presence of other interfering proteins. This system may be useful in lab-on-a-chip applications. Electronic supplementary information (ESI) available: Peptide and receptor synthesis, characterization of the final and intermediate products, experimental details and additional figures including SEM, TEM, DLS, XRD, UV analysis and AFM topographic analysis. See DOI: 10.1039/c5nr07714a

  11. Sensitive detection of point mutation by electrochemiluminescence and DNA ligase-based assay

    Science.gov (United States)

    Zhou, Huijuan; Wu, Baoyan

    2008-12-01

    The technology of single-base mutation detection plays an increasingly important role in diagnosis and prognosis of genetic-based diseases. Here we reported a new method for the analysis of point mutations in genomic DNA through the integration of allele-specific oligonucleotide ligation assay (OLA) with magnetic beads-based electrochemiluminescence (ECL) detection scheme. In this assay the tris(bipyridine) ruthenium (TBR) labeled probe and the biotinylated probe are designed to perfectly complementary to the mutant target, thus a ligation can be generated between those two probes by Taq DNA Ligase in the presence of mutant target. If there is an allele mismatch, the ligation does not take place. The ligation products are then captured onto streptavidin-coated paramagnetic beads, and detected by measuring the ECL signal of the TBR label. Results showed that the new method held a low detection limit down to 10 fmol and was successfully applied in the identification of point mutations from ASTC-α-1, PANC-1 and normal cell lines in codon 273 of TP53 oncogene. In summary, this method provides a sensitive, cost-effective and easy operation approach for point mutation detection.

  12. The nature of the transition mismatches with Watson-Crick architecture: the G*·T or G·T* DNA base mispair or both? A QM/QTAIM perspective for the biological problem.

    Science.gov (United States)

    Brovarets', Ol'ha O; Hovorun, Dmytro M

    2015-01-01

    This study provides the first accurate investigation of the tautomerization of the biologically important guanine*·thymine (G*·T) DNA base mispair with Watson-Crick geometry, involving the enol mutagenic tautomer of the G and the keto tautomer of the T, into the G·T* mispair (∆G = .99 kcal mol(-1), population = 15.8% obtained at the MP2 level of quantum-mechanical theory in the continuum with ε = 4), formed by the keto tautomer of the G and the enol mutagenic tautomer of the T base, using DFT and MP2 methods in vacuum and in the weakly polar medium (ε = 4), characteristic for the hydrophobic interfaces of specific protein-nucleic acid interactions. We were first able to show that the G*·T↔G·T* tautomerization occurs through the asynchronous concerted double proton transfer along two antiparallel O6H···O4 and N1···HN3 H-bonds and is assisted by the third N2H···O2 H-bond, that exists along the entire reaction pathway. The obtained results indicate that the G·T* base mispair is stable from the thermodynamic point of view complex, while it is dynamically unstable structure in vacuum and dynamically stable structure in the continuum with ε = 4 with lifetime of 6.4·10(-12) s, that, on the one side, makes it possible to develop all six low-frequency intermolecular vibrations, but, on the other side, it is by three orders less than the time (several ns) required for the replication machinery to forcibly dissociate a base pair into the monomers during DNA replication. One of the more significant findings to emerge from this study is that the short-lived G·T* base mispair, which electronic interaction energy between the bases (-23.76 kcal mol(-1)) exceeds the analogical value for the G·C Watson-Crick nucleobase pair (-20.38 kcal mol(-1)), "escapes from the hands" of the DNA replication machinery by fast transforming into the G*·T mismatch playing an indirect role of its supplier during the DNA replication. So

  13. Pedestrian detection based on redundant wavelet transform

    Science.gov (United States)

    Huang, Lin; Ji, Liping; Hu, Ping; Yang, Tiejun

    2016-10-01

    Intelligent video surveillance is to analysis video or image sequences captured by a fixed or mobile surveillance camera, including moving object detection, segmentation and recognition. By using it, we can be notified immediately in an abnormal situation. Pedestrian detection plays an important role in an intelligent video surveillance system, and it is also a key technology in the field of intelligent vehicle. So pedestrian detection has very vital significance in traffic management optimization, security early warn and abnormal behavior detection. Generally, pedestrian detection can be summarized as: first to estimate moving areas; then to extract features of region of interest; finally to classify using a classifier. Redundant wavelet transform (RWT) overcomes the deficiency of shift variant of discrete wavelet transform, and it has better performance in motion estimation when compared to discrete wavelet transform. Addressing the problem of the detection of multi-pedestrian with different speed, we present an algorithm of pedestrian detection based on motion estimation using RWT, combining histogram of oriented gradients (HOG) and support vector machine (SVM). Firstly, three intensities of movement (IoM) are estimated using RWT and the corresponding areas are segmented. According to the different IoM, a region proposal (RP) is generated. Then, the features of a RP is extracted using HOG. Finally, the features are fed into a SVM trained by pedestrian databases and the final detection results are gained. Experiments show that the proposed algorithm can detect pedestrians accurately and efficiently.

  14. Mismatching Perspectives and Pacific Transculturality

    Directory of Open Access Journals (Sweden)

    Anne Holden Rønning

    2013-01-01

    Full Text Available Increased critical consciousness and awareness of interculturality in a global and glocal context at the beginning of the twenty-first century has increasingly used the concept of transculturation when discussing modernities. Politically transculturation can be used to describe processes of negotiation in contemporary society that lead to social awareness and solidarity, as well as ensuring the continuity of societies. The fusing of cultural forms leads to a mismatching of perspectives, hence some critics have preferred to use the terms translation and/or transliteracy to describe this concept. Transculturation is related to the “normal processes of artistic borrowing and influence, by which any culture makes part of its contribution to the conversation of mankind,” as Les Murray maintained, and “it engages multiple lines of difference simultaneously” with overlapping boundaries (Rogers 491. Referring to various authors and linking it to cultural appropriation and border crossings, this article examines how the narrative expression of Both Sides of the Moon, to cite the title of Alan Duff’s book, is a key feature of Pacific writing, in an area where centuries of migration from near and far have exposed different cultures to each other on social, political, linguistic and aesthetic levels. These ‘contact zones’, to use Mary Pratt’s words, provide the reader with constantly moving translated identities, cultural hybridity and a use of language that has a highly local significance in a global context.

  15. Oblique effect in visual mismatch negativity

    Directory of Open Access Journals (Sweden)

    Endre eTakács

    2013-09-01

    Full Text Available We investigated whether visual orientation anisotropies (known as oblique effect exist in non-attended visual changes using event-related potentials (ERP. We recorded visual mismatch negativity (vMMN which signals violation of sequential regularities. In the visual periphery unattended, task-irrelevant Gábor patches were displayed in an oddball sequence while subjects performed a tracking task in the central field. A moderate change (50° in the orientation of stimuli revealed no consistent change-related components. However we found orientation-related differences around 170 ms in occipito-temporal areas in the amplitude of the ERPs evoked by standard stimuli. In a supplementary experiment we determined the amount of orientation difference that is needed for change detection in an active, attended paradigm. Results exhibited the classical oblique effect; subjects detected 10° deviations from cardinal directions, while threshold from oblique directions was 17°. These results provide evidence that perception of change could be accomplished at significantly smaller thresholds, than what elicits vMMN. In Experiment2 we increased the orientation change to 90°. Deviant-minus-standard difference was negative in occipito-parietal areas, between 120-200 ms after stimulus onset. VMMNs to changes from cardinal angles were larger and more sustained than vMMNs evoked by changes from oblique angles. Changes from cardinal orientations represent a more detectable signal for the automatic change detection system than changes from oblique angles, thus increased vMMN to these larger deviances might be considered a variant of the magnitude of deviance effect rarely observed in vMMN studies.

  16. Dictionary based Approach to Edge Detection

    CERN Document Server

    Chandra, Nitish

    2015-01-01

    Edge detection is a very essential part of image processing, as quality and accuracy of detection determines the success of further processing. We have developed a new self learning technique for edge detection using dictionary comprised of eigenfilters constructed using features of the input image. The dictionary based method eliminates the need of pre or post processing of the image and accounts for noise, blurriness, class of image and variation of illumination during the detection process itself. Since, this method depends on the characteristics of the image, the new technique can detect edges more accurately and capture greater detail than existing algorithms such as Sobel, Prewitt Laplacian of Gaussian, Canny method etc which use generic filters and operators. We have demonstrated its application on various classes of images such as text, face, barcodes, traffic and cell images. An application of this technique to cell counting in a microscopic image is also presented.

  17. Recent advances in biosensor based endotoxin detection.

    Science.gov (United States)

    Das, A P; Kumar, P S; Swain, S

    2014-01-15

    Endotoxins also referred to as pyrogens are chemically lipopolysaccharides habitually found in food, environment and clinical products of bacterial origin and are unavoidable ubiquitous microbiological contaminants. Pernicious issues of its contamination result in high mortality and severe morbidities. Standard traditional techniques are slow and cumbersome, highlighting the pressing need for evoking agile endotoxin detection system. The early and prompt detection of endotoxin assumes prime importance in health care, pharmacological and biomedical sectors. The unparalleled recognition abilities of LAL biosensors perched with remarkable sensitivity, high stability and reproducibility have bestowed it with persistent reliability and their possible fabrication for commercial applicability. This review paper entails an overview of various trends in current techniques available and other possible alternatives in biosensor based endotoxin detection together with its classification, epidemiological aspects, thrust areas demanding endotoxin control, commercially available detection sensors and a revolutionary unprecedented approach narrating the influence of omics for endotoxin detection.

  18. Web Based Cross Language Plagiarism Detection

    CERN Document Server

    Kent, Chow Kok

    2009-01-01

    As the Internet help us cross language and cultural border by providing different types of translation tools, cross language plagiarism, also known as translation plagiarism are bound to arise. Especially among the academic works, such issue will definitely affect the student's works including the quality of their assignments and paper works. In this paper, we propose a new approach in detecting cross language plagiarism. Our web based cross language plagiarism detection system is specially tuned to detect translation plagiarism by implementing different techniques and tools to assist the detection process. Google Translate API is used as our translation tool and Google Search API, which is used in our information retrieval process. Our system is also integrated with the fingerprint matching technique, which is a widely used plagiarism detection technique. In general, our proposed system is started by translating the input documents from Malay to English, followed by removal of stop words and stemming words, ...

  19. DNA Mismatch Repair and Oxidative DNA Damage: Implications for Cancer Biology and Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Bridge, Gemma; Rashid, Sukaina; Martin, Sarah A., E-mail: sarah.martin@qmul.ac.uk [Centre for Molecular Oncology, Barts Cancer Institute, Queen Mary University of London, Charterhouse Square, London EC1M 6BQ (United Kingdom)

    2014-08-05

    Many components of the cell, including lipids, proteins and both nuclear and mitochondrial DNA, are vulnerable to deleterious modifications caused by reactive oxygen species. If not repaired, oxidative DNA damage can lead to disease-causing mutations, such as in cancer. Base excision repair and nucleotide excision repair are the two DNA repair pathways believed to orchestrate the removal of oxidative lesions. However, recent findings suggest that the mismatch repair pathway may also be important for the response to oxidative DNA damage. This is particularly relevant in cancer where mismatch repair genes are frequently mutated or epigenetically silenced. In this review we explore how the regulation of oxidative DNA damage by mismatch repair proteins may impact on carcinogenesis. We discuss recent studies that identify potential new treatments for mismatch repair deficient tumours, which exploit this non-canonical role of mismatch repair using synthetic lethal targeting.

  20. Compensation of IQ mismatch in optical PDM-OFDM coherent receivers

    Science.gov (United States)

    Chung, Hwan Seok; Chang, Sun Hyok; Kim, Kwangjoon

    2010-10-01

    The performance enhancements based on Gram-Schmidt orthogonalization procedure (GSOP) for compensating IQ mismatch in coherent optical orthogonal frequency division multiplexing (CO-OFDM) systems are investigated. We analytically explore IQ mismatch in optical OFDM systems and investigate the impacts of phase and amplitude IQ mismatch on required optical signal-to-noise ratio (OSNR) for the different values of data mapping and polarization multiplexing. The impacts of analog-to-digital converter (ADC) resolution and the number of samples in GSOP are also evaluated. The results show that the GSOP operation efficiently compensate IQ mismatch induced performance degradations regardless of the amount of IQ phase mismatch, density of data mapping, and polarization multiplexing.

  1. Cluster based Intrusion Detection System for Manets

    Directory of Open Access Journals (Sweden)

    Nisha Dang

    2012-07-01

    Full Text Available Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. They communicate in dynamic topology which continuously changes as nodes are not stable. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. But still there is some scope of malicious actions. So, Intrusion detection systems are proposed to detect any intruder in the network and its malicious activities. Cluster based intrusion detection system is also designed to restrict the intruders activities in clusters of mobile nodes. In clusters each node run some intrusion detection code to detect local as well as global intrusion. In this paper we have taken insight of intrusion detection systems and different attacks on Manet security. Then we proposed how overhead involved in cluster based intrusion detection system can be reduced.

  2. Spatio-activity based object detection

    CERN Document Server

    Springett, Jarrad

    2008-01-01

    We present the SAMMI lightweight object detection method which has a high level of accuracy and robustness, and which is able to operate in an environment with a large number of cameras. Background modeling is based on DCT coefficients provided by cameras. Foreground detection uses similarity in temporal characteristics of adjacent blocks of pixels, which is a computationally inexpensive way to make use of object coherence. Scene model updating uses the approximated median method for improved performance. Evaluation at pixel level and application level shows that SAMMI object detection performs better and faster than the conventional Mixture of Gaussians method.

  3. Seizure detection algorithms based on EMG signals

    DEFF Research Database (Denmark)

    Conradsen, Isa

    Background: the currently used non-invasive seizure detection methods are not reliable. Muscle fibers are directly connected to the nerves, whereby electric signals are generated during activity. Therefore, an alarm system on electromyography (EMG) signals is a theoretical possibility. Objective...... on the amplitude of the signal. The other algorithm was based on information of the signal in the frequency domain, and it focused on synchronisation of the electrical activity in a single muscle during the seizure. Results: The amplitude-based algorithm reliably detected seizures in 2 of the patients, while......: to show whether medical signal processing of EMG data is feasible for detection of epileptic seizures. Methods: EMG signals during generalised seizures were recorded from 3 patients (with 20 seizures in total). Two possible medical signal processing algorithms were tested. The first algorithm was based...

  4. Electrochemical detection of point mutation based on surface ligation reaction and biometallization.

    Science.gov (United States)

    Zhang, Peng; Chu, Xia; Xu, Xiangmin; Shen, Guoli; Yu, Ruqin

    2008-05-15

    A highly sensitive electrochemical method for point mutation detection based on surface enzymatic ligation reaction and biometallization is demonstrated. In this method the surface-immobilized allele-specific probe, complementary to the mutant target, undergoes allele-specific ligation with the 5'-phosphorylated ligation probe in the presence of the mutant oligonucleotide target and E. coli DNA ligase. If there is an allele mismatch, no ligation takes place. After thermal treatment at 90 degrees C, the formed duplex melts apart, which merely allows the ligation product to remain on the electrode surface. Then, biotinylated detection probes hybridize with the ligation product. With the binding of streptavidin-alkaline phosphatase (SA-ALP) to the biotinylated probes, a non-reductive substrate of alkaline phosphatase, ascorbic acid 2-phosphate (AA-P), can be converted into ascorbic acid (AA) at the electrode surface. Silver ions in solution are then reduced by AA, resulting in the deposition of silver metal onto the electrode surface. Linear sweep voltammetry (LSV) is used to detect the amount of deposited silver. The proposed approach has been successfully implemented for the identification of single base mutation in codon 12 of K-ras oncogene target with a detection limit of 80fM, demonstrating that this method provides a highly specific, sensitive and cost-efficient approach for point mutation detection.

  5. Parametric Adaptive Radar Detector with Enhanced Mismatched Signals Rejection Capabilities

    Directory of Open Access Journals (Sweden)

    Liu Bin

    2010-01-01

    Full Text Available We consider the problem of adaptive signal detection in the presence of Gaussian noise with unknown covariance matrix. We propose a parametric radar detector by introducing a design parameter to trade off the target sensitivity with sidelobes energy rejection. The resulting detector merges the statistics of Kelly's GLRT and of the Rao test and so covers Kelly's GLRT and the Rao test as special cases. Both invariance properties and constant false alarm rate (CFAR behavior for this detector are studied. At the analysis stage, the performance of the new receiver is assessed and compared with several traditional adaptive detectors. The results highlight better rejection capabilities of this proposed detector for mismatched signals. Further, we develop two two-stage detectors, one of which consists of an adaptive matched filter (AMF followed by the aforementioned detector, and the other is obtained by cascading a GLRT-based Subspace Detector (SD and the proposed adaptive detector. We show that the former two-stage detector outperforms traditional two-stage detectors in terms of selectivity, and the latter yields more robustness.

  6. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  7. SKILLS MISMATCH OF THE YOUNG PEOPLE AT THE EUROPEAN LEVEL

    Directory of Open Access Journals (Sweden)

    Hatos Roxana

    2015-07-01

    Full Text Available Transition from school to work is a main issue with many fields of study. Studies on transition from school to work, have highlight the importance of two categories of factors at the level of the individual formal proceedings which may affect how easy it is to graduate to integrate into the labor market: 1 so far as the educational systems are transmitting specific competences as compared with those general and 2 so far as there are direct links between employers and the education system. In this way, are reduced the costs of selection and allocation for employers. A poor articulation between educational institutions and the labor market produce a high level of unmatched competences of assimilated by formal education and competencies required of the labor market (skill mismatch (Parodi et al., 2012. The surveys with European employers reflect particular difficulties that they are experiencing in employment vacancies. Investigation on the European companies in the spring of 2013 found that 40% of the firms in the EU have difficulty in finding employees with suitable qualification (CEDEFOP-European Center for the Development of the Vocational Training, 2014. Skills mismatch is a generic term that refers to various types of imbalances between skills and competences offered and those required in the labor market. Concept has become one intensely discussed and submitted to measurement in international research on the background concerns the under-utilization human resource. Numerous opinion polls with employers come to the same unexpected conclusion - that despite high unemployment many posts can't find occupants satisfactorily prepared and identify the causes: most of them criticized the lack of skills of the candidates or the absence of skills specific to the workplace. Based on the latest studies on international databases have built a set of questions that, through secondary analysis, we tried to find answers. Questions that we try to give answer

  8. Ultrasensitive cDNA detection of dengue virus RNA using electrochemical nanoporous membrane-based biosensor.

    Directory of Open Access Journals (Sweden)

    Varun Rai

    Full Text Available A nanoporous alumina membrane-based ultrasensitive DNA biosensor is constructed using 5'-aminated DNA probes immobilized onto the alumina channel walls. Alumina nanoporous membrane-like structure is carved over platinum wire electrode of 76 µm diameter dimension by electrochemical anodization. The hybridization of complementary target DNA with probe DNA molecules attached inside the pores influences the pore size and ionic conductivity. The biosensor demonstrates linear range over 6 order of magnitude with ultrasensitive detection limit of 9.55×10(-12 M for the quantification of ss-31 mer DNA sequence. Its applicability is challenged against real time cDNA PCR sample of dengue virus serotype1 derived from asymmetric PCR. Excellent specificity down to one nucleotide mismatch in target DNA sample of DENV3 is also demonstrated.

  9. Match mismatch processes underlie human hippocampal responses to associative novelty.

    Science.gov (United States)

    Kumaran, Dharshan; Maguire, Eleanor A

    2007-08-08

    The hippocampus has long been proposed to play a critical role in novelty detection through its ability to act as a comparator between past and present experience. A recent study provided evidence for this hypothesis by characterizing hippocampal responses to sequence novelty, a type of associative novelty where familiar items appear in a new temporal order. Here, we ask whether a hippocampal match-mismatch (i.e., comparator) mechanism operates selectively to identify the violation of predictions within the temporal domain or instead also underlies the processing of associative novelty in other domains (e.g., spatial). We used functional magnetic resonance imaging and a repetition paradigm in which subjects viewed sequences of objects presented in distinct locations on the screen and performed an incidental target detection task. The left hippocampus exhibited a pattern of activity consistent with that of an associative match-mismatch detector, with novelty signals generated only in conditions where one contextual component was novel and the other repeated. In contrast, right hippocampal activation signaled the presence of objects in familiar locations. Our results suggest that hippocampal match-mismatch computations constitute a general mechanism underpinning the processing of associative novelty. These findings support a model in which hippocampal mismatch signals rely critically on the recall of previous experience, a process that only occurs when novel sensory inputs overlap significantly with stored representations. More generally, the current study also offers insights into how the hippocampus automatically represents the spatiotemporal context of our experiences, a function that may relate to its role in episodic memory.

  10. 关于功率放大器中功率检测在负载失配下的研究%Research on Power Detection of Power Ampliifer with Load Mismatch

    Institute of Scientific and Technical Information of China (English)

    柯林; 章国豪; 冯卫峰

    2014-01-01

    In complex application environments, the phase variation of mobile terminal devices with large voltage standing wave ratio (VSWR), such as mobile phone, will seriously affect the accuracy of power detection. A theoretical analysis of the power detection model is presented. Based on the theoretical analysis, the key factors for the accuracy of power detection are simulated, analyzed and verified with simulation software ADS, which provides the theoretical guidance and implementation scheme for obtaining the optimal accuracy of power detection in system design.%在复杂的应用环境中,手机等移动终端设备在负载高驻波比的条件下,其相位的变化会严重影响功率检测的精度。通过对功率检测模型进行理论分析,并利用仿真软件ADS进行仿真和分析,验证影响功率检测精度的关键因素,为在实际系统设计中实现最优化的功率检测精度提供理论指导和实现方案。

  11. Effect of parameter mismatch on the dynamics of strongly coupled self sustained oscillators

    Science.gov (United States)

    Chakrabarty, Nilaj; Jain, Aditya; Lal, Nijil; Das Gupta, Kantimay; Parmananda, Punit

    2017-01-01

    In this paper, we present an experimental setup and an associated mathematical model to study the synchronization of two self-sustained, strongly coupled, mechanical oscillators (metronomes). The effects of a small detuning in the internal parameters, namely, damping and frequency, have been studied. Our experimental system is a pair of spring wound mechanical metronomes; coupled by placing them on a common base, free to move along a horizontal direction. We designed a photodiode array based non-contact, non-magnetic position detection system driven by a microcontroller to record the instantaneous angular displacement of each oscillator and the small linear displacement of the base, coupling the two. In our system, the mass of the oscillating pendula forms a significant fraction of the total mass of the system, leading to strong coupling of the oscillators. We modified the internal mechanism of the spring-wound "clockwork" slightly, such that the natural frequency and the internal damping could be independently tuned. Stable synchronized and anti-synchronized states were observed as the difference in the parameters was varied in the experiments. The simulation results showed a rapid increase in the phase difference between the two oscillators beyond a certain threshold of parameter mismatch. Our simple model of the escapement mechanism did not reproduce a complete 180° out of phase state. However, the numerical simulations show that increased mismatch in parameters leads to a synchronized state with a large phase difference.

  12. Water Detection Based on Object Reflections

    Science.gov (United States)

    Rankin, Arturo L.; Matthies, Larry H.

    2012-01-01

    Water bodies are challenging terrain hazards for terrestrial unmanned ground vehicles (UGVs) for several reasons. Traversing through deep water bodies could cause costly damage to the electronics of UGVs. Additionally, a UGV that is either broken down due to water damage or becomes stuck in a water body during an autonomous operation will require rescue, potentially drawing critical resources away from the primary operation and increasing the operation cost. Thus, robust water detection is a critical perception requirement for UGV autonomous navigation. One of the properties useful for detecting still water bodies is that their surface acts as a horizontal mirror at high incidence angles. Still water bodies in wide-open areas can be detected by geometrically locating the exact pixels in the sky that are reflecting on candidate water pixels on the ground, predicting if ground pixels are water based on color similarity to the sky and local terrain features. But in cluttered areas where reflections of objects in the background dominate the appearance of the surface of still water bodies, detection based on sky reflections is of marginal value. Specifically, this software attempts to solve the problem of detecting still water bodies on cross-country terrain in cluttered areas at low cost.

  13. Community detection based on network communicability

    Science.gov (United States)

    Estrada, Ernesto

    2011-03-01

    We propose a new method for detecting communities based on the concept of communicability between nodes in a complex network. This method, designated as N-ComBa K-means, uses a normalized version of the adjacency matrix to build the communicability matrix and then applies K-means clustering to find the communities in a graph. We analyze how this method performs for some pathological cases found in the analysis of the detection limit of communities and propose some possible solutions on the basis of the analysis of the ratio of local to global densities in graphs. We use four different quality criteria for detecting the best clustering and compare the new approach with the Girvan-Newman algorithm for the analysis of two "classical" networks: karate club and bottlenose dolphins. Finally, we analyze the more challenging case of homogeneous networks with community structure, for which the Girvan-Newman completely fails in detecting any clustering. The N-ComBa K-means approach performs very well in these situations and we applied it to detect the community structure in an international trade network of miscellaneous manufactures of metal having these characteristics. Some final remarks about the general philosophy of community detection are also discussed.

  14. A Prior-based Transfer Learning Method for the Phishing Detection

    Directory of Open Access Journals (Sweden)

    Jianyi Zhang

    2012-08-01

    Full Text Available In this paper, we introduce a prior-based transfer  learning method for our statistical machine learning  classifier which based on the logistic regression to detect the  phishing sites that relies on our selected features of the  URLs. Because of the mismatched distributions of the  features in different phishing domains, we employ multiple  models for different regions. Since it is impossible for us to  collect enough data from a new region to rebuild the  detection model, we adjust the existing models by the  transfer learning algorithm to solve these problems. The  proposed algorithm was evaluated on a real-world task of  detecting the phishing websites. After a number of  experiments, our proposed transfer learning algorithm  achieves more than 97% accuracy. The result demonstrates  the use of this algorithm in the anti-phishing scenario is  feasible and ready for our large scale detection engine. 

  15. Influence of sequence mismatches on the specificity of recombinase polymerase amplification technology.

    Science.gov (United States)

    Daher, Rana K; Stewart, Gale; Boissinot, Maurice; Boudreau, Dominique K; Bergeron, Michel G

    2015-04-01

    Recombinase polymerase amplification (RPA) technology relies on three major proteins, recombinase proteins, single-strand binding proteins, and polymerases, to specifically amplify nucleic acid sequences in an isothermal format. The performance of RPA with respect to sequence mismatches of closely-related non-target molecules is not well documented and the influence of the number and distribution of mismatches in DNA sequences on RPA amplification reaction is not well understood. We investigated the specificity of RPA by testing closely-related species bearing naturally occurring mismatches for the tuf gene sequence of Pseudomonas aeruginosa and/or Mycobacterium tuberculosis and for the cfb gene sequence of Streptococcus agalactiae. In addition, the impact of the number and distribution of mismatches on RPA efficiency was assessed by synthetically generating 14 types of mismatched forward primers for detecting five bacterial species of high diagnostic relevance such as Clostridium difficile, Staphylococcus aureus, S. agalactiae, P. aeruginosa, and M. tuberculosis as well as Bacillus atropheus subsp. globigii for which we use the spores as internal control in diagnostic assays. A total of 87 mismatched primers were tested in this study. We observed that target specific RPA primers with mismatches (n > 1) at their 3'extrimity hampered RPA reaction. In addition, 3 mismatches covering both extremities and the center of the primer sequence negatively affected RPA yield. We demonstrated that the specificity of RPA was multifactorial. Therefore its application in clinical settings must be selected and validated a priori. We recommend that the selection of a target gene must consider the presence of closely-related non-target genes. It is advisable to choose target regions with a high number of mismatches (≥36%, relative to the size of amplicon) with respect to closely-related species and the best case scenario would be by choosing a unique target gene.

  16. Plagiarism Detection Based on SCAM Algorithm

    DEFF Research Database (Denmark)

    Anzelmi, Daniele; Carlone, Domenico; Rizzello, Fabio

    2011-01-01

    Plagiarism is a complex problem and considered one of the biggest in publishing of scientific, engineering and other types of documents. Plagiarism has also increased with the widespread use of the Internet as large amount of digital data is available. Plagiarism is not just direct copy but also...... paraphrasing, rewording, adapting parts, missing references or wrong citations. This makes the problem more difficult to handle adequately. Plagiarism detection techniques are applied by making a distinction between natural and programming languages. Our proposed detection process is based on natural language...

  17. An electrochemical DNA biosensor based on Oracet Blue as a label for detection of Helicobacter pylori.

    Science.gov (United States)

    Hajihosseini, Saeedeh; Nasirizadeh, Navid; Hejazi, Mohammad Saeid; Yaghmaei, Parichereh

    2016-10-01

    An innovative method of a DNA electrochemical biosensor based on Oracet Blue (OB) as an electroactive label and gold electrode (AuE) for detection of Helicobacter pylori, was offered. A single-stranded DNA probe with a thiol modification was covalently immobilized on the surface of the AuE by forming an Au-S bond. Differential pulse voltammetry (DPV) was used to monitor DNA hybridization by measuring the electrochemical signals of reduction of the OB binding to double-stranded DNA (ds-DNA). Our results showed that OB-based DNA biosensor has a decent potential for detection of single-base mismatch in target DNA. Selectivity of the proposed DNA biosensor was further confirmed in the presence of non-complementary and complementary DNA strands. Under optimum conditions, the electrochemical signal had a linear relationship with the concentration of the target DNA ranging from 0.3nmolL(-1) to 240.0nmolL(-1), and the detection limit was 0.17nmolL(-1), whit a promising reproducibility and repeatability.

  18. DATA-MINING BASED FAULT DETECTION

    Institute of Scientific and Technical Information of China (English)

    Ma Hongguang; Han Chongzhao; Wang Guohua; Xu Jianfeng; Zhu Xiaofei

    2005-01-01

    This paper presents a fault-detection method based on the phase space reconstruction and data mining approaches for the complex electronic system. The approach for the phase space reconstruction of chaotic time series is a combination algorithm of multiple autocorrelation and Γ-test, by which the quasi-optimal embedding dimension and time delay can be obtained.The data mining algorithm, which calculates the radius of gyration of unit-mass point around the centre of mass in the phase space, can distinguish the fault parameter from the chaotic time series output by the tested system. The experimental results depict that this fault detection method can correctly detect the fault phenomena of electronic system.

  19. Regional principal color based saliency detection.

    Directory of Open Access Journals (Sweden)

    Jing Lou

    Full Text Available Saliency detection is widely used in many visual applications like image segmentation, object recognition and classification. In this paper, we will introduce a new method to detect salient objects in natural images. The approach is based on a regional principal color contrast modal, which incorporates low-level and medium-level visual cues. The method allows a simple computation of color features and two categories of spatial relationships to a saliency map, achieving higher F-measure rates. At the same time, we present an interpolation approach to evaluate resulting curves, and analyze parameters selection. Our method enables the effective computation of arbitrary resolution images. Experimental results on a saliency database show that our approach produces high quality saliency maps and performs favorably against ten saliency detection algorithms.

  20. A Noise and Mismatches of Delay Cells and Their Effects on DLLs

    Directory of Open Access Journals (Sweden)

    Mohammad Gholami

    2014-04-01

    Full Text Available Jitter is one of the most important parameters in design of delay locked loop (DLL based frequency synthesizer. In this paper noise and mismatches of conventional delay cells which are mainly used in the DLLs architecture are introduced completely. First, time domain equations related to noise and mismatches of conventional delay cells are reported. Then, these equations are used to calculate jitter of DLL due to mismatch and noise of delay cells. At last closed form equations are obtained which can be used in the designing of low jitter DLLs. To validate these equations, a conventional DLL is designed in TSMC 0.18um CMOS Technology.

  1. Ionizing particle detection based on phononic crystals

    Science.gov (United States)

    Aly, Arafa H.; Mehaney, Ahmed; Eissa, Mostafa F.

    2015-08-01

    Most conventional radiation detectors are based on electronic or photon collections. In this work, we introduce a new and novel type of ionizing particle detector based on phonon collection. Helium ion radiation treats tumors with better precision. There are nine known isotopes of helium, but only helium-3 and helium-4 are stable. Helium-4 is formed in fusion reactor technology and in enormous quantities during Big Bang nucleo-synthesis. In this study, we introduce a technique for helium-4 ion detection (sensing) based on the innovative properties of the new composite materials known as phononic crystals (PnCs). PnCs can provide an easy and cheap technique for ion detection compared with conventional methods. PnC structures commonly consist of a periodic array of two or more materials with different elastic properties. The two materials are polymethyl-methacrylate and polyethylene polymers. The calculations showed that the energies lost to target phonons are maximized at 1 keV helium-4 ion energy. There is a correlation between the total phonon energies and the transmittance of PnC structures. The maximum transmission for phonons due to the passage of helium-4 ions was found in the case of making polyethylene as a first layer in the PnC structure. Therefore, the concept of ion detection based on PnC structure is achievable.

  2. Ionizing particle detection based on phononic crystals

    Energy Technology Data Exchange (ETDEWEB)

    Aly, Arafa H., E-mail: arafa16@yahoo.com, E-mail: arafa.hussien@science.bsu.edu.eg; Mehaney, Ahmed; Eissa, Mostafa F. [Physics Department, Faculty of Science, Beni-Suef University, Beni-Suef (Egypt)

    2015-08-14

    Most conventional radiation detectors are based on electronic or photon collections. In this work, we introduce a new and novel type of ionizing particle detector based on phonon collection. Helium ion radiation treats tumors with better precision. There are nine known isotopes of helium, but only helium-3 and helium-4 are stable. Helium-4 is formed in fusion reactor technology and in enormous quantities during Big Bang nucleo-synthesis. In this study, we introduce a technique for helium-4 ion detection (sensing) based on the innovative properties of the new composite materials known as phononic crystals (PnCs). PnCs can provide an easy and cheap technique for ion detection compared with conventional methods. PnC structures commonly consist of a periodic array of two or more materials with different elastic properties. The two materials are polymethyl-methacrylate and polyethylene polymers. The calculations showed that the energies lost to target phonons are maximized at 1 keV helium-4 ion energy. There is a correlation between the total phonon energies and the transmittance of PnC structures. The maximum transmission for phonons due to the passage of helium-4 ions was found in the case of making polyethylene as a first layer in the PnC structure. Therefore, the concept of ion detection based on PnC structure is achievable.

  3. Water Detection Based on Color Variation

    Science.gov (United States)

    Rankin, Arturo L.

    2012-01-01

    This software has been designed to detect water bodies that are out in the open on cross-country terrain at close range (out to 30 meters), using imagery acquired from a stereo pair of color cameras mounted on a terrestrial, unmanned ground vehicle (UGV). This detector exploits the fact that the color variation across water bodies is generally larger and more uniform than that of other naturally occurring types of terrain, such as soil and vegetation. Non-traversable water bodies, such as large puddles, ponds, and lakes, are detected based on color variation, image intensity variance, image intensity gradient, size, and shape. At ranges beyond 20 meters, water bodies out in the open can be indirectly detected by detecting reflections of the sky below the horizon in color imagery. But at closer range, the color coming out of a water body dominates sky reflections, and the water cue from sky reflections is of marginal use. Since there may be times during UGV autonomous navigation when a water body does not come into a perception system s field of view until it is at close range, the ability to detect water bodies at close range is critical. Factors that influence the perceived color of a water body at close range are the amount and type of sediment in the water, the water s depth, and the angle of incidence to the water body. Developing a single model of the mixture ratio of light reflected off the water surface (to the camera) to light coming out of the water body (to the camera) for all water bodies would be fairly difficult. Instead, this software detects close water bodies based on local terrain features and the natural, uniform change in color that occurs across the surface from the leading edge to the trailing edge.

  4. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  5. IMAGE ANALYSIS BASED ON EDGE DETECTION TECHNIQUES

    Institute of Scientific and Technical Information of China (English)

    纳瑟; 刘重庆

    2002-01-01

    A method that incorporates edge detection technique, Markov Random field (MRF), watershed segmentation and merging techniques was presented for performing image segmentation and edge detection tasks. It first applies edge detection technique to obtain a Difference In Strength (DIS) map. An initial segmented result is obtained based on K-means clustering technique and the minimum distance. Then the region process is modeled by MRF to obtain an image that contains different intensity regions. The gradient values are calculated and then the watershed technique is used. DIS calculation is used for each pixel to define all the edges (weak or strong) in the image. The DIS map is obtained. This help as priority knowledge to know the possibility of the region segmentation by the next step (MRF), which gives an image that has all the edges and regions information. In MRF model,gray level l, at pixel location i, in an image X, depends on the gray levels of neighboring pixels. The segmentation results are improved by using watershed algorithm. After all pixels of the segmented regions are processed, a map of primitive region with edges is generated. The edge map is obtained using a merge process based on averaged intensity mean values. A common edge detectors that work on (MRF) segmented image are used and the results are compared. The segmentation and edge detection result is one closed boundary per actual region in the image.

  6. Fuzzy Backstepping Sliding Mode Control for Mismatched Uncertain System

    Directory of Open Access Journals (Sweden)

    H. Q. Hou

    2014-06-01

    Full Text Available Sliding mode controllers have succeeded in many control problems that the conventional control theories have difficulties to deal with; however it is practically impossible to achieve high-speed switching control. Therefore, in this paper an adaptive fuzzy backstepping sliding mode control scheme is derived for mismatched uncertain systems. Firstly fuzzy sliding mode controller is designed using backstepping method based on the Lyapunov function approach, which is capable of handling mismatched problem. Then fuzzy sliding mode controller is designed using T-S fuzzy model method, it can improve the performance of the control systems and their robustness. Finally this method of control is applied to nonlinear system as a case study; simulation results are also provided the performance of the proposed controller.

  7. Nonspinning searches for spinning binaries in ground-based detector data: Amplitude and mismatch predictions in the constant precession cone approximation

    CERN Document Server

    Brown, D; O'Shaughnessy, R

    2012-01-01

    Current searches for compact binary mergers by ground-based gravitational-wave detectors assume for simplicity the two bodies are not spinning. If the binary contains compact objects with significant spin, then this can reduce the sensitivity of these searches, particularly for black hole--neutron star binaries. In this paper we investigate the effect of neglecting precession on the sensitivity of searches for spinning binaries using non-spinning waveform models. We demonstrate that in the sensitive band of Advanced LIGO, the angle between the binary's orbital angular momentum and its total angular momentum is approximately constant. Under this \\emph{constant precession cone} approximation, we show that the gravitational-wave phasing is modulated in two ways: a secular increase of the gravitational-wave phase due to precession and an oscillation around this secular increase. We show that this secular evolution occurs in precisely three ways, corresponding to physically different apparent evolutions of the bin...

  8. Cyclic mismatch binding ligand CMBL4 binds to the 5'-T-3'/5'-GG-3' site by inducing the flipping out of thymine base.

    Science.gov (United States)

    Mukherjee, Sanjukta; Dohno, Chikara; Asano, Kaori; Nakatani, Kazuhiko

    2016-09-01

    A newly designed cyclic bis-naphthyridine carbamate dimer CMBL4: with a limited conformational flexibility was synthesized and characterized. Absorption spectra revealed that two naphthyridines in CMBL4: were stacked on each other in aqueous solutions. The most efficient binding of CMBL4: to DNA was observed for the sequence 5'-T-3'/5'-GG-3' (T/GG) with the formation of a 1:1 complex, which is one of possible structural elements involved in the higher order structures of (TGG)n repeat DNA triggering the genome microdeletion. Surface plasmon resonance assay also showed the binding of CMBL4: with TGG repeat DNA. Potassium permanganate oxidation studies of CMBL4: -bound duplex containing the T/GG site showed that the CMBL4: -binding accelerated the oxidation of thymine at that site, which suggests the flipping out of the thymine base from a π-stack. Preferential binding was observed for CMBL4: compared with its acyclic variants, which suggests the marked significance of the macrocyclic structure for the recognition of the T/GG site.

  9. Chemiluminescence imaging for microRNA detection based on cascade exponential isothermal amplification machinery.

    Science.gov (United States)

    Xu, Yongjie; Li, Dandan; Cheng, Wei; Hu, Rong; Sang, Ye; Yin, Yibing; Ding, Shijia; Ju, Huangxian

    2016-09-14

    A novel G-quadruplex DNAzyme-driven chemiluminescence (CL) imaging method was developed for ultrasensitive and specific detection of miRNA based on the cascade exponential isothermal amplification reaction (EXPAR) machinery. A structurally tailored hairpin probe switch was designed to selectively recognise miRNA and form hybridisation products to trigger polymerase and nicking enzyme machinery, resulting in the generation of product I, which was complementary to a region of the functional linear template. Then, the response of the functional linear template to the generated product I further activated the exponential isothermal amplification machinery, leading to synthesis of numerous horseradish peroxidase mimicking DNAzyme units for CL signal transduction. The amplification paradigm generated a linear response from 10 fM to 100 pM, with a low detection limit of 2.91 fM, and enabled discrimination of target miRNA from a single-base mismatched target. The developed biosensing platform demonstrated the advantages of isothermal, homogeneous, visual detection for miRNA assays, offering a promising tool for clinical diagnosis.

  10. Wavelength mismatch effect in electromagnetically induced absorption

    Science.gov (United States)

    Bharti, Vineet; Wasan, Ajay; Natarajan, Vasant

    2016-07-01

    We present a theoretical investigation of the phenomenon of electromagnetically induced absorption (EIA) in a 4-level system consisting of vee and ladder subsystems. The four levels are coupled using one weak probe field, and two strong control fields. We consider an experimental realization using energy levels of Rb. This necessitates dealing with different conditions of wavelength mismatch-near-perfect match where all three wavelengths are approximately equal; partial mismatch where the wavelength of one control field is less than the other fields; and complete mismatch where all three wavelengths are unequal. We present probe absorption profiles with Doppler averaging at room temperature to account for experiments in a room temperature Rb vapor cell. Our analysis shows that EIA resonances can be studied using Rydberg states excited with diode lasers.

  11. Wavelength mismatch effect in electromagnetically induced absorption

    CERN Document Server

    Bharti, Vineet; Natarajan, Vasant

    2016-01-01

    We present a theoretical investigation of the phenomenon of electromagnetically induced absorption (EIA) in a 4-level system consisting of vee and ladder subsystems. The four levels are coupled using one weak probe field, and two strong control fields. We consider an experimental realization using energy levels of Rb. This necessitates dealing with different conditions of wavelength mismatch---near-perfect match where all three wavelengths are approximately equal; partial mismatch where the wavelength of one control field is less than the other fields; and complete mismatch where all three wavelengths are unequal. We present probe absorption profiles with Doppler averaging at room temperature to account for experiments in a room temperature Rb vapor cell. Our analysis shows that EIA resonances can be studied using Rydberg states excited with diode lasers.

  12. NO2 Detection Using Microcantilever Based Potentiometry

    Directory of Open Access Journals (Sweden)

    Goutam Koley

    2008-11-01

    Full Text Available A highly sensitive and novel sensor platform for gases and volatile chemicals using microcantilever based potentiometry is reported. A resonant cantilever is used to detect the changes in surface work functions of functionalized substrates caused by adsorption of target gas molecules. Surface work function (SWF changes were measured for different functionalization layers made of transition metal oxide thin films with the flow of NO2. The rate of change in SWF for In2O3 and SnO2 were found to be ~80 and ~100 μV/sec, respectively, for 70 ppm NO2. A sensitivity of 64 μV/sec for SWF change was also found for 70 ppm NO2 concentration for isolated clusters of ZnO nanowires, indicating that this technique is applicable even for nano-clusters of sensing materials where amperometric detection is impossible due to material discontinuity. NO2 detection as low as 400 ppb was possible using highly insulating In2O3 and SnO2 thin films (resistivity > 1 TΩ/⎕. Two different forms of nano scale graphite were compared with the transition oxide based functionalization layer for sensing sub-ppm NO2 sensing. It was observed that nanostructured graphite (NG shows much higher sensitivity and lower response time than transition metal oxides.

  13. Bacteriophage based probes for pathogen detection.

    Science.gov (United States)

    Singh, Amit; Arutyunov, Denis; Szymanski, Christine M; Evoy, Stephane

    2012-08-01

    Rapid and specific detection of pathogenic bacteria is important for the proper treatment, containment and prevention of human, animal and plant diseases. Identifying unique biological probes to achieve a high degree of specificity and minimize false positives has therefore garnered much interest in recent years. Bacteriophages are obligate intracellular parasites that subvert bacterial cell resources for their own multiplication and production of disseminative new virions, which repeat the cycle by binding specifically to the host surface receptors and injecting genetic material into the bacterial cells. The precision of host recognition in phages is imparted by the receptor binding proteins (RBPs) that are often located in the tail-spike or tail fiber protein assemblies of the virions. Phage host recognition specificity has been traditionally exploited for bacterial typing using laborious and time consuming bacterial growth assays. At the same time this feature makes phage virions or RBPs an excellent choice for the development of probes capable of selectively capturing bacteria on solid surfaces with subsequent quick and automatic detection of the binding event. This review focuses on the description of pathogen detection approaches based on immobilized phage virions as well as pure recombinant RBPs. Specific advantages of RBP-based molecular probes are also discussed.

  14. Numerical Analysis on Transmission Characteristics of a Bragg Grating Assisted Mismatched Fiber Coupler

    Institute of Scientific and Technical Information of China (English)

    WEI Daoping; JIANG Zhong'ao; ZHAO Yucheng; JIAN Shuisheng

    2000-01-01

    Based on mode-coupled theory, a Bragg grating assisted mismatched fiber coupler is analyzed theoretically. At the same time, a detailed numerical analysis on transmission characteristics of the coupler is carried out when it considers the arcs of two fibers in the coupling region of the coupler or not, and the optimized design on the Bragg grating assisted mismatched fiber coupler for wavelength-division multiplexing/ demultiplexing is proposed.

  15. The selective recognition of mismatched d(GCGAGC)2 by the cobalt(III) complex

    Institute of Scientific and Technical Information of China (English)

    CHEN; Huili; YANG; Pin

    2005-01-01

    We studied the binding of [Co(phen)2(HPIP)]Cl3 to mismatched d(GCGAGC)2 containing two sheared G:A mispairs by NMR. The result shows that the complex was intercalated into G:A region from the minor groove and extended to the major groove, and could selectively recognize the mispairs. 31P NMR indicates that the complex binding induced the change of the phosphate backbone in the mismatched base pairs region.

  16. Mismatch and noise in modern IC processes

    CERN Document Server

    Marshall, Andrew

    2009-01-01

    Component variability, mismatch, and various noise effects are major contributors to design limitations in most modern IC processes. Mismatch and Noise in Modern IC Processes examines these related effects and how they affect the building block circuits of modern integrated circuits, from the perspective of a circuit designer.Variability usually refers to a large scale variation that can occur on a wafer to wafer and lot to lot basis, and over long distances on a wafer. This phenomenon is well understood and the effects of variability are included in most integrated circuit design with the use

  17. An immune based dynamic intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2005-01-01

    With the dynamic description method for self and antigen, and the concept of dynamic immune tolerance for lymphocytes in network-security domain presented in this paper, a new immune based dynamic intrusion detection model (Idid) is proposed. In Idid, the dynamic models and the corresponding recursive equations of the lifecycle of mature lymphocytes, and the immune memory are built. Therefore, the problem of the dynamic description of self and nonself in computer immune systems is solved, and the defect of the low efficiency of mature lymphocyte generating in traditional computer immune systems is overcome. Simulations of this model are performed, and the comparison experiment results show that the proposed dynamic intrusion detection model has a better adaptability than the traditional methods.

  18. Frequency Based Fault Detection in Wind Turbines

    DEFF Research Database (Denmark)

    Odgaard, Peter Fogh; Stoustrup, Jakob

    2014-01-01

    In order to obtain lower cost of energy for wind turbines fault detection and accommodation is important. Expensive condition monitoring systems are often used to monitor the condition of rotating and vibrating system parts. One example is the gearbox in a wind turbine. This system is operated...... in parallel to the control system, using different computers and additional often expensive sensors. In this paper a simple filter based algorithm is proposed to detect changes in a resonance frequency in a system, exemplified with faults resulting in changes in the resonance frequency in the wind turbine...... gearbox. Only the generator speed measurement which is available in even simple wind turbine control systems is used as input. Consequently this proposed scheme does not need additional sensors and computers for monitoring the condition of the wind gearbox. The scheme is evaluated on a wide-spread wind...

  19. An SPR based sensor for allergens detection.

    Science.gov (United States)

    Ashley, J; Piekarska, M; Segers, C; Trinh, L; Rodgers, T; Willey, R; Tothill, I E

    2017-02-15

    A simple, sensitive and label-free optical sensor method was developed for allergens analysis using α-casein as the biomarker for cow's milk detection, to be used directly in final rinse samples of cleaning in place systems (CIP) of food manufacturers. A Surface Plasmon Resonance (SPR) sensor chip consisting of four sensing arrays enabling the measurement of samples and control binding events simultaneously on the sensor surface was employed in this work. SPR offers several advantages in terms of label free detection, real time measurements and superior sensitivity when compared to ELISA based techniques. The gold sensor chip was used to immobilise α-casein-polyclonal antibody using EDC/NHS coupling procedure. The performance of the assay and the sensor was first optimised and characterised in pure buffer conditions giving a detection limit of 58ngmL(-1) as a direct binding assay. The assay sensitivity can be further improved by using sandwich assay format and amplified with nanoparticles. However, at this stage this is not required as the detection limit achieved exceeded the required allergens detection levels of 2µgmL(-1) for α-S1-casein. The sensor demonstrated good selectivity towards the α-casein as the target analyte and adequate recoveries from CIP final rinse wash samples. The sensor would be useful tool for monitoring allergen levels after cleaning procedures, providing additional data that may better inform upon wider food allergen risk management decision(s) that are made by food manufacturer. In particular, this sensor could potentially help validate or optimise cleaning practices for a given food manufacturing process.

  20. Mismatch repair regulates homologous recombination, but has little influence on antigenic variation, in Trypanosoma brucei.

    Science.gov (United States)

    Bell, Joanna S; McCulloch, Richard

    2003-11-14

    Antigenic variation is critical in the life of the African trypanosome, as it allows the parasite to survive in the face of host immunity and enhance its transmission to other hosts. Much of trypanosome antigenic variation uses homologous recombination of variant surface glycoprotein (VSG)-encoding genes into specialized transcription sites, but little is known about the processes that regulate it. Here we describe the effects on VSG switching when two central mismatch repair genes, MSH2 and MLH1, are mutated. We show that disruption of the parasite mismatch repair system causes an increased frequency of homologous recombination, both between perfectly matched DNA molecules and between DNA molecules with divergent sequences. Mismatch repair therefore provides an important regulatory role in homologous recombination in this ancient eukaryote. Despite this, the mismatch repair system has no detectable role in regulating antigenic variation, meaning that VSG switching is either immune to mismatch selection or that mismatch repair acts in a subtle manner, undetectable by current assays.

  1. Using stable MutS dimers and tetramers to quantitatively analyze DNA mismatch recognition and sliding clamp formation

    NARCIS (Netherlands)

    M.K. Groothuizen; A. Fish (Alexander); M.V. Petoukhov (Maxim); A. Reumer (Annet); L. Manelyte (Laura); H.H.K. Winterwerp (Herrie); M.G. Marinus (Martin); J.H.G. Lebbink (Joyce); D.I. Svergun (Dmitri); P. Friedhoff (Peter); T.K. Sixma (Titia)

    2013-01-01

    textabstractThe process of DNA mismatch repair is initiated when MutS recognizes mismatched DNA bases and starts the repair cascade. The Escherichia coli MutS protein exists in an equilibrium between dimers and tetramers, which has compromised biophysical analysis. To uncouple these states, we have

  2. Plagiarism Detection Using Graph-Based Representation

    CERN Document Server

    Osman, Ahmed Hamza; Binwahlan, Mohammed Salem

    2010-01-01

    Plagiarism of material from the Internet is a widespread and growing problem. Several methods used to detect the plagiarism and similarity between the source document and suspected documents such as fingerprint based on character or n-gram. In this paper, we discussed a new method to detect the plagiarism based on graph representation; however, Preprocessing for each document is required such as breaking down the document into its constituent sentences. Segmentation of each sentence into separated terms and stop word removal. We build the graph by grouping each sentence terms in one node, the resulted nodes are connected to each other based on order of sentence within the document, all nodes in graph are also connected to top level node "Topic Signature". Topic signature node is formed by extracting the concepts of each sentence terms and grouping them in such node. The main advantage of the proposed method is the topic signature which is main entry for the graph is used as quick guide to the relevant nodes. ...

  3. Do anticodons of misacylated tRNAs preferentially mismatch codons coding for the misloaded amino acid?

    Directory of Open Access Journals (Sweden)

    Seligmann Hervé

    2010-05-01

    Full Text Available Abstract Background Accurate amino acid insertion during peptide elongation requires tRNAs loaded by cognate amino acids and that anticodons match codons. However, tRNA misloading does not necessarily cause misinsertions: misinsertion is avoided when anticodons mismatch codons coding for misloaded amino acids. Presentation of the hypothesis Occasional compensation of misacylation by codon-anticodon mismatch necessarily occurs. Putatively, occasional error compensation may be enhanced beyond the random combination of independent errors in tRNA loading and codon-anticodon interactions: tRNA misacylation might alter potentials for codon-anticodon mismatches, perhaps specifically increasing potentials for mismatching those codons coding for the misacylated non-cognate amino acid. This hypothetical phenomenon is called 'error coordination', in distinction from 'error compensation' that assumes independence between misacylation and mismatch. Testing the hypothesis Eventually, the hypothesis should be tested for each combination of amino acid misacylation and codon-anticodon mismatch, by comparing stabilities or frequencies of mismatched codon-anticodon duplexes formed by tRNAs loaded by their cognate amino acid with stabilities formed by that tRNA when misloaded with the amino acid coded by the mismatched codon. Competitive mismatching experiments between misloaded and correctly loaded tRNAs could also be useful, yet more sophisticated experiments. Implications of the hypothesis Detecting error coordination implies estimating error compensation, which also promotes protein synthesis accuracy. Hence even in the absence of evidence for error coordination, experiments would yield very useful insights into misacylation and mismatch processes. In case experiments consider post-transcriptional RNA modifications (especially at wobble positions, results on codon-anticodon mismatches would enable significant improvements and sophistications of secondary

  4. SVM multiuser detection based on heuristic kernel

    Institute of Scientific and Technical Information of China (English)

    Yang Tao; Hu Bo

    2007-01-01

    A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multiple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kernel sparsity approximation algorithm, which avoids the conventional costly quadratic programming (QP) procedure in SVM. Besides, the coefficient of the SV is attained through the solution to a generalized eigenproblem. Simulation results show that the proposed scheme has almost the same bit error rate (BER) as the standard SVM and is better than minimum mean square error (MMSE) scheme. Meanwhile, it has a low computation complexity.

  5. IMU Fault Detection Based on 2-CUSUM

    Directory of Open Access Journals (Sweden)

    Élcio Jeronimo de Oliveira

    2012-01-01

    IMU strapdown platforms using fiber optic gyros (FOG or micro electro mechanical systems (MEMSs. A way to solve this problem makes use of sensor redundancy and parity vector (PV analysis. However, the actual sensor outputs can include some anomalies, as impulsive noise which can be associated with the sensors itself or data acquisition process, committing the elementary threshold criteria as commonly used. Therefore, to overcome this problem, in this work, it is proposed an algorithm based on median filter (MF for prefiltering and chi-square cumulative sum (2-CUSUM only for fault detection (FD applied to an IMU composed by four FOGs.

  6. Global contrast based salient region detection

    KAUST Repository

    Cheng, Ming-Ming

    2011-08-25

    Reliable estimation of visual saliency allows appropriate processing of images without prior knowledge of their contents, and thus remains an important step in many computer vision tasks including image segmentation, object recognition, and adaptive compression. We propose a regional contrast based saliency extraction algorithm, which simultaneously evaluates global contrast differences and spatial coherence. The proposed algorithm is simple, efficient, and yields full resolution saliency maps. Our algorithm consistently outperformed existing saliency detection methods, yielding higher precision and better recall rates, when evaluated using one of the largest publicly available data sets. We also demonstrate how the extracted saliency map can be used to create high quality segmentation masks for subsequent image processing.

  7. Mobile Recommendation Based on Link Community Detection

    Directory of Open Access Journals (Sweden)

    Kun Deng

    2014-01-01

    Full Text Available Since traditional mobile recommendation systems have difficulty in acquiring complete and accurate user information in mobile networks, the accuracy of recommendation is not high. In order to solve this problem, this paper proposes a novel mobile recommendation algorithm based on link community detection (MRLD. MRLD executes link label diffusion algorithm and maximal extended modularity (EQ of greedy search to obtain the link community structure, and overlapping nodes belonging analysis (ONBA is adopted to adjust the overlapping nodes in order to get the more accurate community structure. MRLD is tested on both synthetic and real-world networks, and the experimental results show that our approach is valid and feasible.

  8. Neutron Detection Using Gadolinium-Based Diodes

    Science.gov (United States)

    2011-03-01

    U Uranium UNL The University of Nebraska, Lincoln XRD X-Ray Diffraction 1 NEUTRON DETECTION USING GADOLINIUM-BASED DIODES I...detector volume of approximately 3.46x10-6 cm3. 6 4 2 0 2 0.0 0.5 1.0 1.5 2.0 2.5 3.0 Applied BiasV De ple tio nW idt hm  Si SiC 22...Layer deposition on the SiC substrate was confirmed by x-ray diffraction ( XRD ), however, no ellipsometry or other characterization measurements were

  9. Velocity synchronization of multi-agent systems with mismatched parameters via sampled position data.

    Science.gov (United States)

    Sun, Wen; Huang, Chunli; Lü, Jinhu; Li, Xiong; Chen, Shihua

    2016-02-01

    Power systems are special multi-agent systems with nonlinear coupling function and symmetric structures. This paper extends these systems to a class of multi-agent systems with mismatched parameters, linear coupling function, and asymmetric structures and investigates their velocity synchronization via sampled position data. The dynamics of the agents is adopted as that of generators with mismatched parameters, while the system structures are supposed to be complex. Two distributed linear consensus protocols are designed, respectively, for multi-agent systems without or with communication delay. Necessary and sufficient conditions based on the sampling period, the mismatched parameters, the delay, and the nonzero eigenvalues of the Laplacian matrix are established. It is shown that velocity synchronization of multi-agent systems with mismatched parameters can be achieved if the sampled period is chosen appropriately. Simulations are given to illustrate the effectiveness of the theoretical results.

  10. DNA & Protein detection based on microbead agglutination

    KAUST Repository

    Kodzius, Rimantas

    2012-06-06

    We report a simple and rapid room temperature assay for point-of-care (POC) testing that is based on specific agglutination. Agglutination tests are based on aggregation of microparticles in the presence of a specific analyte thus enabling the macroscopic observation. Agglutination-based tests are most often used to explore the antibody-antigen reactions. Agglutination has been used for mode protein assays using a biotin/streptavidin two-component system, as well as a hybridization based two-component assay; however, as our work shows, two-component systems are prone to self-termination of the linking analyte and thus have a lower sensitivity. Three component systems have also been used with DNA hybridization, as in our work; however, their assay requires 48 hours for incubation, while our assay is performed in 5 minutes making it a real candidate for POC testing. We demonstrate three assays: a two-component biotin/streptavidin assay, a three-component hybridization assay using single stranded DNA (ssDNA) molecules and a stepped three-component hybridization assay. The comparison of these three assays shows our simple stepped three-component agglutination assay to be rapid at room temperature and more sensitive than the two-component version by an order of magnitude. An agglutination assay was also performed in a PDMS microfluidic chip where agglutinated beads were trapped by filter columns for easy observation. We developed a rapid (5 minute) room temperature assay, which is based on microbead agglutination. Our three-component assay solves the linker self-termination issue allowing an order of magnitude increase in sensitivity over two–component assays. Our stepped version of the three-component assay solves the issue with probe site saturation thus enabling a wider range of detection. Detection of the agglutinated beads with the naked eye by trapping in microfluidic channels has been shown.

  11. Point pattern match-based change detection in a constellation of previously detected objects

    Science.gov (United States)

    Paglieroni, David W.

    2016-06-07

    A method and system is provided that applies attribute- and topology-based change detection to objects that were detected on previous scans of a medium. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, detection strength, size, elongation, orientation, etc. The locations define a three-dimensional network topology forming a constellation of previously detected objects. The change detection system stores attributes of the previously detected objects in a constellation database. The change detection system detects changes by comparing the attributes and topological consistency of newly detected objects encountered during a new scan of the medium to previously detected objects in the constellation database. The change detection system may receive the attributes of the newly detected objects as the objects are detected by an object detection system in real time.

  12. Overlapping Community Detection based on Network Decomposition

    Science.gov (United States)

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-04-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.

  13. Waveguide-Based Biosensors for Pathogen Detection

    Directory of Open Access Journals (Sweden)

    Nile Hartman

    2009-07-01

    Full Text Available Optical phenomena such as fluorescence, phosphorescence, polarization, interference and non-linearity have been extensively used for biosensing applications. Optical waveguides (both planar and fiber-optic are comprised of a material with high permittivity/high refractive index surrounded on all sides by materials with lower refractive indices, such as a substrate and the media to be sensed. This arrangement allows coupled light to propagate through the high refractive index waveguide by total internal reflection and generates an electromagnetic wave—the evanescent field—whose amplitude decreases exponentially as the distance from the surface increases. Excitation of fluorophores within the evanescent wave allows for sensitive detection while minimizing background fluorescence from complex, “dirty” biological samples. In this review, we will describe the basic principles, advantages and disadvantages of planar optical waveguide-based biodetection technologies. This discussion will include already commercialized technologies (e.g., Corning’s EPIC® Ô, SRU Biosystems’ BIND™, Zeptosense®, etc. and new technologies that are under research and development. We will also review differing assay approaches for the detection of various biomolecules, as well as the thin-film coatings that are often required for waveguide functionalization and effective detection. Finally, we will discuss reverse-symmetry waveguides, resonant waveguide grating sensors and metal-clad leaky waveguides as alternative signal transducers in optical biosensing.

  14. Double-mismatched siRNAs enhance selective gene silencing of a mutant ALS-causing allele

    Institute of Scientific and Technical Information of China (English)

    Chang-ming GENG; Hong-liu DING

    2008-01-01

    Aim: Our previous study demonstrated an siRNA-mediated, allele-specific silenc-ing of mutant genes that cause amyotrophic lateral sclerosis. To improve siRNA design for better therapeutic use of RNA interference, we systematically tested the base-pairing mismatch strategy in the design of asymmetric siRNA. Methods: A naturally symmetric siRNA that targets the human Cu Zn superoxide dismutase G85R mutant allele was modified by placing either 1 or 2 mismatches at the end of the siRNA from position 1 to 4 at each time. The target preference and silencing efficacy of modified siRNA were measured using a modified dual luciferase system. Results: The modification of single base-pairing mismatch successfully achieved the conversion of the siRNA that was originally favored to the antisense of the mutant allele to the one that was favored to the sense strand of the gene. Com-pared to the single-mismatched siRNA, those with double-mismatch at one end demonstrated an increased asymmetry, and thus, an enhanced specificity and efficacy of gene silencing. In addition, the siRNA with double-mismatch at both ends remained in symmetry. Conclusion: Our results suggest the effectiveness of converting a symmetric siRNA to an asymmetric one by introducing mismatches into its structure, and the superiority of double-mismatched siRNA to single-mismatched siRNA in producing selective gene silencing resulting from the dis-ruption of siRNA symmetry. The double-mismatch strategy is an improvement of the single-mismatch method and could be useful in the design of effective siRNAs for the treatment of diseases caused by dominant, gain-of-function gene mutations, such as ALS.

  15. Detection of a Specific Biomarker for Epstein-Barr Virus Using a Polymer-Based Genosensor

    Directory of Open Access Journals (Sweden)

    Renata P. A. Balvedi

    2014-05-01

    Full Text Available This paper describes methodology for direct and indirect detections of a specific oligonucleotide for Epstein-Barr virus (EBV using electrochemical techniques. The sequence of oligonucleotide probe (EBV1 revealed a high sequence identity (100% with the EBV genome. For the development of the genosensor, EBV1 was grafted to the platform sensitized with poly(4-aminothiophenol. After that, the hybridization reaction was carried out with the complementary target (EBV2 on the modified electrode surface using ethidium bromide as DNA intercalator. The oxidation peak currents of ethidium bromide increased linearly with the values of the concentration of the complementary sequences in the range from 3.78 to 756 µmol·L−1. In nonstringent experimental conditions, this genosensor can detect 17.32 nmol·L−1 (three independent experiments of oligonucleotide target, discriminating between complementary and non-complementary oligonucleotides, as well as differentiating one-base mismatch, as required for detection of genetic diseases caused by point mutations. The biosensor also displayed high specificity to the EBV target with elimination of interference from mix (alanine, glucose, uric acid, ascorbic acid, bovine serum albumin (BSA, glutamate and glycine and good stability (120 days. In addition, it was possible to observe differences between hybridized and non-hybridized surfaces through atomic force microscopy.

  16. Distributivity and Agreement mismatches in Serbian

    NARCIS (Netherlands)

    Bosnic, Ana

    2016-01-01

    This paper presents a truth value judgment study done on two types of numerals in the Serbian numerical system and corresponding verbal agreement mismatch that is characteristic for the numerals in question. Recent work on agreement and distributivity suggests that singular verbal marking promotes d

  17. Network Intrusion Detection based on GMKL Algorithm

    Directory of Open Access Journals (Sweden)

    Li Yuxiang

    2013-06-01

    Full Text Available According to the 31th statistical reports of China Internet network information center (CNNIC, by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing the information in the computer system or network we can detect any possible behaviors that can damage the availability, integrity and confidentiality of the computer resource, and make timely treatment to these behaviors which have important research significance to improve the operation environment of network and network service. At present, the Neural Network, Support Vector machine (SVM and Hidden Markov Model, Fuzzy inference and Genetic Algorithms are introduced into the research of network intrusion detection, trying to build a healthy and secure network operation environment. But most of these algorithms are based on the total sample and it also hypothesizes that the number of the sample is infinity. But in the field of network intrusion the collected data often cannot meet the above requirements. It often shows high latitudes, variability and small sample characteristics. For these data using traditional machine learning methods are hard to get ideal results. In view of this, this paper proposed a Generalized Multi-Kernel Learning method to applied to network intrusion detection. The Generalized Multi-Kernel Learning method can be well applied to large scale sample data, dimension complex, containing a large number of heterogeneous information and so on. The experimental results show that applying GMKL to network attack detection has high classification precision and low abnormal practical precision.

  18. Attribute and topology based change detection in a constellation of previously detected objects

    Energy Technology Data Exchange (ETDEWEB)

    Paglieroni, David W.; Beer, Reginald N.

    2016-01-19

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  19. Enhanced annealing of mismatched oligonucleotides using a novel melting curve assay allows efficient in vitro discrimination and restriction of a single nucleotide polymorphism

    Directory of Open Access Journals (Sweden)

    Chan Chee

    2011-08-01

    Full Text Available Abstract Background Many SNP discrimination strategies employ natural restriction endonucleases to discriminate between allelic states. However, SNPs are often not associated with a restriction site and therefore, a number of attempts have been made to generate sequence-adaptable restriction endonucleases. In this study, a simple, sequence-adaptable SNP discrimination mechanism between a 'wild-type' and 'mutant' template is demonstrated. This model differs from other artificial restriction endonuclease models as cis- rather than trans-orientated regions of single stranded DNA were generated and cleaved, and therefore, overcomes potential issues of either inefficient or non-specific binding when only a single variant is targeted. Results A series of mismatch 'bubbles' that spanned 0-5-bp surrounding a point mutation was generated and analysed for sensitivity to S1 nuclease. In this model, generation of oligonucleotide-mediated ssDNA mismatch 'bubbles' in the presence of S1 nuclease resulted in the selective degradation of the mutant template while maintaining wild-type template integrity. Increasing the size of the mismatch increased the rate of mutant sequence degradation, until a threshold above which discrimination was lost and the wild-type sequence was degraded. This level of fine discrimination was possible due to the development of a novel high-resolution melting curve assay to empirically determine changes in Tm (~5.0°C per base-pair mismatch and to optimise annealing conditions (~18.38°C below Tm of the mismatched oligonucleotide sets. Conclusions The in vitro 'cleavage bubble' model presented is sequence-adaptable as determined by the binding oligonucleotide, and hence, has the potential to be tailored to discriminate between any two or more SNPs. Furthermore, the demonstrated fluorometric assay has broad application potential, offering a rapid, sensitive and high-throughput means to determine Tm and annealing rates as an alternative

  20. Self-Oscillation-Based Frequency Tracking for the Drive and Detection of Resonance Magnetometers.

    Science.gov (United States)

    Tian, Zheng; Ren, Dahai; You, Zheng

    2016-05-21

    This paper reports a drive and detection method for Micro-Electro-Mechanical System (MEMS)-based Lorentz-force resonance magnetometers. Based on the proposed MEMS magnetometer, a drive and detection method was developed by using self-oscillation to adjust the mismatch between the mechanical resonance frequency and the coil drive frequency as affected by temperature fluctuations and vibration amplitude changes. Not only was the signal-to-noise ratio enhanced by the proposed method compared to the traditional method, but the test system automatically reached resonance frequency very rapidly when powered on. Moreover, the linearity and the measurement range were improved by the magnetic feedback generated by the coil. Test results indicated that the sensitivity of the proposed magnetometer is 59.6 mV/μT and its noise level is 0.25 μT. When operating in ±65 μT, its nonlinearity is 2.5‰-only one-tenth of the former prototype. Its power consumption is only about 250 mW and its size is only 28 mm × 28 mm × 10 mm, or about one-eighth of the original sensor; further, unlike the former device, it can distinguish both positive and negative magnetic fields. The proposed method can also be applied in other MEMS sensors such as gyroscopes and micromirrors to enhance their frequency tracking ability.

  1. DNA Hybridization Detection Based on Resonance Frequency Readout in Graphene on Au SPR Biosensor

    Directory of Open Access Journals (Sweden)

    Md. Biplob Hossain

    2016-01-01

    Full Text Available This paper demonstrates a numerical modeling of surface plasmon resonance (SPR biosensor for detecting DNA hybridization by recording the resonance frequency characteristics (RFC. The proposed sensor is designed based on graphene material as biomolecular recognition elements (BRE and the sharp SPR curve of gold (Au. Numerical analysis shows that the variation of RFC for mismatched DNA strands is quiet negligible whereas that for complementary DNA strands is considerably countable. Here, graphene is used to perform faster immobilization between target DNA and probe DNA. The usage of graphene also changes the RFC that ensure hybridization of DNA event by utilizing its optochemical property. In addition, proposed sensor successfully distinguishes between hybridization and single-nucleotide polymorphisms (SNP by observing the variation level of RFC and maximum transmittance. Therefore, the proposed frequency readout based SPR sensor could potentially open a new window of detection for biomolecular interactions. We also highlight the advantage of using graphene sublayer by performing the sensitivity analysis. Sandwiching of each graphene sublayer enhances 95% sensitivity comparing with conventional SPR sensor.

  2. Edge detection based on directional space

    Institute of Scientific and Technical Information of China (English)

    YUAN Wei-qi; LI De-sheng

    2006-01-01

    A new method for edge detection based on directional space is proposed.The principle is that:firstly,the directional differential space is set up in which the ridge edge pixels and valley edge pixels are abstracted with the help of the method of logical judgments along the direction of differential function,forming a directional roof edge map;secondly,step edge pixels are abstracted between the neighboring directional ridge edge and directional valley edge along the direction of differential function;finally,the ridge edge map,valley edge map and step edge map gained along different directions are combined into corresponding ridge edge map,valley edge map and step edge map.This method is different from classical algorithms in which the gray differential values of the mutual vertical direction are combined into one gradient value.The experiment of edge detection is made for the images of nature scenery,human body and accumulative raw material,whose result is compared with the one of classical algorithms and showing the robustness of the proposed method.

  3. Design of nonlinear compensated bandgap reference based on mismatch control%基于失配控制的非线性补偿带隙基准电路设计

    Institute of Scientific and Technical Information of China (English)

    吴金; 聂卫东; 常昌远; 渠宁; 李浩

    2011-01-01

    在一阶线性补偿基准非线性温度特性分析基础上,提出了利用基准电路内部可控非线性失调电压实现高阶补偿的方法,即利用3路互偏结构代替传统基准电路中的2路自偏置结构,在宽温度范围内,理想状态下的基准温度系数相比一阶线性补偿明显降低.与其他类型的分段高阶补偿相比,基于失配补偿的带隙基准不仅结构简单,而且工艺稳定性更好.基于CSMC 0.18μmCMOS工艺完成了该基准电路的MPW验证,在-20~120℃温度范围内,基准温度系数的测试结果最低为6.2×10-6/℃.基于理论与实测结果误差产生原因的分析,提出了电阻修调以及面积功耗折中方面的改进措施.%Based on the analysis of the nonlinear-temperature characteristics of the first-order linear compensated bandgap reference (BGR), a high-order nonlinear compensation method is proposed by utilizing the controllable systemic nonlinear offset voltage within the bandgap circuit, where the three-branches coupling biasing structures are used to replace the traditional two-branches self-biasing structures, and the ideal temperature coefficient within a wide temperature range is reduced significantly as compared to that of the first-order linear compensation one. Besides, compared with other types of segmental high-order compensated circuit, the mismatch compensated BGR is not only simple in circuit structure but also more stable in manufacture process. The proposed reference is fabricated in CSMC 0. 18 μm CMOS process, and the tested minimum temperature coefficient within a temperature range from -20 to 120 ℃ is 6. 2 × 10-6/℃. Finally, based on the error analysis between theory and experimental results, improvements in resistor trimming and tradeoffs between area and power are proposed.

  4. Circuit mismatch influence on performance of paralleling silicon carbide MOSFETs

    DEFF Research Database (Denmark)

    Li, Helong; Munk-Nielsen, Stig; Pham, Cam

    2014-01-01

    This paper focuses on circuit mismatch influence on performance of paralleling SiC MOSFETs. Power circuit mismatch and gate driver mismatch influences are analyzed in detail. Simulation and experiment results show the influence of circuit mismatch and verify the analysis. This paper aims to give...... suggestions on paralleling discrete SiC MOSFETs and designing layout of power modules with paralleled SiC MOSFETs dies....

  5. Detecting Soft Errors in Stencil based Computations

    Energy Technology Data Exchange (ETDEWEB)

    Sharma, V. [Univ. of Utah, Salt Lake City, UT (United States); Gopalkrishnan, G. [Univ. of Utah, Salt Lake City, UT (United States); Bronevetsky, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-05-06

    Given the growing emphasis on system resilience, it is important to develop software-level error detectors that help trap hardware-level faults with reasonable accuracy while minimizing false alarms as well as the performance overhead introduced. We present a technique that approaches this idea by taking stencil computations as our target, and synthesizing detectors based on machine learning. In particular, we employ linear regression to generate computationally inexpensive models which form the basis for error detection. Our technique has been incorporated into a new open-source library called SORREL. In addition to reporting encouraging experimental results, we demonstrate techniques that help reduce the size of training data. We also discuss the efficacy of various detectors synthesized, as well as our future plans.

  6. Comic image understanding based on polygon detection

    Science.gov (United States)

    Li, Luyuan; Wang, Yongtao; Tang, Zhi; Liu, Dong

    2013-01-01

    Comic image understanding aims to automatically decompose scanned comic page images into storyboards and then identify the reading order of them, which is the key technique to produce digital comic documents that are suitable for reading on mobile devices. In this paper, we propose a novel comic image understanding method based on polygon detection. First, we segment a comic page images into storyboards by finding the polygonal enclosing box of each storyboard. Then, each storyboard can be represented by a polygon, and the reading order of them is determined by analyzing the relative geometric relationship between each pair of polygons. The proposed method is tested on 2000 comic images from ten printed comic series, and the experimental results demonstrate that it works well on different types of comic images.

  7. Error detection based on MB types

    Institute of Scientific and Technical Information of China (English)

    FANG Yong; JEONG JeChang; WU ChengKe

    2008-01-01

    This paper proposes a method of error detection based on macroblock (MB) types for video transmission. For decoded inter MBs, the absolute values of received residues are accumulated. At the same time, the intra textural complexity of the current MB is estimated by that of the motion compensated reference block. We compare the inter residue with the intra textural complexity. If the inter residue is larger than the intra textural complexity by a predefined threshold, the MB is con-sidered to be erroneous and errors are concealed. For decoded intra MBs, the connective smoothness of the current MB with neighboring MBs is tested to find erroneous MBs. Simulation results show that the new method can remove those seriously-corrupted MBs efficiently. Combined with error concealment, the new method improves the recovered quality at the decoder by about 0.5-1 dB.

  8. Aptamer Based Microsphere Biosensor for Thrombin Detection

    Directory of Open Access Journals (Sweden)

    Xudong Fan

    2006-08-01

    Full Text Available We have developed an optical microsphere resonator biosensor using aptamer asreceptor for the measurement of the important biomolecule thrombin. The sphere surface ismodified with anti-thrombin aptamer, which has excellent binding affinity and selectivityfor thrombin. Binding of the thrombin at the sphere surface is monitored by the spectralposition of the microsphere’s whispering gallery mode resonances. A detection limit on theorder of 1 NIH Unit/mL is demonstrated. Control experiments with non-aptameroligonucleotide and BSA are also carried out to confirm the specific binding betweenaptamer and thrombin. We expect that this demonstration will lead to the development ofhighly sensitive biomarker sensors based on aptamer with lower cost and higher throughputthan current technology.

  9. The isothermal amplification detection of double-stranded DNA based on a double-stranded fluorescence probe.

    Science.gov (United States)

    Shi, Chao; Shang, Fanjin; Pan, Mei; Liu, Sen; Ma, Cuiping

    2016-06-15

    Here we have developed a novel method of isothermal amplification detection of double-stranded DNA (dsDNA) based on double-stranded fluorescence probe (ds-probe). Target dsDNA repeatedly generated single-stranded DNA (ssDNA) with polymerase and nicking enzyme. The ds-probe as a primer hybridized with ssDNA and extended to its 5'-end. The displaced ssDNA served as a new detection target to initiate above-described reaction. Meanwhile, the extended ds-probe could dynamically dissociate from ssDNA and self-hybridize, converting into a turn-back structure to initiate another amplification reaction. In particular, the ds-probe played a key role in the entire experimental process, which not only was as a primer but also produced the fluorescent signal by an extension and displacement reaction. Our method could detect the pBluescript II KS(+) plasmid with a detection limit of 2.3 amol, and it was also verified to exhibit a high specificity, even one-base mismatch. Overall, it was a true isothermal dsDNA detection strategy with a strongly anti-jamming capacity and one-pot, only requiring one ds-probe, which greatly reduced the cost and the probability of contamination. With its advantages, the approach of dsDNA detection will offer a promising tool in the field of point-of-care testing (POCT).

  10. Fabrication of an electrochemical DNA-based biosensor for Bacillus cereus detection in milk and infant formula.

    Science.gov (United States)

    Izadi, Zahra; Sheikh-Zeinoddin, Mahmoud; Ensafi, Ali A; Soleimanian-Zad, Sabihe

    2016-06-15

    This paper describes fabrication of a DNA-based Au-nanoparticle modified pencil graphite electrode (PGE) biosensor for detection of Bacillus cereus, causative agent of two types of food-borne disease, i.e., emetic and diarrheal syndrome. The sensing element of the biosensor was comprised of gold nanoparticles (GNPs) self-assembled with single-stranded DNA (ssDNA) of nheA gene immobilized with thiol linker on the GNPs modified PGE. The size, shape and dispersion of the GNPs were characterized by field emission scanning electron microscope (FESEM). Detection of B. cereus was carried out based on an increase in the charge transfer resistance (Rct) of the biosensor due to hybridization of the ss-DNA with target DNA. An Atomic force microscope (AFM) was used to confirm the hybridization. The biosensor sensitivity in pure cultures of B. cereus was found to be 10(0) colony forming units per milliliter (CFU/mL) with a detection limit of 9.4 × 10(-12) mol L(-1). The biosensor could distinguish complementary from mismatch DNA sequence. The proposed biosensor exhibited a rapid detection, low cost, high sensitivity to bacterial contamination and could exclusively and specifically detect the target DNA sequence of B. cereus from other bacteria that can be found in dairy products. Moreover, the DNA biosensor exhibited high reproducibility and stability, thus it may be used as a suitable biosensor to detect B. cereus and to become a portable system for food quality control.

  11. Electrochemical biosensors for detection of point mutation based on surface ligation reaction and oligonucleotides modified gold nanoparticles.

    Science.gov (United States)

    Wang, Qing; Yang, Lijuan; Yang, Xiaohai; Wang, Kemin; He, Leiliang; Zhu, Jinqing

    2011-03-04

    An electrochemical method for point mutation detection based on surface ligation reaction and oligonucleotides (ODNs) modified gold nanoparticles (AuNPs) was demonstrated. Point mutation identification was achieved using Escherichia coli DNA ligase. This system for point mutation detection relied on a sandwich assay comprising capture ODN immobilized on Au electrodes, target ODN and ligation ODN. Because of the sequence-specific surface reactions of E. coli DNA ligase, the ligation ODN covalently linked to the capture ODN only in the presence of a perfectly complementary target ODN. The presence of ligation products on Au electrode was detected using chronocoulometry through hybridization with reporter ODN modified AuNPs. The use of AuNPs improved the sensitivity of chronocoulometry in this approach, a detection limit of 0.9 pM complementary ODN was obtained. For single base mismatched ODN (smODN), a negligible signal was observed. Even if the concentration ratio of complementary ODN to smODN was decreased to 1:1000, a detectable signal was observed. This work may provide a specific, sensitive and cost-efficient approach for point mutant detection.

  12. Architectural mismatch issues in identity management deployment

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...

  13. "Molecular beacon"-based fluorescent assay for selective detection of glutathione and cysteine.

    Science.gov (United States)

    Xu, Hui; Hepel, Maria

    2011-02-01

    We report on the development of a fluorescence turn-on "molecular beacon" probe for the detection of glutathione (GSH) and cysteine (Cys). The method is based on a competitive ligation of Hg(2+) ions by GSH/Cys and thymine-thymine (T-T) mismatches in a DNA strand of the self-hybridizing beacon strand. The assay relies on the distance-dependent optical properties of the fluorophore/quencher pair attached to the ends of the molecular beacon DNA strand. In a very selective coordination of Hg(2+) to GSH/Cys, the fluorophore/quencher distance increases concomitantly with the dehybridization and dissociation of the beacon stem T-Hg(2+)-T due to the extraction of Hg(2+) ions. This process results in switching the molecular beacon to the "on" state. The concentration range of the probe is 4-200 nM with the limit of detection (LOD) of 4.1 nM for GSH and 4.2 nM Cys. The probe tested satisfactorily against interference for a range of amino acids including sulfur-containing methionine.

  14. ADAPTIVE CALIBRATION OF I AND Q MISMATCH IN QUADRATURE RECEIVER

    Institute of Scientific and Technical Information of China (English)

    Yang Xuexian; Hou Zifeng; Zhang Qunying; Ning Yanqing

    2002-01-01

    The mismatch of in-phase and quadrature channels in quadrature receiver affects and constrains radar detection performance in coherent radar. It is necessary to keep the in-phase and quadrature branches symmetrical. In this letter, an adaptive method to detect imbalance parameters is derived by means of evaluating channel errors from the received signal sequences.No matter how the bias degree of the gain and phase errors in I/Q channels are, the proposed adaptive scheme can obtain good calibration results. And the required calculations are only a few multiplications and additions. No need of a special test signal, the introduced method is simple to implement and easy to operate.

  15. Is it time to move mismatch negativity into the clinic?

    Science.gov (United States)

    Schall, Ulrich

    2016-04-01

    Since its inception in the 1970s, the mismatch negativity (MMN) event-related potential has improved our understanding of pre-attentive detection of rule violations, which is a fundamental cognitive process considered by some a form of "primitive intelligence". The body of research to date ranges from animal studies (i.e. when investigating the neural mechanisms and pharmacological properties of MMN generation) to researching the psychophysiological nature of human consciousness. MMN therefore offers the possibility to detect abnormal functioning in the neural system involved in MMN generation, such as it occurs in some neurodevelopmental disorders or patients in vegetative state. While the clinical research data holds considerable promise for translation into clinical practice, standardization and normative data of an optimized (i.e. disorder-specific) MMN recording algorithm is needed in order for MMN to become a valuable clinical investigation tool.

  16. Skill mismatch and overeducation in transition economies

    OpenAIRE

    Kupets, Olga

    2015-01-01

    Large imbalances between the supply and demand for skills in transition economies are driven by rapid economic restructuring, misalignment of the education system with labor market needs, and underdeveloped adult education and training systems. The costs of mismatches can be large and long-lasting for workers, firms, and economies, with long periods of overeducation implying a loss of human capital for individuals and ineffective use of resources for the economy. To make informed decisions, p...

  17. Electrochemical detection of a Vibrio parahaemolyticus sequence-specific gene based on a gold electrode modified with a single stranded probe

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    An electrochemical DNA biosensor for specific-sequences detection of Vibrio parahaemolyticus (VP) was fabricated.A singlestranded 20-mer oligonucleotide (ssDNA) and 6-mercapto-1-hexanol (MCH) were immobilized via a thiol linker on gold disk electrodes by self-assembling.The ssDNA underwent hybridization in a hybridization solution containing complementary or non-complementary or single base pair mismatched DNA sequences of VP.Examination of changes in response to these three target DNAs showed that the developed biosensor had a high selectivity and sensitivity.

  18. Somatosensory mismatch response in young and elderly adults

    Directory of Open Access Journals (Sweden)

    Juho M. Strömmer

    2014-10-01

    Full Text Available Aging is associated with cognitive decline and alterations in early perceptual processes. Studies in the auditory and visual modalities have shown that the mismatch negativity (or the mismatch response, MMR, an event-related potential (ERP elicited by a deviant stimulus in a background of homogenous events, diminishes with aging and cognitive decline. However, the effects of aging on the somatosensory MMR are not known. In the current study, we recorded ERPs to electrical pulses to different fingers of the left hand in a passive oddball experiment in young (22–36 years and elderly (66–95 years adults engaged in a visual task. The MMR was found to deviants as compared to standards at two latency ranges: 180–220 ms and 250–290 ms post-stimulus onset. At 180–220 ms, within the young, the MMR was found at medial electrode sites, whereas aged did not show any amplitude difference between the stimulus types at the same latency range. At 250–290 ms, the MMR was evident with attenuated amplitude and narrowed scalp distribution among aged (Fz compared to young (fronto-centrally and lateral parietal sites. Hence, the results reveal that the somatosensory change detection mechanism is altered in aging. The somatosensory MMR can be used as a reliable measure of age-related changes in sensory-cognitive functions.

  19. Impact of Slow Blood Filling via Collaterals on Infarct Growth: Comparison of Mismatch and Collateral Status

    Science.gov (United States)

    Son, Jeong Pyo; Lee, Mi Ji; Kim, Suk Jae; Chung, Jong-Won; Cha, Jihoon; Kim, Gyeong-Moon; Chung, Chin-Sang; Lee, Kwang Ho; Bang, Oh Young

    2017-01-01

    Background and Purpose Perfusion-diffusion mismatch has been evaluated to determine whether the presence of a target mismatch helps to identify patients who respond favorably to recanalization therapies. We compared the impact on infarct growth of collateral status and the presence of a penumbra, using magnetic resonance perfusion (MRP) techniques. Methods Consecutive patients who were candidates for recanalization therapy and underwent serial diffusion-weighted imaging (DWI) and MRP were enrolled. A collateral flow map derived from MRP source data was generated by automatic post-processing. The impact of a target mismatch (Tmax>6 s/apparent diffusion coefficient (ADC) volume≥1.8, ADC volume10 s for ADC volume<100 mL) on infarct growth was compared with MR-based collateral grading on day 7 DWI, using multivariate linear regression analysis. Results Among 73 patients, 55 (75%) showed a target mismatch, whereas collaterals were poor in 14 (19.2%), intermediate in 36 (49.3%), and good in 23 (31.5%) patients. After adjusting for initial severity of stroke, early recanalization (P<0.001) and the MR-based collateral grading (P=0.001), but not the presence of a target mismatch, were independently associated with infarct growth. Even in patients with a target mismatch and successful recanalization, the degree of infarct growth depended on the collateral status. Perfusion status at later Tmax time points (beyond the arterial phase) was more closely correlated with collateral status. Conclusions Patients with good collaterals show a favorable outcome in terms of infarct growth, regardless of the presence of a target mismatch pattern. The presence of slow blood filling predicts collateral status and infarct growth. PMID:28030891

  20. Eukaryotic Mismatch Repair in Relation to DNA Replication.

    Science.gov (United States)

    Kunkel, Thomas A; Erie, Dorothy A

    2015-01-01

    Three processes act in series to accurately replicate the eukaryotic nuclear genome. The major replicative DNA polymerases strongly prevent mismatch formation, occasional mismatches that do form are proofread during replication, and rare mismatches that escape proofreading are corrected by mismatch repair (MMR). This review focuses on MMR in light of increasing knowledge about nuclear DNA replication enzymology and the rate and specificity with which mismatches are generated during leading- and lagging-strand replication. We consider differences in MMR efficiency in relation to mismatch recognition, signaling to direct MMR to the nascent strand, mismatch removal, and the timing of MMR. These studies are refining our understanding of relationships between generating and repairing replication errors to achieve accurate replication of both DNA strands of the nuclear genome.

  1. Lagrangian based methods for coherent structure detection

    Energy Technology Data Exchange (ETDEWEB)

    Allshouse, Michael R., E-mail: mallshouse@chaos.utexas.edu [Center for Nonlinear Dynamics and Department of Physics, University of Texas at Austin, Austin, Texas 78712 (United States); Peacock, Thomas, E-mail: tomp@mit.edu [Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

    2015-09-15

    There has been a proliferation in the development of Lagrangian analytical methods for detecting coherent structures in fluid flow transport, yielding a variety of qualitatively different approaches. We present a review of four approaches and demonstrate the utility of these methods via their application to the same sample analytic model, the canonical double-gyre flow, highlighting the pros and cons of each approach. Two of the methods, the geometric and probabilistic approaches, are well established and require velocity field data over the time interval of interest to identify particularly important material lines and surfaces, and influential regions, respectively. The other two approaches, implementing tools from cluster and braid theory, seek coherent structures based on limited trajectory data, attempting to partition the flow transport into distinct regions. All four of these approaches share the common trait that they are objective methods, meaning that their results do not depend on the frame of reference used. For each method, we also present a number of example applications ranging from blood flow and chemical reactions to ocean and atmospheric flows.

  2. Biomimetic visual detection based on insect neurobiology

    Science.gov (United States)

    O'Carroll, David C.

    2001-11-01

    With a visual system that accounts for as much as 30% of the lifted mass, flying insects such as dragonflies and hoverflies invest more in vision than any other animal. Impressive visual performance is subserved by a surprisingly simple visual system. In a typical insect eye, between 2,000 and 30,000 pixels in the image are analyzed by fewer than 200,000 neurons in underlying neural circuits. The combination of sophisticated visual processing with an approachable level of complexity has made the insect visual system a leading model for biomimetic approaches to computer vision. Much neurobiological research has focused on neural circuits used for detection of moving patterns (e.g. optical flow during flight) and moving targets (e.g. prey). Research from several labs has led to great advances in our understanding of the neural mechanisms involved, and has spawned neuromorphic hardware based on key processes identified in neurobiological experiments. Despite its attractions, the highly non-linear nature of several key stages in insect visual processing presents a challenge to understanding. I will describe examples of adaptive elements of neural circuits in the fly visual system which analyze the direction and velocity of wide-field optical flow patterns and the result of experiments that suggest that these non-linearities may contribute to robust responses to natural image motion.

  3. Ground-Based Detection of Exoatmospheric Calcium

    Science.gov (United States)

    Rojo, Patricio M.; Astudillo-Defru, Nicola

    2014-11-01

    Data acquired with HDS@Subaru for HD209458b is re-analyzed. A new pipeline performs an automated search for the exoatmospheric presence of several elements without any a-priori assumptions on its existence or strength. We analyzed thousands of lines in the full spectral range of this optical echelle spectrograph using a robust method to correct for the telluric contamination. We recover previous detections of Sodium and Halpha, and present the first strong detection of Calcium in an Extrasolar Atmosphere as well as the tentative detection of other elements. The Calcium detection is in disagreement with theoretical thermal-equilibrium models.

  4. Effective Steganography Detection Based On Data Compression

    CERN Document Server

    Nechta, Ivan

    2011-01-01

    This article describes novel text steganalysis method. The archiver "Bzip2" used for detection stegotext generated by Texto stegosystem. Experiments show that proposed approach gets better performance than typical existing methods. The detection accuracy exceeds 99.98% for text segments with size 400 bytes.

  5. Dependence-Based Anomaly Detection Methodologies

    Science.gov (United States)

    2012-08-16

    tricks the user to enter their Netflix login. Detecting it is out of our scope and requires site authentication (i.e., certification verification... Netflix login. Detecting it is out of our scope and requires site authentication (i.e., certification verification) and user education. The preliminary

  6. Network Anomaly Detection Based on Wavelet Analysis

    Directory of Open Access Journals (Sweden)

    Ali A. Ghorbani

    2008-11-01

    Full Text Available Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  7. Blind ICA detection based on second-order cone programming for MC-CDMA systems

    Science.gov (United States)

    Jen, Chih-Wei; Jou, Shyh-Jye

    2014-12-01

    The multicarrier code division multiple access (MC-CDMA) technique has received considerable interest for its potential application to future wireless communication systems due to its high data rate. A common problem regarding the blind multiuser detectors used in MC-CDMA systems is that they are extremely sensitive to the complex channel environment. Besides, the perturbation of colored noise may negatively affect the performance of the system. In this paper, a new coherent detection method will be proposed, which utilizes the modified fast independent component analysis (FastICA) algorithm, based on approximate negentropy maximization that is subject to the second-order cone programming (SOCP) constraint. The aim of the proposed coherent detection is to provide robustness against small-to-medium channel estimation mismatch (CEM) that may arise from channel frequency response estimation error in the MC-CDMA system, which is modulated by downlink binary phase-shift keying (BPSK) under colored noise. Noncoherent demodulation schemes are preferable to coherent demodulation schemes, as the latter are difficult to implement over time-varying fading channels. Differential phase-shift keying (DPSK) is therefore the natural choice for an alternative modulation scheme. Furthermore, the new blind differential SOCP-based ICA (SOCP-ICA) detection without channel estimation and compensation will be proposed to combat Doppler spread caused by time-varying fading channels in the DPSK-modulated MC-CDMA system under colored noise. In this paper, numerical simulations are used to illustrate the robustness of the proposed blind coherent SOCP-ICA detector against small-to-medium CEM and to emphasize the advantage of the blind differential SOCP-ICA detector in overcoming Doppler spread.

  8. Characterization of PolyA and PolyC mismatches by Raman spectroscopy

    Institute of Scientific and Technical Information of China (English)

    Yubo Liao; Yaoyong Meng; Haodong Lei; Ying Wang

    2008-01-01

    A.C mismatches are studied by Raman spectral characterization of PolyA, PolyC, and their equimolar complex in solution of 0.14 mol/L Na+,pH7.0.Experimental results show that A·C mismatches occur to be A/B (mainly A) conformers, and unlike Watson-Crick base pairing, this kind of mismatches is stabilized by only one hydrogen bond involving cytosine N4H2 and adenine N7.The formation of A·C complex makes the base stacking interactions much stronger, and conformation of the backbone more ordered, which leads to obvious Raman hypochromic effect with some shifts in corresponding bands.

  9. A label-free colorimetric aptasensor for simple, sensitive and selective detection of Pt (II) based on platinum (II)-oligonucleotide coordination induced gold nanoparticles aggregation.

    Science.gov (United States)

    Fan, Daoqing; Zhai, Qingfeng; Zhou, Weijun; Zhu, Xiaoqing; Wang, Erkang; Dong, Shaojun

    2016-11-15

    Herein, a gold nanoparticles (AuNPs) based label-free colorimetric aptasensor for simple, sensitive and selective detection of Pt (II) was constructed for the first time. Four bases (G-G mismatch) mismatched streptavidin aptamer (MSAA) was used to protect AuNPs from salt-induced aggregation and recognize Pt (II) specifically. Only in the presence of Pt (II), coordination occurs between G-G bases and Pt (II), leading to the activation of streptavidin aptamer. Streptavidin coated magnetic beads (MBs) were used as separation agent to separate Pt (II)-coordinated MSAA. The residual less amount of MSAA could not efficiently protect AuNPs anymore and aggregation of AuNPs will produce a colorimetric product. With the addition of Pt (II), a pale purple-to-blue color variation could be observed by the naked eye. A detection limit of 150nM and a linear range from 0.6μM to 12.5μM for Pt (II) could be achieved without any amplification.

  10. Visual mismatch negativity: A predictive coding view

    Directory of Open Access Journals (Sweden)

    Gabor eStefanics

    2014-09-01

    Full Text Available An increasing number of studies investigate the visual mismatch negativity (vMMN or use the vMMN as a tool to probe various aspects of human cognition. This paper reviews the theoretical underpinnings of vMMN in the light of methodological considerations and provides recommendations for measuring and interpreting the vMMN. The following key issues are discussed from the experimentalist’s point of view in a predictive coding framework: 1 experimental protocols and procedures to control ‘refractoriness’ effects; 2 methods to control attention; 3 vMMN and veridical perception.

  11. Barbed Congruence of Asymmetry and Mismatch

    Institute of Scientific and Technical Information of China (English)

    Xiao-Ju Dong; Yu-Xi Fu

    2007-01-01

    The X calculus is a model of concurrent and mobile systems. It emphasizes that communications are information exchanges. In the paper, two constructions are incorporated into the framework of the chi calculus, which are asymmetric communication and mismatch condition widely used in applications. Since the barbed bisimilarity has proved its generality and gained its popularity as an effective approach to generating a reasonable observational equivalence, we study both the operational and algebraic properties of the barbed bisimilarity in this enriched calculus. The investigation supports an improved understanding of the bisimulation behaviors of the model. It also gives a general picture of how the two constructions affect the observational theory.

  12. Anomica: Fast Support Vector Based Novelty Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we propose ν-Anomica, a novel anomaly detection technique that can be trained on huge data sets with much reduced running time compared to the...

  13. Detecting Bots Based on Keylogging Activities

    CERN Document Server

    Al-Hammadi, Yousof

    2010-01-01

    A bot is a piece of software that is usually installed on an infected machine without the user's knowledge. A bot is controlled remotely by the attacker under a Command and Control structure. Recent statistics show that bots represent one of the fastest growing threats to our network by performing malicious activities such as email spamming or keylogging. However, few bot detection techniques have been developed to date. In this paper, we investigate a behavioural algorithm to detect a single bot that uses keylogging activity. Our approach involves the use of function calls analysis for the detection of the bot with a keylogging component. Correlation of the frequency of a specified time-window is performed to enhance he detection scheme. We perform a range of experiments with the spybot. Our results show that there is a high correlation between some function calls executed by this bot which indicates abnormal activity in our system.

  14. Concentrative meditation enhances preattentive processing: a mismatch negativity study.

    Science.gov (United States)

    Srinivasan, Narayanan; Baijal, Shruti

    2007-10-29

    The mismatch negativity (MMN) paradigm that is an indicator of preattentive processing was used to study the effects of concentrative meditation. Sudarshan Kriya Yoga meditation is a yogic exercise practiced in an ordered sequence beginning with breathing exercises, and ending with concentrative (Sahaj Samadhi) meditation. Auditory MMN waveforms were recorded at the beginning and after each of these practices for meditators, and equivalently after relaxation sessions for the nonmeditators. Overall meditators were found to have larger MMN amplitudes than nonmeditators. The meditators also exhibited significantly increased MMN amplitudes immediately after meditation suggesting transient state changes owing to meditation. The results indicate that concentrative meditation practice enhances preattentive perceptual processes, enabling better change detection in auditory sensory memory.

  15. Detection of Atmospheric Composition Based on Lidar

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Jinye; Tong Yala; Yang Xiaoling; Gong Jiaoli [School of science, Hubei University of Technology, Wuhan 430068 (China); Gong Wei, E-mail: yezi.zh@163.com [State Key Laboratory for Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, Wuhan 430079 (China)

    2011-02-01

    A summary overview about the types of lidar and their own applications on atmosphere detection is presented. Measurement of atmospheric aerosols by Mie lidar and Raman lidar is focused. The vertical profiles of aerosols in the atmosphere are retrieved. And at the same time, through analyzing aerosol vertical content distribution, the atmosphere boundary layer and the cloud are also observed. All the results show that the lidar has good performance on detecting the atmospheric composition.

  16. Vision-based vehicle detection and tracking algorithm design

    Science.gov (United States)

    Hwang, Junyeon; Huh, Kunsoo; Lee, Donghwi

    2009-12-01

    The vision-based vehicle detection in front of an ego-vehicle is regarded as promising for driver assistance as well as for autonomous vehicle guidance. The feasibility of vehicle detection in a passenger car requires accurate and robust sensing performance. A multivehicle detection system based on stereo vision has been developed for better accuracy and robustness. This system utilizes morphological filter, feature detector, template matching, and epipolar constraint techniques in order to detect the corresponding pairs of vehicles. After the initial detection, the system executes the tracking algorithm for the vehicles. The proposed system can detect front vehicles such as the leading vehicle and side-lane vehicles. The position parameters of the vehicles located in front are obtained based on the detection information. The proposed vehicle detection system is implemented on a passenger car, and its performance is verified experimentally.

  17. A non-canonical mismatch repair pathway in prokaryotes

    Science.gov (United States)

    Castañeda-García, A.; Prieto, A. I.; Rodríguez-Beltrán, J.; Alonso, N.; Cantillon, D.; Costas, C.; Pérez-Lago, L.; Zegeye, E. D.; Herranz, M.; Plociński, P.; Tonjum, T.; García de Viedma, D.; Paget, M.; Waddell, S. J.; Rojas, A. M.; Doherty, A. J.; Blázquez, J.

    2017-01-01

    Mismatch repair (MMR) is a near ubiquitous pathway, essential for the maintenance of genome stability. Members of the MutS and MutL protein families perform key steps in mismatch correction. Despite the major importance of this repair pathway, MutS–MutL are absent in almost all Actinobacteria and many Archaea. However, these organisms exhibit rates and spectra of spontaneous mutations similar to MMR-bearing species, suggesting the existence of an alternative to the canonical MutS–MutL-based MMR. Here we report that Mycobacterium smegmatis NucS/EndoMS, a putative endonuclease with no structural homology to known MMR factors, is required for mutation avoidance and anti-recombination, hallmarks of the canonical MMR. Furthermore, phenotypic analysis of naturally occurring polymorphic NucS in a M. smegmatis surrogate model, suggests the existence of M. tuberculosis mutator strains. The phylogenetic analysis of NucS indicates a complex evolutionary process leading to a disperse distribution pattern in prokaryotes. Together, these findings indicate that distinct pathways for MMR have evolved at least twice in nature. PMID:28128207

  18. A NOVEL THRESHOLD BASED EDGE DETECTION ALGORITHM

    Directory of Open Access Journals (Sweden)

    Y. RAMADEVI,

    2011-06-01

    Full Text Available Image segmentation is the process of partitioning/subdividing a digital image into multiple meaningful regions or sets of pixels regions with respect to a particular application. Edge detection is one of the frequently used techniques in digital image processing. The level to which the subdivision is carried depends on theproblem being viewed. Edges characterize boundaries and are therefore a problem of fundamental importance in image processing. There are many ways to perform edge detection. In this paper different Edge detection methods such as Sobel, Prewitt, Robert, Canny, Laplacian of Gaussian (LOG are used for segmenting the image. Expectation-Maximization (EM algorithm, OSTU and Genetic algorithms are also used. A new edge detection technique is proposed which detects the sharp and accurate edges that are not possible with the existing techniques. The proposed method with different threshold values for given input image is shown that ranges between 0 and 1 and it are observed that when the threshold value is 0.68 the sharp edges are recognised properly.

  19. Repair of mismatched basepairs in mammalian DNA

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, J.H.; Hare, J.T.

    1991-08-01

    We have concentrated on three specific areas of our research plan. Our greatest emphasis is on the role of single strand nicks in influencing template strand selection in mismatch repair. We have found, that the ability of a nick in one strand to influence which strand is repaired is not a simple function of distance from the mismatched site but rather that an hot spot where a nick is more likely to have an influence can exist. The second line was production of single-genotype heteroduplexes in order to examine independently the repair of T/G and A/C mispairs within the same sequence context as in our mixed mispair preparations. We have shown preparations of supercoiled heteroduplex can be prepared that were exclusively T/G or exclusively A/C at the mispair site. The third effort has been to understand the difference in repair bias of different cell lines or different transfection conditions as it may relate to different repair systems in the cell. We have identified some of the sources of variation, including cell cycle position. We hope to continue this work to more precisely identify the phase of the cell cycle.

  20. Scale Mismatches in Management of Urban Landscapes

    Directory of Open Access Journals (Sweden)

    Christine Alfsen-Norodom

    2006-12-01

    Full Text Available Urban landscapes constitute the future environment for most of the world’s human population. An increased understanding of the urbanization process and of the effects of urbanization at multiple scales is, therefore, key to ensuring human well-being. In many conventional natural resource management regimes, incomplete knowledge of ecosystem dynamics and institutional constraints often leads to institutional management frameworks that do not match the scale of ecological patterns and processes. In this paper, we argue that scale mismatches are particularly pronounced in urban landscapes. Urban green spaces provide numerous important ecosystem services to urban citizens, and the management of these urban green spaces, including recognition of scales, is crucial to the well-being of the citizens. From a qualitative study of the current management practices in five urban green spaces within the Greater Stockholm Metropolitan Area, Sweden, we found that 1 several spatial, temporal, and functional scales are recognized, but the cross-scale interactions are often neglected, and 2 spatial and temporal meso-scales are seldom given priority. One potential effect of the neglect of ecological cross-scale interactions in these highly fragmented landscapes is a gradual reduction in the capacity of the ecosystems to provide ecosystem services. Two important strategies for overcoming urban scale mismatches are suggested: 1 development of an integrative view of the whole urban social–ecological landscape, and 2 creation of adaptive governance systems to support practical management.

  1. Mismatch responses in the awake rat: evidence from epidural recordings of auditory cortical fields.

    Directory of Open Access Journals (Sweden)

    Fabienne Jung

    Full Text Available Detecting sudden environmental changes is crucial for the survival of humans and animals. In the human auditory system the mismatch negativity (MMN, a component of auditory evoked potentials (AEPs, reflects the violation of predictable stimulus regularities, established by the previous auditory sequence. Given the considerable potentiality of the MMN for clinical applications, establishing valid animal models that allow for detailed investigation of its neurophysiological mechanisms is important. Rodent studies, so far almost exclusively under anesthesia, have not provided decisive evidence whether an MMN analogue exists in rats. This may be due to several factors, including the effect of anesthesia. We therefore used epidural recordings in awake black hooded rats, from two auditory cortical areas in both hemispheres, and with bandpass filtered noise stimuli that were optimized in frequency and duration for eliciting MMN in rats. Using a classical oddball paradigm with frequency deviants, we detected mismatch responses at all four electrodes in primary and secondary auditory cortex, with morphological and functional properties similar to those known in humans, i.e., large amplitude biphasic differences that increased in amplitude with decreasing deviant probability. These mismatch responses significantly diminished in a control condition that removed the predictive context while controlling for presentation rate of the deviants. While our present study does not allow for disambiguating precisely the relative contribution of adaptation and prediction error processing to the observed mismatch responses, it demonstrates that MMN-like potentials can be obtained in awake and unrestrained rats.

  2. Adaptive skin detection based on online training

    Science.gov (United States)

    Zhang, Ming; Tang, Liang; Zhou, Jie; Rong, Gang

    2007-11-01

    Skin is a widely used cue for porn image classification. Most conventional methods are off-line training schemes. They usually use a fixed boundary to segment skin regions in the images and are effective only in restricted conditions: e.g. good lightness and unique human race. This paper presents an adaptive online training scheme for skin detection which can handle these tough cases. In our approach, skin detection is considered as a classification problem on Gaussian mixture model. For each image, human face is detected and the face color is used to establish a primary estimation of skin color distribution. Then an adaptive online training algorithm is used to find the real boundary between skin color and background color in current image. Experimental results on 450 images showed that the proposed method is more robust in general situations than the conventional ones.

  3. Antibody-based biological toxin detection

    Energy Technology Data Exchange (ETDEWEB)

    Menking, D.E.; Goode, M.T. [Army Edgewood Research, Development and Engineering Center, Aberdeen Proving Ground, MD (United States)

    1995-12-01

    Fiber optic evanescent fluorosensors are under investigation in our laboratory for the study of drug-receptor interactions for detection of threat agents and antibody-antigen interactions for detection of biological toxins. In a direct competition assay, antibodies against Cholera toxin, Staphylococcus Enterotoxin B or ricin were noncovalently immobilized on quartz fibers and probed with fluorescein isothiocyanate (FITC) - labeled toxins. In the indirect competition assay, Cholera toxin or Botulinum toxoid A was immobilized onto the fiber, followed by incubation in an antiserum or partially purified anti-toxin IgG. These were then probed with FITC-anti-IgG antibodies. Unlabeled toxins competed with labeled toxins or anti-toxin IgG in a dose dependent manner and the detection of the toxins was in the nanomolar range.

  4. Community Detection Based on Link Prediction Methods

    CERN Document Server

    Cheng, Hui-Min

    2016-01-01

    Community detection and link prediction are both of great significance in network analysis, which provide very valuable insights into topological structures of the network from diffrent perspectives. In this paper, we propose a novel community detection algorithm with inclusion of link prediction, motivated by the question whether link prediction can be devoted to improve the accuracy of community partition. For link prediction, we propose two novel indices to compute the similarity between each pair of nodes, one of which aims to add missing links, and the other tries to remove spurious edges. Extensive experiments are conducted on benchmark data sets, and the results of our proposed algorithm are compared with two classes of baselines. In conclusion, our proposed algorithm is competitive, revealing that link prediction does improve the precision of community detection.

  5. Memory detection 2.0: the first web-based memory detection test.

    Science.gov (United States)

    Kleinberg, Bennett; Verschuere, Bruno

    2015-01-01

    There is accumulating evidence that reaction times (RTs) can be used to detect recognition of critical (e.g., crime) information. A limitation of this research base is its reliance upon small samples (average n = 24), and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262) tried to hide 2 high salient (birthday, country of origin) and 2 low salient (favourite colour, favourite animal) autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research.

  6. Memory detection 2.0: the first web-based memory detection test.

    Directory of Open Access Journals (Sweden)

    Bennett Kleinberg

    Full Text Available There is accumulating evidence that reaction times (RTs can be used to detect recognition of critical (e.g., crime information. A limitation of this research base is its reliance upon small samples (average n = 24, and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262 tried to hide 2 high salient (birthday, country of origin and 2 low salient (favourite colour, favourite animal autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research.

  7. Model Based Fault Detection in a Centrifugal Pump Application

    DEFF Research Database (Denmark)

    Kallesøe, Carsten; Cocquempot, Vincent; Izadi-Zamanabadi, Roozbeh

    2006-01-01

    A model based approach for fault detection in a centrifugal pump, driven by an induction motor, is proposed in this paper. The fault detection algorithm is derived using a combination of structural analysis, observer design and Analytical Redundancy Relation (ARR) design. Structural consideration...... is capable of detecting four different faults in the mechanical and hydraulic parts of the pump.......A model based approach for fault detection in a centrifugal pump, driven by an induction motor, is proposed in this paper. The fault detection algorithm is derived using a combination of structural analysis, observer design and Analytical Redundancy Relation (ARR) design. Structural considerations...

  8. Effect of the degree of polar mismatching on traffic jam formation in fast axonal transport.

    Science.gov (United States)

    Kuznetsov, A V

    2010-12-01

    This paper simulates an axon with a region of reversed microtubule (MT) polarity, and investigates how the degree of polar mismatching in this region affects the formation of organelle traps in the axon. The model is based on modified Smith-Simmons equations governing molecular-motor-assisted transport in neurons. It is established that the structure that develops as a result of a region with disoriented MTs consists of two organelle traps, the trap to the left of this region accumulates plus-end-oriented organelles and the trap to the right of this region accumulates minus-end-oriented organelles. The presence of such a structure is shown to inhibit the transport of organelles down the axon. The degree by which the transport of organelles is inhibited depends on the degree of polar mismatching of MTs in the region between MT traps. Four cases with a different degree of polar mismatching are investigated.

  9. Core Quadrant Power Tilt Induced by Control Rods Axial Position Mismatch

    Energy Technology Data Exchange (ETDEWEB)

    Son, Seungbeom; Lee, Changhee; Woo, Haeseuk; Jung, Yilsup [KEPCO Nuclear Fuel, Daejeon (Korea, Republic of); Kim, Yonghee [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2014-05-15

    If the limits are not met, plant operation should be restricted at various conditions. Actually, core quadrant power tilt in many nuclear power plants has been occurred frequently. This study deals with the various general causes of the core quadrant power tilt, including the control rods axial position mismatch induced quadrant power tilt problem. Based on the simulation results in each control rods axial position mismatch in a same control bank, it was found that some control rods axial position mismatch (simply around 10 steps difference) can induce quadrant power tilt relatively high (around 1.5%). With the other causes induced QPT, it may exceed the technical specification limit (2%). So it is needed to drive the control rods in detail during the operation including power change mode.

  10. Daytime Locations in Spatial Mismatch: Job Accessibility and Employment at Reentry From Prison.

    Science.gov (United States)

    Sugie, Naomi F; Lens, Michael C

    2017-04-01

    Individuals recently released from prison confront many barriers to employment. One potential obstacle is spatial mismatch-the concentration of low-skilled, nonwhite job-seekers within central cities and the prevalence of relevant job opportunities in outlying areas. Prior research has found mixed results about the importance of residential place for reentry outcomes. In this article, we propose that residential location matters for finding work, but this largely static measure does not capture the range of geographic contexts that individuals inhabit throughout the day. We combine novel, real-time GPS information on daytime locations and self-reported employment collected from smartphones with sophisticated measures of job accessibility to test the relative importance of spatial mismatch based on residence and daytime locations. Our findings suggest that the ability of low-skilled, poor, and urban individuals to compensate for their residential deficits by traveling to job-rich areas is an overlooked and salient consideration in spatial mismatch perspectives.

  11. A microfluidic based optical particle detection method

    Science.gov (United States)

    Dou, James; Chen, Lu; Nayyar, Rakesh; Aitchison, Stewart

    2012-03-01

    An optical particle detection and analysis method is presented. This method combines the capillary microfluidics, integrated optics and novel image acquisition and analysis algorithms to form the basis of a portable or handheld cytometer instrument. Experimental results provided shows the testing results are closely matched with conventional flow cytometer data.

  12. On Bitstream Based Edge Detection Techniques

    Science.gov (United States)

    2009-01-01

    Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing , Addison-Wesley...Longman Publishing Co., Inc., Boston, MA, USA, 2001. [6] William K Pratt, Digital image processing , Wiley, New York :, 1991. [7] Miguel Segui Prieto and...bitstream processing 1. INTRODUCTION Edge detection is a vital part of image processing , which is used for extracting important features from an image

  13. Flow-based detection of DNS tunnels

    NARCIS (Netherlands)

    Ellens, W.; Zuraniewski, P.W.; Sperotto, A.; Schotanus, H.A.; Mandjes, M.; Meeuwissen, H.B.

    2013-01-01

    DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniq

  14. Effective analysis of cloud based intrusion detection system

    Directory of Open Access Journals (Sweden)

    Sanjay Ram

    2012-08-01

    Full Text Available The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS. People are paid more attention on intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, detecting all kinds of intrusions effectively requires a global view of the monitored network, Here, discuss about new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

  15. Congestion Control for Multipath Transport Control Protocol Based on Compensating for RTT Mismatch%一种基于链路传输延迟的MPTCP拥塞控制算法

    Institute of Scientific and Technical Information of China (English)

    陶洋; 周莉; 刘鹏

    2013-01-01

    由于传统TCP拥塞控制算法直接应用到MPTCP(Multipath Transport Control Protocol)中存在公平性问题,以及不能有效地发挥多路径传输的优势,因而从公平性方面对MPTCP现有拥塞控制算法进行研究.研究发现,现有的MPTCP拥塞控制算法均受到相同的回路时间限制.提出一种基于链路延迟的RTT补偿算法(Compensating for RTT mismatch,C-RTT ).该算法通过设置网络带宽占用比参数以及对MPTCP连接的子流设置侵略因子,从而保证瓶颈链路处MPTCP数据流和TCP数据流公平地共享可用带宽.最后通过NS3仿真实验证明,该算法能够有效地补偿链路中因RTT不等引起的公平性问题,并避免链路之间数据的非周期抖动,且保证了多路径传输的优越性.%As the traditional TCP congestion control algorithm in the application of MPTCP (MultiPath Transport Control Protocol) existing fairness issue, and not effectively playing the advantage of multipath transmission, hence the issue of fairness on the bottleneck link in MPTCP congestion control algorithm is researched. Through the research, it is found that existing MPTCP congestion control algorithms are limited to the same round-trip time. In this paper, a new algorithm named Compensating for RTT mismatch is proposed, which by setting a parameter of network bandwidth occupancy, and setting a aggressiveness to subflow in order to ensure share available bandwidth between MPTCP data flow and TCP data flow fair at the bottleneck. Finally NS3 simulation results prove that the algorithm can compensate performance deterioration of the link due to the RTT mismatch, and avoid the link between non-cycle jitter, and ensure the superiority of the multi-path transmission.

  16. Epitaxial growth of largely mismatched crystals on H-terminated Si(111) surfaces.

    Science.gov (United States)

    Asaoka, Hidehito

    2010-12-01

    A strontium or strontium oxide epitaxial layer was grown using a monoatomic buffer layer of hydrogen on silicon, in spite of a huge lattice mismatch. The onset of the initial growth stage of strontium crystals occur with only one atomic layer deposition. To investigate the growth mechanism in the highly mismatched system, combination analysis using neutron reflection, reflection high-energy electron diffraction, x-ray photoelectron spectra, and stress measurements is employed. The interface structure has opened up a new way to fabricate novel heterostructures, consisting of various kinds of one-, two- or three-dimensional materials for future silicon-based technology.

  17. A Novel Chip-based Spectrophotometer for Online Detection

    Institute of Scientific and Technical Information of China (English)

    Haoyuan Cai; Min-Hsien Wu; Zheng Cui

    2006-01-01

    A chip-based spectrophotometer integrated with optical fiber is successfully demonstrated. Grade concentration of lactate solution flowed through the chip to perform an online detection. The response time (100s) and Limit of Detection (LOD,50mg/L) of the device were measured. This device shows comparable performance with traditional commercial instrument,while greatly decreases the sample requirement per detection and reduces the size of total system, introducing a novel method for real-time detection.

  18. Hybrid Collision Detection Algorithm based on Image Space

    Directory of Open Access Journals (Sweden)

    XueLi Shen

    2013-07-01

    Full Text Available Collision detection is an important application in the field of virtual reality, and efficiently completing collision detection has become the research focus. For the poorly real-time defect of collision detection, this paper has presented an algorithm based on the hybrid collision detection, detecting the potential collision object sets quickly with the mixed bounding volume hierarchy tree, and then using the streaming pattern collision detection algorithm to make an accurate detection. With the above methods, it can achieve the purpose of balancing load of the CPU and GPU and speeding up the detection rate. The experimental results show that compared with the classic Rapid algorithm, this algorithm can effectively improve the efficiency of collision detection.

  19. Convergent transmission of RNAi guide-target mismatch information across Argonaute internal allosteric network.

    Directory of Open Access Journals (Sweden)

    Thomas T Joseph

    Full Text Available In RNA interference, a guide strand derived from a short dsRNA such as a microRNA (miRNA is loaded into Argonaute, the central protein in the RNA Induced Silencing Complex (RISC that silences messenger RNAs on a sequence-specific basis. The positions of any mismatched base pairs in an miRNA determine which Argonaute subtype is used. Subsequently, the Argonaute-guide complex binds and silences complementary target mRNAs; certain Argonautes cleave the target. Mismatches between guide strand and the target mRNA decrease cleavage efficiency. Thus, loading and silencing both require that signals about the presence of a mismatched base pair are communicated from the mismatch site to effector sites. These effector sites include the active site, to prevent target cleavage; the binding groove, to modify nucleic acid binding affinity; and surface allosteric sites, to control recruitment of additional proteins to form the RISC. To examine how such signals may be propagated, we analyzed the network of internal allosteric pathways in Argonaute exhibited through correlations of residue-residue interactions. The emerging network can be described as a set of pathways emanating from the core of the protein near the active site, distributed into the bulk of the protein, and converging upon a distributed cluster of surface residues. Nucleotides in the guide strand "seed region" have a stronger relationship with the protein than other nucleotides, concordant with their importance in sequence selectivity. Finally, any of several seed region guide-target mismatches cause certain Argonaute residues to have modified correlations with the rest of the protein. This arises from the aggregation of relatively small interaction correlation changes distributed across a large subset of residues. These residues are in effector sites: the active site, binding groove, and surface, implying that direct functional consequences of guide-target mismatches are mediated through the

  20. Convergent Transmission of RNAi Guide-Target Mismatch Information across Argonaute Internal Allosteric Network

    Science.gov (United States)

    Joseph, Thomas T.; Osman, Roman

    2012-01-01

    In RNA interference, a guide strand derived from a short dsRNA such as a microRNA (miRNA) is loaded into Argonaute, the central protein in the RNA Induced Silencing Complex (RISC) that silences messenger RNAs on a sequence-specific basis. The positions of any mismatched base pairs in an miRNA determine which Argonaute subtype is used. Subsequently, the Argonaute-guide complex binds and silences complementary target mRNAs; certain Argonautes cleave the target. Mismatches between guide strand and the target mRNA decrease cleavage efficiency. Thus, loading and silencing both require that signals about the presence of a mismatched base pair are communicated from the mismatch site to effector sites. These effector sites include the active site, to prevent target cleavage; the binding groove, to modify nucleic acid binding affinity; and surface allosteric sites, to control recruitment of additional proteins to form the RISC. To examine how such signals may be propagated, we analyzed the network of internal allosteric pathways in Argonaute exhibited through correlations of residue-residue interactions. The emerging network can be described as a set of pathways emanating from the core of the protein near the active site, distributed into the bulk of the protein, and converging upon a distributed cluster of surface residues. Nucleotides in the guide strand “seed region” have a stronger relationship with the protein than other nucleotides, concordant with their importance in sequence selectivity. Finally, any of several seed region guide-target mismatches cause certain Argonaute residues to have modified correlations with the rest of the protein. This arises from the aggregation of relatively small interaction correlation changes distributed across a large subset of residues. These residues are in effector sites: the active site, binding groove, and surface, implying that direct functional consequences of guide-target mismatches are mediated through the cumulative

  1. Multiplex Detection and Genotyping of Point Mutations Involved in Charcot-Marie-Tooth Disease Using a Hairpin Microarray-Based Assay

    Directory of Open Access Journals (Sweden)

    Yasser Baaj

    2009-01-01

    Full Text Available We previously developed a highly specific method for detecting SNPs with a microarray-based system using stem-loop probes. In this paper we demonstrate that coupling a multiplexing procedure with our microarray method is possible for the simultaneous detection and genotyping of four point mutations, in three different genes, involved in Charcot-Marie-Tooth disease. DNA from healthy individuals and patients was amplified, labeled with Cy3 by multiplex PCR; and hybridized to microarrays. Spot signal intensities were 18 to 74 times greater for perfect matches than for mismatched target sequences differing by a single nucleotide (discrimination ratio for “homozygous” DNA from healthy individuals. “Heterozygous” mutant DNA samples gave signal intensity ratios close to 1 at the positions of the mutations as expected. Genotyping by this method was therefore reliable. This system now combines the principle of highly specific genotyping based on stem-loop structure probes with the advantages of multiplex analysis.

  2. Anomaly-based Network Intrusion Detection Methods

    Directory of Open Access Journals (Sweden)

    Pavel Nevlud

    2013-01-01

    Full Text Available The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks.

  3. Automatic hearing loss detection system based on auditory brainstem response

    Energy Technology Data Exchange (ETDEWEB)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R [Laboratorio de Ingenieria en Rehabilitacion e Investigaciones Neuromusculares y Sensoriales (Argentina); Facultad de Ingenieria, Universidad Nacional de Entre Rios, Ruta 11 - Km 10, Oro Verde, Entre Rios (Argentina)

    2007-11-15

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory.

  4. Method for detecting software anomalies based on recurrence plot analysis

    OpenAIRE

    Michał Mosdorf

    2012-01-01

    Presented paper evaluates method for detecting software anomalies based on recurrence plot analysis of trace log generated by software execution. Described method for detecting software anomalies is based on windowed recurrence quantification analysis for selected measures (e.g. Recurrence rate - RR or Determinism - DET). Initial results show that proposed method is useful in detecting silent software anomalies that do not result in typical crashes (e.g. exceptions).

  5. Method for detecting software anomalies based on recurrence plot analysis

    Directory of Open Access Journals (Sweden)

    Michał Mosdorf

    2012-03-01

    Full Text Available Presented paper evaluates method for detecting software anomalies based on recurrence plot analysis of trace log generated by software execution. Described method for detecting software anomalies is based on windowed recurrence quantification analysis for selected measures (e.g. Recurrence rate - RR or Determinism - DET. Initial results show that proposed method is useful in detecting silent software anomalies that do not result in typical crashes (e.g. exceptions.

  6. Automatic hearing loss detection system based on auditory brainstem response

    Science.gov (United States)

    Aldonate, J.; Mercuri, C.; Reta, J.; Biurrun, J.; Bonell, C.; Gentiletti, G.; Escobar, S.; Acevedo, R.

    2007-11-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory.

  7. 免疫组织化学法检测结直肠癌四种 DNA错配修复蛋白表达缺失对判断肿瘤微卫星状态的价值%Value of detection of DNA mismatch repair proteins deficiency by immunohistochemistry in predicting tumor microsatellite status

    Institute of Scientific and Technical Information of China (English)

    秦云; 梁莉萍; 郑兴征; 郑杰; 叶菊香; 郭丽梅; 赵峰; 石雪迎

    2015-01-01

    expression was defined as complete absence of nuclear staining within tumor cells in the presence of positively labeled internal non-neoplastic cells.Focal staining was defined as the presence of staining in <5% of the tumor cells.CRCs showing negative staining for any MMR proteins were interpreted as MMR deficient tumors . PCR-genescan MSI analysis was performed in each case by a five marker panel including Bat 26, Bat25, NR-21, NR-24 and MONO-27.Results Among the 140 CRCs with routine formalin-fixed paraffin embedded tissue sections , concordance rate between IHC and PCR-genescan was 98.6% ( 138/140 ) , the sensitivity and specificity of IHC in detecting MSI tumors were 94.9% ( 37/39 ) and 100.0% ( 101/101 ) , respectively.The 2 disconcordant cases showed focal staining in at least one of the MMR proteins but were confirmed to be MSI-H CRCs by PCR-genescan assay.On tissue microarray, 91.3% (105/115) of the cases had informative results . The concordance rate between IHC and PCR-genescan was 100.0%(105/105).Both the specificity and sensitivity of IHC in detecting MSI tumors on available tissue microarray samples were 100.0%.Ten cases were inclusive due to the presence of negative stains of MMR proteins in both the tumor and internal control cells .Conclusions Detection of 4 MMR proteins expression by IHC is reliable for identifying MSI CRCs and is recommended for routine practice .Tumors with focal MMR protein staining are highly suspected for the presence of MSI-H and PCR-genescan based MSI analysis should be performed to confirm .

  8. Poseidon: a 2-tier anomaly-based intrusion detection system

    NARCIS (Netherlands)

    Bolzoni, Damiano; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection r

  9. Mismatch repair genes of Streptococcus pneumoniae: HexA confers a mutator phenotype in Escherichia coli by negative complementation.

    OpenAIRE

    Prudhomme, M; Méjean, V; Martin, B; Claverys, J P

    1991-01-01

    DNA repair systems able to correct base pair mismatches within newly replicated DNA or within heteroduplex molecules produced during recombination are widespread among living organisms. Evidence that such generalized mismatch repair systems evolved from a common ancestor is particularly strong for two of them, the Hex system of the gram-positive Streptococcus pneumoniae and the Mut system of the gram-negative Escherichia coli and Salmonella typhimurium. The homology existing between HexA and ...

  10. Parkinson's disease detection based on dysphonia measurements

    Science.gov (United States)

    Lahmiri, Salim

    2017-04-01

    Assessing dysphonic symptoms is a noninvasive and effective approach to detect Parkinson's disease (PD) in patients. The main purpose of this study is to investigate the effect of different dysphonia measurements on PD detection by support vector machine (SVM). Seven categories of dysphonia measurements are considered. Experimental results from ten-fold cross-validation technique demonstrate that vocal fundamental frequency statistics yield the highest accuracy of 88 % ± 0.04. When all dysphonia measurements are employed, the SVM classifier achieves 94 % ± 0.03 accuracy. A refinement of the original patterns space by removing dysphonia measurements with similar variation across healthy and PD subjects allows achieving 97.03 % ± 0.03 accuracy. The latter performance is larger than what is reported in the literature on the same dataset with ten-fold cross-validation technique. Finally, it was found that measures of ratio of noise to tonal components in the voice are the most suitable dysphonic symptoms to detect PD subjects as they achieve 99.64 % ± 0.01 specificity. This finding is highly promising for understanding PD symptoms.

  11. 中国超大城市常住外来和常住户籍人口居住-就业的空间错位--基于北京、上海和广州的实证%Jobs-Housing Spatial Mismatch of Permanent Immigrants and Local Registered Residents in Chinese Metropolises:An Empirical Study Based on Beijing, Shanghai and Guangzhou

    Institute of Scientific and Technical Information of China (English)

    孙铁山; 刘霄泉

    2016-01-01

    以北京、上海、广州作为中国超大城市的代表,探讨中国超大城市常住外来和常住户籍人口居住-就业空间错位的差异及其影响因素。总体而言,常住外来人口的居住-就业空间错位要高于常住户籍人口,且不同户籍属性人口的错位形态存在差异。分行业来看,公共管理和社会组织等公共服务业常住外来人口居住-就业空间错位程度相对较高,而制造业、居民服务和其他服务业常住户籍人口居住-就业空间错位程度相对较高。由计量分析发现,住房价格水平、就业集聚规模、高端产业比重和地区地方财政支出对不同户籍属性人口就业-居住空间分布差异均产生相似的影响;而租赁户数比重和低端产业比重对不同户籍属性人口的就业-居住空间分布则产生差异性的影响。%Based on the population census data and the economic census data of Beijing, Shanghai and Guangzhou, this paper empirically analyzes the differences between permanent immigrants and local registered residents on the jobs⁃housing spatial mismatch in Chinese metropolises. Overall, the jobs⁃housing spatial mismatch among the permanent immigrants is more severe than that among the local registered residents, and people with different household registrations exhibit different spatial mismatch patterns. Specifically, the permanent immigrants excessively concentrate in the inner suburbs while local registered residents show excessive concentration of residences in the outer suburbs, although jobs are excessively concentrated in the central city for both the immigrants and the local residents. Besides, people from different sectors also exhibit different spatial mismatch patterns. Compared to the local residents, the permanent immigrants show higher spatial mismatch in such sectors as public management and social organization, education, while they show lower spatial mismatch in such sectors

  12. Detection of influenza A virus based on fluorescence resonance energy transfer from quantum dots to carbon nanotubes.

    Science.gov (United States)

    Tian, Junping; Zhao, Huimin; Liu, Meng; Chen, Yaqiong; Quan, Xie

    2012-04-20

    In this paper, a simple and sensitive approach for H5N1 DNA detection was described based on the fluorescence resonance energy transfer (FRET) from quantum dots (QDs) to carbon nanotubes (CNTs) in a QDs-ssDNA/oxCNTs system, in which the QDs (CdTe) modified with ssDNA were used as donors. In the initial stage, with the strong interaction between ssDNA and oxCNTs, QDs fluorescence was effectively quenched. Upon the recognition of the target, the effective competitive bindings of it to QDs-ssDNA occurred, which decreased the interactions between the QDs-ssDNA and oxCNTs, leading to the recovery of the QDs fluorescence. The recovered fluorescence of QDs was linearly proportional to the concentration of the target in the range of 0.01-20 μM with a detection limit of 9.39 nM. Moreover, even a single-base mismatched target with the same concentration of target DNA can only recover a limited low fluorescence of QDs, illustrating the good anti-interference performance of this QDs-ssDNA/oxCNTs system. This FRET platform in the QDs-ssDNA/oxCNTs system was facilitated to the simple, sensitive and quantitative detection of virus nucleic acids and could have a wide range of applications in molecular diagnosis.

  13. L-band AlGaN/GaN Power Amplifier with Protection Against Load Mismatch

    NARCIS (Netherlands)

    Heijningen, M. van; Bent, G. van der; Houwen, E.H. van der; Chowdhary, A.; Vliet, F.E. van

    2013-01-01

    Solid-state power amplifiers need protection at the output to handle high reflections due to mismatch. Normally this is implemented by using a ferrite-based isolator. These are however large and bulky components. This paper presents a Gallium-Nitride power amplifier module with automatic protection

  14. Labour Market Mismatch among UK Graduates: An Analysis Using REFLEX Data

    Science.gov (United States)

    McGuinness, Seamus; Sloane, Peter J.

    2011-01-01

    There is much disagreement in the literature over the extent to which graduates are mismatched in the labour market and the reasons for this. In this paper we utilise the Flexible Professional in the Knowledge Society (REFLEX) data set to cast light on these issues, based on data for UK graduates. We find substantial pay penalties for…

  15. Gaussian Belief Propagation Based Multiuser Detection

    CERN Document Server

    Bickson, Danny; Shental, Ori; Siegel, Paul H; Wolf, Jack K

    2008-01-01

    In this work, we present a novel construction for solving the linear multiuser detection problem using the Gaussian Belief Propagation algorithm. Our algorithm yields an efficient, iterative and distributed implementation of the MMSE detector. We compare our algorithm's performance to a recent result and show an improved memory consumption, reduced computation steps and a reduction in the number of sent messages. We prove that recent work by Montanari et al. is an instance of our general algorithm, providing new convergence results for both algorithms.

  16. GLRT Based Anomaly Detection for Sensor Network Monitoring

    KAUST Repository

    Harrou, Fouzi

    2015-12-07

    Proper operation of antenna arrays requires continuously monitoring their performances. When a fault occurs in an antenna array, the radiation pattern changes and can significantly deviate from the desired design performance specifications. In this paper, the problem of fault detection in linear antenna arrays is addressed within a statistical framework. Specifically, a statistical fault detection method based on the generalized likelihood ratio (GLR) principle is utilized for detecting potential faults in linear antenna arrays. The proposed method relies on detecting deviations in the radiation pattern of the monitored array with respect to a reference (fault-free) one. To assess the abilities of the GLR based fault detection method, three case studies involving different types of faults have been performed. The simulation results clearly illustrate the effectiveness of the GLR-based fault detection method in monitoring the performance of linear antenna arrays.

  17. A Vehicle Detection Algorithm Based on Deep Belief Network

    Directory of Open Access Journals (Sweden)

    Hai Wang

    2014-01-01

    Full Text Available Vision based vehicle detection is a critical technology that plays an important role in not only vehicle active safety but also road video surveillance application. Traditional shallow model based vehicle detection algorithm still cannot meet the requirement of accurate vehicle detection in these applications. In this work, a novel deep learning based vehicle detection algorithm with 2D deep belief network (2D-DBN is proposed. In the algorithm, the proposed 2D-DBN architecture uses second-order planes instead of first-order vector as input and uses bilinear projection for retaining discriminative information so as to determine the size of the deep architecture which enhances the success rate of vehicle detection. On-road experimental results demonstrate that the algorithm performs better than state-of-the-art vehicle detection algorithm in testing data sets.

  18. Structural Study of Mismatched Disila-Crown Ether Complexes

    Directory of Open Access Journals (Sweden)

    Kirsten Reuter

    2017-02-01

    Full Text Available Mismatched complexes of the alkali metals cations Li+ and Na+ were synthesized from 1,2-disila[18]crown-6 (1 and 2 and of K+ from 1,2,4,5-tetrasila[18]crown-6 (4. In these alkali metal complexes, not all crown ether O atoms participate in the coordination, which depicts the coordination ability of the C-, Si/C-, and Si-bonded O atoms. Furthermore, the inverse case—the coordination of the large Ba2+ ion by the relatively small ligand 1,2-disila[15]crown-5—was investigated, yielding the dinuclear complex 5. This structure represents a first outlook on sandwich complexes based on hybrid crown ethers.

  19. On Capacity Regions of Interference Channels with Mismatched Local Views

    CERN Document Server

    Kao, David T -H

    2011-01-01

    We study the capacity regions of two-user interference channels where transmitters base their transmission decisions on local views of the channel state. Under the local view model, each transmitter knows only a subset of the four channel gains, which may be mismatched from the other transmitter. We consider a set of seven local views, and find that for five out of the seven local views, TDMA is sufficient to achieve the capacity region of the deterministic interference channel. Conversely for these five views, no policy can achieve a rate point outside the TDMA region without inducing a corner case of sub-TDMA performance in another channel state. The common trait shared by the two remaining local views - those with the potential to outperform TDMA - is transmitter knowledge of the outgoing interference link, emphasizing its importance in creating opportunities to use more advanced schemes. Our conclusions are extended to bounded gap characterizations of the capacity region for the Gaussian interference chan...

  20. Multi-features Based Approach for Moving Shadow Detection

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ning; ZHOU Man-li; XU Yi-ping; FANG Bao-hong

    2004-01-01

    In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.

  1. A fast and accurate FPGA based QRS detection system.

    Science.gov (United States)

    Shukla, Ashish; Macchiarulo, Luca

    2008-01-01

    An accurate Field Programmable Gate Array (FPGA) based ECG Analysis system is described in this paper. The design, based on a popular software based QRS detection algorithm, calculates the threshold value for the next peak detection cycle, from the median of eight previously detected peaks. The hardware design has accuracy in excess of 96% in detecting the beats correctly when tested with a subset of five 30 minute data records obtained from the MIT-BIH Arrhythmia database. The design, implemented using a proprietary design tool (System Generator), is an extension of our previous work and uses 76% resources available in a small-sized FPGA device (Xilinx Spartan xc3s500), has a higher detection accuracy as compared to our previous design and takes almost half the analysis time in comparison to software based approach.

  2. P2P worm detection based on application identification

    Institute of Scientific and Technical Information of China (English)

    XIA Chunhe; SHI Yunping; LI Xiaojian; GAO Wei

    2007-01-01

    P2P worm exploits common vulnerabilities and spreads through peer-to-peer networks.Despite being recognized as a potential and deadly threat to the Internet recently,few relevant countermeasures are found in extant literature.Once it breaks out,a P2P worm could result in unpredictable losses.Based on propagation characteristics of the worm,this paper presents a detection method called PWD (P2P Worm Detection),which is designed based on application identification and unknown worm detection.Simulation result and LAN-environment experiment result both indicate that PWD is an effective method to detect and block P2P worms.

  3. Mismatch-Shaped Pseudo-Passive Two-Capacitor DAC

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper; Moon, Un-Ku; Temes, Gabor C.

    1999-01-01

    A simple mismatch-shaping scheme is proposed for a two-capacitor DAC. Unlike in other mismatch-shaping systems, the shaped error is generated by direct filtering of a well-defined bounded signal, which can be generated as white noise. The operation is closely related to a specific digital interpo...

  4. Mismatch-Shaping Serial Digital-to-Analog Converter

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper; Moon, Un-Ku; Temes, Gabor C.

    1999-01-01

    A simple but accurate pseudo-passive mismatch-shaping D/A converter is described. A digital state machine is used to control the switching sequence of a symmetric two-capacitor network that performs the D/A conversion. The error caused by capacitor mismatch is uncorrelated with the input signal a...

  5. Influence of halo doping profiles on MOS transistor mismatch

    NARCIS (Netherlands)

    Andricciola, P.; Tuinhout, H.

    2009-01-01

    Halo implants are used in modern CMOS technology to reduce the short channel effect. However, the lateral non-uniformity of the channel doping has been proven to degenerate the mismatch performance. With this paper we want to discuss the influence of the halo profile on MOS transistor mismatch. The

  6. Hydrophobic mismatch triggering texture defects in membrane gel domains

    DEFF Research Database (Denmark)

    Dreier, J.; Brewer, J.R.; Simonsen, Adam Cohen

    2013-01-01

    a lipid-induced transition between vortex and uniform textures in binary phospholipid bilayers. By tuning the lipid composition, the hydrophobic mismatch at the domain boundary can be varied systematically as monitored by AFM. Low hydrophobic mismatch correlates with domains having uniform texture, while...

  7. Speaking Self-Assessment: Mismatches between Learners' and Teachers' Criteria

    Science.gov (United States)

    Babaii, Esmat; Taghaddomi, Shahin; Pashmforoosh, Roya

    2016-01-01

    Perceptual (mis)matches between teachers and learners are said to affect learning success or failure. Self-assessment, as a formative assessment tool, may, inter alia, be considered a means to minimize such mismatches. Therefore, the present study investigated the extent to which learners' assessment of their own speaking performance, before and…

  8. Educational Mismatch of Graduates: A Multidimensional and Fuzzy Indicator

    Science.gov (United States)

    Betti, Gianni; D'Agostino, Antonella; Neri, Laura

    2011-01-01

    In this paper we attempt to measure the educational mismatch, seen as a problem of overeducation, using a multidimensional and fuzzy methodology. Educational mismatch can be difficult to measure because many factors can converge to its definition and the traditional unidimensional indicators presented in literature can offer a restricted view of…

  9. Model Based Incipient Fault Detection for Gear Drives

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper presents the method of model based incipient fault detection for gear drives,this method is based on parity space method. It can generate the robust residual that is maximally sensitive to the fault caused by the change of the parameters. The example of simulation shows the application of the method, and the residual waves have different characteristics due to different parameter changes; one can detect and isolate the fault based on the different characteristics.

  10. Optimizing the Face Paradigm of BCI System by Modified Mismatch Negative Paradigm

    Science.gov (United States)

    Zhou, Sijie; Jin, Jing; Daly, Ian; Wang, Xingyu; Cichocki, Andrzej

    2016-01-01

    Many recent studies have focused on improving the performance of event-related potential (ERP) based brain computer interfaces (BCIs). The use of a face pattern has been shown to obtain high classification accuracies and information transfer rates (ITRs) by evoking discriminative ERPs (N200 and N400) in addition to P300 potentials. Recently, it has been proved that the performance of traditional P300-based BCIs could be improved through a modification of the mismatch pattern. In this paper, a mismatch inverted face pattern (MIF-pattern) was presented to improve the performance of the inverted face pattern (IF-pattern), one of the state of the art patterns used in visual-based BCI systems. Ten subjects attended in this experiment. The result showed that the mismatch inverted face pattern could evoke significantly larger vertex positive potentials (p < 0.05) and N400s (p < 0.05) compared to the inverted face pattern. The classification accuracy (mean accuracy is 99.58%) and ITRs (mean bit rate is 27.88 bit/min) of the mismatch inverted face pattern was significantly higher than that of the inverted face pattern (p < 0.05). PMID:27774046

  11. Optimizing the face Paradigm of BCI system by modified Mismatch Negative paradigm

    Directory of Open Access Journals (Sweden)

    Siejie Zhou

    2016-10-01

    Full Text Available Many recent studies have focused on improving the performance of event-related potential (ERP based brain computer interfaces (BCIs. The use of a face pattern has been shown to obtain high classification accuracies and information transfer rates (ITRs by evoking discriminative ERPs (N200 and N400 in addition to P300 potentials. Recently, it has been proved that the performance of traditional P300-based BCIs could be improved through a modification of the mismatch pattern. In this paper, a mismatch inverted face pattern (MIF-pattern was presented to improve the performance of the inverted face pattern (IF-pattern, one of the state of the art patterns used in visual-based BCI systems. Ten subjects attended in this experiment. The result showed that the mismatch inverted face pattern could evoke significantly larger vertex positive potentials (p<0.05 and N400s (p<0.05 compared to the inverted face pattern. The classification accuracy (mean accuracy is 99.58% and ITRs (mean bit rate is 27.88 bit/min of the mismatch inverted face pattern was significantly higher than that of the inverted face pattern (p<0.05.

  12. Muon Detection Based on a Hadronic Calorimeter

    CERN Document Server

    Ciodaro, T; Abreu, R; Achenbach, R; Adragna, P; Aharrouche, M; Aielli, G; Al-Shabibi, A; Aleksandrov, I; Alexandrov, E; Aloisio, A; Alviggi, M G; Amorim, A; Amram, N; Andrei, V; Anduaga, X; Angelaszek, D; Anjos, N; Annovi, A; Antonelli, S; Anulli, F; Apolle, R; Aracena, I; Ask, S; Åsman, B; Avolio, G; Baak, M; Backes, M; Backlund, S; Badescu, E; Baines, J; Ballestrero, S; Banerjee, S; Bansil, H S; Barnett, B M; Bartoldus, R; Bartsch, V; Batraneanu, S; Battaglia, A; Bauss, B; Beauchemin, P; Beck, H P; Bee, C; Begel, M; Behera, P K; Bell, P; Bell, W H; Bellagamba, L; Bellomo, M; Ben Ami, S; Bendel, M; Benhammou, Y; Benslama, K; Berge, D; Bernius, C; Berry, T; Bianco, M; Biglietti, M; Blair, R E; Bogaerts, A; Bohm, C; Boisvert, V; Bold, T; Bondioli, M; Borer, C; Boscherini, D; Bosman, M; Bossini, E; Boveia, A; Bracinik, J; Brandt, A G; Brawn, I P; Brelier, B; Brenner, R; Bressler, S; Brock, R; Brooks, W K; Brown, G; Brunet, S; Bruni, A; Bruni, G; Bucci, F; Buda, S; Burckhart-Chromek, D; Buscher, V; Buttinger, W; Calvet, S; Camarri, P; Campanelli, M; Canale, V; Canelli, F; Capasso, L; Caprini, M; Caracinha, D; Caramarcu, C; Cardarelli, R; Carlino, G; Casadei, D; Casado, M P; Cattani, G; Cerri, A; Cerrito, L; Chapleau, B; Childers, J T; Chiodini, G; Christidi, I; Ciapetti, G; Cimino, D; Ciobotaru, M; Coccaro, A; Cogan, J; Collins, N J; Conde Muino, P; Conidi, C; Conventi, F; Corradi, M; Corso-Radu, A; Coura Torres, R; Cranmer, K; Crescioli, F; Crone, G; Crupi, R; Cuenca Almenar, C; Cummings, J T; Curtis, C J; Czyczula, Z; Dam, M; Damazio, D; Dao, V; Darlea, G L; Davis, A O; De Asmundis, R; De Pedis, D; De Santo, A; de Seixas, J M; Degenhardt, J; Della Pietra, M; Della Volpe, D; Demers, S; Demirkoz, B; Di Ciaccio, A; Di Mattia, A; Di Nardo, R; Di Simone, A; Diaz, M A; Dietzsch, T A; Dionisi, C; Dobson, E; Dobson, M; dos Anjos, A; Dotti, A; Dova, M T; Drake, G; Dufour, M-A; Dumitru, I; Eckweiler, S; Ehrenfeld, W; Eifert, T; Eisenhandler, E; Ellis, K V; Ellis, N; Emeliyanov, D; Enoque Ferreira de Lima, D; Ermoline, Y; Ernst, J; Etzion, E; Falciano, S; Farrington, S; Farthouat, P; Faulkner , P J W; Fedorko, W; Fellmann, D; Feng, E; Ferrag, S; Ferrari, R; Ferrer, M L; Fiorini, L; Fischer, G; Flowerdew, M J; Fonseca Martin, T; Francis, D; Fratina, S; French, S T; Front, D; Fukunaga, C; Gadomski, S; Garelli, N; Garitaonandia Elejabarrieta, H; Gaudio, G; Gee, C N P; George, S; Giagu, S; Giannetti, P; Gillman, A R; Giorgi, M; Giunta, M; Giusti, P; Goebel, M; Gonçalo, R; Gonzalez Silva, L; Göringer, C; Gorini, B; Gorini, E; Grabowska-Bold, I; Green, B; Groll, M; Guida, A; Guler, H; Haas, S; Hadavand, H; Hadley, D R; Haller, J; Hamilton, A; Hanke, P; Hansen, J R; Hasegawa, S; Hasegawa, Y; Hauser, R; Hayakawa, T; Hayden, D; Head, S; Heim, S; Hellman, S; Henke, M; Hershenhorn, A; Hidvégi, A; Hillert, S; Hillier, S J; Hirayama, S; Hod, N; Hoffmann, D; Hong, T M; Hryn'ova, T; Huston, J; Iacobucci, G; Igonkina, O; Ikeno, M; Ilchenko, Y; Ishikawa, A; Ishino, M; Iwasaki, H; Izzo, V; Jez, P; Jimenez Otero, S; Johansen, M; Johns, K; Jones, G; Joos, M; Kadlecik, P; Kajomovitz, E; Kanaya, N; Kanega, F; Kanno, T; Kapliy, A; Kaushik, V; Kawagoe, K; Kawamoto, T; Kazarov, A; Kehoe, R; Kessoku, K; Khomich, A; Khoriauli, G; Kieft, G; Kirk, J; Klemetti, M; Klofver, P; Klous, S; Kluge, E-E; Kobayashi, T; Koeneke, K; Koletsou, I; Koll, J D; Kolos, S; Kono, T; Konoplich, R; Konstantinidis, N; Korcyl, K; Kordas, K; Kotov, V; Kowalewski, R V; Krasznahorkay, A; Kraus, J; Kreisel, A; Kubota, T; Kugel, A; Kunkle, J; Kurashige, H; Kuze, M; Kwee, R; Laforge, B; Landon, M; Lane, J; Lankford, A J; Laranjeira Lima, S M; Larner, A; Leahu, L; Lehmann Miotto, G; Lei, X; Lellouch, D; Levinson, L; Li, S; Liberti, B; Lilley, J N; Linnemann, J T; Lipeles, E; Lohse, T; Losada, M; Lowe, A; Luci, C; Luminari, L; Lundberg, J; Lupu, N; Machado Miguéns, J; Mackeprang, R; Maettig, S; Magnoni, L; Maiani, C; Maltrana, D; Mangeard, P-S; Männer, R; Mapelli, L; Marchese, F; Marino, C; Martin, B; Martin, B T; Martin, T; Martyniuk, A; Marzano, F; Masik, J; Mastrandrea, P; Matsushita, T; McCarn, A; Mechnich, J; Medinnis, M; Meier, K; Melachrinos, C; Mendoza Nava, L M; Merola, L; Messina, A; Meyer, C P; Middleton, R P; Mikenberg, G; Mills, C M; Mincer, A; Mineev, M; Misiejuk, A; Moa, T; Moenig, K; Monk, J; Monticelli, F; Mora Herrera, C; Morettini, P; Morris, J D; Müller, F; Munwes, Y; Murillo Garcia, R; Nagano, K; Nagasaka, Y; Navarro, G A; Negri, A; Nelson, S; Nemethy, P; Neubauer, M S; Neusiedl, A; Newman, P; Nisati, A; Nomoto, H; Nozaki, M; Nozicka, M; Nurse, E; Ochando, C; Ochi, A; Oda, S; Oh, A; Ohm, C; Okumura, Y; Olivito, D; Omachi, C; Osculati, B; Oshita, H; Ospanov, R; Owen, M A; Özcan, V E; Ozone, K; Padilla, C; Panes, B; Panikashvili, N; Paramonov, A; Parodi, F; Pasqualucci, E; Pastore, F; Patricelli, S; Pauly, T; Perera, V J O; Perez, E; Petcu, M; Petersen, B A; Petersen, J; Petrolo, E; Phan, A; Piegaia, R; Pilkington, A; Pinder, A; Poddar, S; Polini, A; Pope, B G; Potter, C T; Primavera, M; Prokoshin, F; Ptacek, E; Qian, W; Quinonez, F; Rajagopalan, S; Ramos Dos Santos Neves, R; Reinherz-Aronis, E; Reinsch, A; Renkel, P; Rescigno, M; Rieke, S; Riu, I; Robertson, S H; Robinson, M; Rodriguez, D; Roich, A; Romeo, G; Romero, R; Roos, L; Ruiz Martinez, A; Ryabov, Y; Ryan, P; Saavedra, A; Safai Tehrani, F; Sakamoto, H; Salamanna, G; Salamon, A; Saland, J; Salnikov, A; Salvatore, F; Sankey, D P C; Santamarina, C; Santonico, R; Sarkisyan-Grinbaum, E; Sasaki, O; Savu, D; Scannicchio, D A; Schäfer, U; Scharf, V L; Scheirich, D; Schiavi, C; Schlereth, J; Schmitt, K; Schroder, C; Schroer, N; Schultz-Coulon, H-C; Schwienhorst, R; Sekhniaidze, G; Sfyrla, A; Shamim, M; Sherman, D; Shimojima, M; Shochet, M; Shooltz, D; Sidoti, A; Silbert, O; Silverstein, S; Sinev, N; Siragusa, G; Sivoklokov, S; Sjoen, R; Sjölin, J; Slagle, K; Sloper, J E; Smith, B C; Soffer, A; Soloviev, I; Spagnolo, S; Spiwoks, R; Staley, R J; Stamen, R; Stancu, S; Steinberg, P; Stelzer, J; Stockton, M C; Straessner, A; Strauss, E A; Strom, D; Su, D; Sugaya, Y; Sugimoto, T; Sushkov, S; Sutton, M R; Suzuki, Y; Taffard, A; Taiblum, N; Takahashi, Y; Takeda, H; Takeshita, T; Tamsett, M; Tan, C L A; Tanaka, S; Tapprogge, S; Tarem, S; Tarem, Z; Taylor, C; Teixeira-Dias, P; Thomas, J P; Thompson, P D; Thomson, M A; Tokushuku, K; Tollefson, K; Tomoto, M; Topfel, C; Torrence, E; Touchard, F; Traynor, D; Tremblet, L; Tricoli, A; Tripiana, M; Triplett, N; True, P; Tsiakiris, M; Tsuno, S; Tuggle, J; Ünel, G; Urquijo, P; Urrejola, P; Usai, G; Vachon, B; Vallecorsa, S; Valsan, L; Vandelli, W; Vari, R; Vaz Gil Lopes, L; Veneziano, S; Ventura, A; Venturi, N; Vercesi, V; Vermeulen, J C; Volpi, G; Vorwerk, V; Wagner, P; Wang, M; Warburton, A; Watkins, P M; Watson, A T; Watson, M; Weber, P; Weidberg, A R; Wengler, T; Werner, P; Werth, M; Wessels, M; White, M; Whiteson, D; Wickens, F J; Wiedenmann, W; Wielers, M; Winklmeier, F; Woods, K S; Wu, S-L; Wu, X; Xaplanteris Karampatsos, L; Xella, S; Yakovlev, A; Yamazaki, Y; Yang, U; Yasu, Y; Yuan, L; Zaitsev, A; Zanello, L; Zhang, H; Zhang, J; Zhao, L; Zobernig, H; zur Nedden, M

    2010-01-01

    The ATLAS Tile hadronic calorimeter (TileCal) provides highly-segmented energy measurements of incoming particles. The information from TileCal's last segmentation layer can assist in muon tagging and it is being considered for a near future upgrade of the level-one trigger, mainly for rejecting triggers due to cavern background at the barrel region. A muon receiver for the TileCal muon signals is being designed in order to interface with the ATLAS level-one trigger. This paper addresses the preliminary studies concerning the muon discrimination capability for the muon receiver. Monte Carlo simulations for single muons from the interaction point were used to study the effectiveness of hadronic calorimeter information on muon detection.

  13. Intrusion Detection Systems Based On Packet Sniffing

    Directory of Open Access Journals (Sweden)

    Ushus Maria Joseph

    2013-01-01

    Full Text Available In the present era of networks, security of network systems is becoming increasingly important, as more and more sensitive information is being stored and manipulated online. The paper entitled ’Packet Sniffing’ is a IDS where it monitors packets on the network wire and attempts to the discovery of hacker/cracker who is attempting to break into system. Packet Sniffing also finds the contents and tracks the data packet in the network system. This sniffing is being performed by comparing the captured packet with the intruder details stored in the database .If the packet is found to be an intruder it is then forwarded to the firewall with the respective message for blocking. The Emotional Ants module contains the sender and receiver .The sender will inform all the other Ants running in other machines about the detection of intruder through his pheromone (Messages. The receiver in Ants will listen for the messages from other Ants

  14. Aptamer-Based Technologies in Foodborne Pathogen Detection

    Science.gov (United States)

    Teng, Jun; Yuan, Fang; Ye, Yingwang; Zheng, Lei; Yao, Li; Xue, Feng; Chen, Wei; Li, Baoguang

    2016-01-01

    Aptamers are single stranded DNA or RNA ligands, which can be selected by a method called systematic evolution of ligands by exponential enrichment (SELEX); and they can specifically recognize and bind to their targets. These unique characteristics of aptamers offer great potentials in applications such as pathogen detection and biomolecular screening. Pathogen detection is the critical means in detecting and identifying the problems related to public health and food safety; and only the rapid, sensitive and efficient detection technologies can enable the users to make the accurate assessments on the risks of infections (humans and animals) or contaminations (foods and other commodities) caused by various pathogens. This article reviews the development in the field of the aptamer-based approaches for pathogen detection, including whole-cell SELEX and Genomic SELEX. Nowadays, a variety of aptamer-based biosensors have been developed for pathogen detection. Thus, in this review, we also cover the development in aptamer-based biosensors including optical biosensors for multiple pathogen detection by multiple-labeling or label-free models such as fluorescence detection and surface plasmon resonance, electrochemical biosensors and lateral chromatography test strips, and their applications in pathogen detection and biomolecular screening. While notable progress has been made in the field in the last decade, challenges or drawbacks in their applications such as pathogen detection and biomolecular screening remain to be overcome. PMID:27672383

  15. Aptamer-Based Technologies in Foodborne Pathogen Detection

    Directory of Open Access Journals (Sweden)

    Jun Teng

    2016-09-01

    Full Text Available Aptamers are single stranded DNA or RNA ligands, which can be selected by a method called systematic evolution of ligands by exponential enrichment (SELEX; and they can specifically recognize and bind to their targets. These unique characteristics of aptamers offer great potentials in applications such as pathogen detection and biomolecular screening. Pathogen detection is the first and critical means in detecting and identifying the problems related to public health and food safety; and only the rapid, sensitive and efficient detection technologies can enable the users to make to accurate assessments on the risk of infections (humans and animals or contaminations (foods and other commodities caused by various pathogens. This article reviews the developments in the field of the aptamer-based approaches for pathogen detection, including whole-cell SELEX and Genomic SELEX. Nowadays, a variety of aptamer-based biosensors have been developed for pathogen detection. Thus, in this review, we also cover the development of aptamer-based biosensors including optical biosensors for multiple pathogen detection in multiple-labeling or label-free models such as fluorescence detection and surface plasmon resonance, electrochemical biosensors, and lateral chromatography test strips, and their applications in the pathogen detection and biomolecular screening. While notable progress has been made in the field in the last decade, challenges or drawbacks in their applications such as pathogen detection and biomolecular screening, remain to be overcome.

  16. Laser Spot Detection Based on Reaction Diffusion

    Science.gov (United States)

    Vázquez-Otero, Alejandro; Khikhlukha, Danila; Solano-Altamirano, J. M.; Dormido, Raquel; Duro, Natividad

    2016-01-01

    Center-location of a laser spot is a problem of interest when the laser is used for processing and performing measurements. Measurement quality depends on correctly determining the location of the laser spot. Hence, improving and proposing algorithms for the correct location of the spots are fundamental issues in laser-based measurements. In this paper we introduce a Reaction Diffusion (RD) system as the main computational framework for robustly finding laser spot centers. The method presented is compared with a conventional approach for locating laser spots, and the experimental results indicate that RD-based computation generates reliable and precise solutions. These results confirm the flexibility of the new computational paradigm based on RD systems for addressing problems that can be reduced to a set of geometric operations. PMID:26938537

  17. Laser Spot Detection Based on Reaction Diffusion

    Directory of Open Access Journals (Sweden)

    Alejandro Vázquez-Otero

    2016-03-01

    Full Text Available Center-location of a laser spot is a problem of interest when the laser is used for processing and performing measurements. Measurement quality depends on correctly determining the location of the laser spot. Hence, improving and proposing algorithms for the correct location of the spots are fundamental issues in laser-based measurements. In this paper we introduce a Reaction Diffusion (RD system as the main computational framework for robustly finding laser spot centers. The method presented is compared with a conventional approach for locating laser spots, and the experimental results indicate that RD-based computation generates reliable and precise solutions. These results confirm the flexibility of the new computational paradigm based on RD systems for addressing problems that can be reduced to a set of geometric operations.

  18. GNSS Spoofing Detection Based on Signal Power Measurements: Statistical Analysis

    Directory of Open Access Journals (Sweden)

    V. Dehghanian

    2012-01-01

    Full Text Available A threat to GNSS receivers is posed by a spoofing transmitter that emulates authentic signals but with randomized code phase and Doppler values over a small range. Such spoofing signals can result in large navigational solution errors that are passed onto the unsuspecting user with potentially dire consequences. An effective spoofing detection technique is developed in this paper, based on signal power measurements and that can be readily applied to present consumer grade GNSS receivers with minimal firmware changes. An extensive statistical analysis is carried out based on formulating a multihypothesis detection problem. Expressions are developed to devise a set of thresholds required for signal detection and identification. The detection processing methods developed are further manipulated to exploit incidental antenna motion arising from user interaction with a GNSS handheld receiver to further enhance the detection performance of the proposed algorithm. The statistical analysis supports the effectiveness of the proposed spoofing detection technique under various multipath conditions.

  19. Shape-Based Plagiarism Detection for Flowchart Figures in Texts

    Directory of Open Access Journals (Sweden)

    Senosy Arrish

    2014-02-01

    Full Text Available Plagiarism detection is well known phenomenon in the academic arena. Copying other people is considered as serious offence that needs to be checked. There are many plagiarism detection systems such as turn-it-in that has been developed to provide this checks. Most, if not all, discard the figures and charts before checking for plagiarism. Discarding the figures and charts results in look holes that people can take advantage. That means people can plagiarized figures and charts easily without the current plagiarism systems detecting it. There are very few papers which talks about flowcharts plagiarism detection. Therefore, there is a need to develop a system that will detect plagiarism in figures and charts. This paper presents a method for detecting flow chart figure plagiarism based on shape-based image processing and multimedia retrieval. The method managed to retrieve flowcharts with ranked similarity according to different matching sets.

  20. Intrusion detection based on system calls and homogeneous Markov chains

    Institute of Scientific and Technical Information of China (English)

    Tian Xinguang; Duan Miyi; Sun Chunlai; Li Wenfa

    2008-01-01

    A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.

  1. Evidence-based detection of pulmonary arterial hypertension in systemic sclerosis: the DETECT study

    NARCIS (Netherlands)

    Coghlan, J.G.; Denton, C.P.; Grunig, E.; Bonderman, D.; Distler, O.; Khanna, D.; Muller-Ladner, U.; Pope, J.E.; Vonk, M.C.; Doelberg, M.; Chadha-Boreham, H.; Heinzl, H.; Rosenberg, D.M.; McLaughlin, V.V.; Seibold, J.R.

    2014-01-01

    OBJECTIVE: Earlier detection of pulmonary arterial hypertension (PAH), a leading cause of death in systemic sclerosis (SSc), facilitates earlier treatment. The objective of this study was to develop the first evidence-based detection algorithm for PAH in SSc. METHODS: In this cross-sectional, intern

  2. Change detection of built-up land: A framework of combining pixel-based detection and object-based recognition

    Science.gov (United States)

    Xiao, Pengfeng; Zhang, Xueliang; Wang, Dongguang; Yuan, Min; Feng, Xuezhi; Kelly, Maggi

    2016-09-01

    This study proposed a new framework that combines pixel-level change detection and object-level recognition to detect changes of built-up land from high-spatial resolution remote sensing images. First, an adaptive differencing method was designed to detect changes at the pixel level based on both spectral and textural features. Next, the changed pixels were subjected to a set of morphological operations to improve the completeness and to generate changed objects, achieving the transition of change detection from the pixel level to the object level. The changed objects were further recognised through the difference of morphological building index in two phases to indicate changed objects on built-up land. The transformation from changed pixels to changed objects makes the proposed framework distinct with both the pixel-based and the object-based change detection methods. Compared with the pixel-based methods, the proposed framework can improve the change detection capability through the transformation and successive recognition of objects. Compared with the object-based method, the proposed framework avoids the issue of multitemporal segmentation and can generate changed objects directly from changed pixels. The experimental results show the effectiveness of the transformation from changed pixels to changed objects and the successive object-based recognition on improving the detection accuracy, which justify the application potential of the proposed change detection framework.

  3. Unsupervised abnormality detection using saliency and Retinex based color enhancement.

    Science.gov (United States)

    Deeba, Farah; Mohammed, Shahed K; Bui, Francis M; Wahid, Khan A

    2016-08-01

    An efficient and automated abnormality detection method can significantly reduce the burden of screening of the enormous visual information resulting from capsule endoscopic procedure. As a pre-processing stage, color enhancement could be useful to improve the image quality and the detection performance. Therefore, in this paper, we have proposed a two-stage automated abnormality detection algorithm. In the first stage, an adaptive color enhancement method based on Retinex theory is applied on the endoscopic images. In the second stage, an efficient salient region detection algorithm is applied to detect the clinically significant regions. The proposed algorithm is applied on a dataset containing images with diverse pathologies. The algorithm can successfully detect a significant percentage of the abnormal regions. From our experiment, it was evident that color enhancement method improves the performance of abnormality detection. The proposed algorithm can achieve a sensitivity of 97.33% and specificity of 79%, higher than state-of-the-art performance.

  4. SVM Intrusion Detection Model Based on Compressed Sampling

    Directory of Open Access Journals (Sweden)

    Shanxiong Chen

    2016-01-01

    Full Text Available Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. Massive data processing is the bottleneck of network software and hardware equipment in intrusion detection. If we can reduce the data dimension in the stage of data sampling and directly obtain the feature information of network data, efficiency of detection can be improved greatly. In the paper, we present a SVM intrusion detection model based on compressive sampling. We use compressed sampling method in the compressed sensing theory to implement feature compression for network data flow so that we can gain refined sparse representation. After that SVM is used to classify the compression results. This method can realize detection of network anomaly behavior quickly without reducing the classification accuracy.

  5. QRS Detection Based on an Advanced Multilevel Algorithm

    OpenAIRE

    Wissam Jenkal; Rachid Latif; Ahmed Toumanari; Azzedine Dliou; Oussama El B’charri; Fadel Mrabih Rabou Maoulainine

    2016-01-01

    This paper presents an advanced multilevel algorithm used for the QRS complex detection. This method is based on three levels. The first permits the extraction of higher peaks using an adaptive thresholding technique. The second allows the QRS region detection. The last level permits the detection of Q, R and S waves. The proposed algorithm shows interesting results compared to recently published methods. The perspective of this work is the implementation of this method on an embedded system ...

  6. A real time vehicles detection algorithm for vision based sensors

    CERN Document Server

    Płaczek, Bartłomiej

    2011-01-01

    A vehicle detection plays an important role in the traffic control at signalised intersections. This paper introduces a vision-based algorithm for vehicles presence recognition in detection zones. The algorithm uses linguistic variables to evaluate local attributes of an input image. The image attributes are categorised as vehicle, background or unknown features. Experimental results on complex traffic scenes show that the proposed algorithm is effective for a real-time vehicles detection.

  7. Diffusion Geometry Based Nonlinear Methods for Hyperspectral Change Detection

    Science.gov (United States)

    2010-05-12

    Schaum and A. Stocker, “Hyperspectral change detection and supervised matched filtering based on covariance equalization,” Proceedings of the SPIE, vol...5425, pp. 77- 90 (2004). 10. A. Schaum and A. Stocker, “Linear chromodynamics models for hyperspectral target detection,” Proceedings of the IEEE...Aerospace Conference (February 2003). 11. A. Schaum and A. Stocker, “Linear chromodynamics models for hyperspectral target detection

  8. Nondestructive Damage Detection Based on Modal Analysis

    Directory of Open Access Journals (Sweden)

    T. Plachý

    2004-01-01

    Full Text Available Three studies of damage identification and localization based on methods using experimentally estimated modal characteristics are presented. The results of an experimental investigation of simple structural elements (three RC-beams and three RC-slabs obtained in the laboratory are compared with the results obtained on a real structure (a composite bridge – a concrete deck supported by steel girders in situ. 

  9. Developing nucleic acid-based electrical detection systems

    Directory of Open Access Journals (Sweden)

    Gabig-Ciminska Magdalena

    2006-03-01

    Full Text Available Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and requirements for an ideal detector suitable for nucleic acid analysis include high sensitivity and high specificity protocol that can be completed in a relatively short time offering at the same time low detection limit. Moreover, systems that can be miniaturized and automated present a significant advantage over conventional technology, especially if detection is needed in the field. Electrical system technology for nucleic acid-based detection is an enabling mode for making miniaturized to micro- and nanometer scale bio-monitoring devices via the fusion of modern micro- and nanofabrication technology and molecular biotechnology. The electrical biosensors that rely on the conversion of the Watson-Crick base-pair recognition event into a useful electrical signal are advancing rapidly, and recently are receiving much attention as a valuable tool for microbial pathogen detection. Pathogens may pose a serious threat to humans, animal and plants, thus their detection and analysis is a significant element of public health. Although different conventional methods for detection of pathogenic microorganisms and their toxins exist and are currently being applied, improvements of molecular-based detection methodologies have changed these traditional detection techniques and introduced a new era of rapid, miniaturized and automated electrical chip detection technologies into pathogen identification sector. In this review some developments and current directions in

  10. Screening for Mutations in Kidney-Related Genes Using SURVEYOR Nuclease for Cleavage at Heteroduplex Mismatches

    OpenAIRE

    Voskarides, Konstantinos; DELTAS, Constantinos

    2009-01-01

    SURVEYOR is a new mismatch-specific plant DNA endonuclease that is very efficient for mutation scanning in heteroduplex DNA. It is much faster, cheaper, more sensitive, and easier to perform than other “traditional” mutation detection methods such as single-strand conformation polymorphism analysis, denaturing high-performance liquid chromatography, heteroduplex analysis, and phage resolvases. This is the first comprehensive report on the use of SURVEYOR for screening genes implicated in a sp...

  11. High rate of mismatch extension during reverse transcription in a single round of retrovirus replication.

    Science.gov (United States)

    Pulsinelli, G A; Temin, H M

    1994-09-27

    We made spleen necrosis virus-based retroviral vectors with mutations at the 3' end of the primer binding site region to observe the effects of terminal mismatches on retroviral replication. These vectors, when compared to a vector with the wild-type primer binding sequence, allowed us to assay the effects of the mutations on the viral titer during a single cycle of replication. The mutant vectors had titers that were comparable to the wild-type vector, indicating that reverse transcriptase has no trouble extending mismatches of as many as 3 bases under normal in vivo conditions. These results confirm and extend previous in vitro studies [Yu, H. & Goodman, M. (1992) J. Biol. Chem. 15, 10888-10896] that showed that such mismatch extension could occur in a cell-free system at high concentrations of incorrect nucleotides and in the absence of correct nucleotides. We now show that mismatch extension can occur during normal retroviral replication in cells and at normal physiological nucleotide concentrations.

  12. Multifeature Fusion Vehicle Detection Algorithm Based on Choquet Integral

    Directory of Open Access Journals (Sweden)

    Wenhui Li

    2014-01-01

    Full Text Available Vision-based multivehicle detection plays an important role in Forward Collision Warning Systems (FCWS and Blind Spot Detection Systems (BSDS. The performance of these systems depends on the real-time capability, accuracy, and robustness of vehicle detection methods. To improve the accuracy of vehicle detection algorithm, we propose a multifeature fusion vehicle detection algorithm based on Choquet integral. This algorithm divides the vehicle detection problem into two phases: feature similarity measure and multifeature fusion. In the feature similarity measure phase, we first propose a taillight-based vehicle detection method, and then vehicle taillight feature similarity measure is defined. Second, combining with the definition of Choquet integral, the vehicle symmetry similarity measure and the HOG + AdaBoost feature similarity measure are defined. Finally, these three features are fused together by Choquet integral. Being evaluated on public test collections and our own test images, the experimental results show that our method has achieved effective and robust multivehicle detection in complicated environments. Our method can not only improve the detection rate but also reduce the false alarm rate, which meets the engineering requirements of Advanced Driving Assistance Systems (ADAS.

  13. Weak Signal Frequency Detection Method Based on Generalized Duffing Oscillator

    Institute of Scientific and Technical Information of China (English)

    SHI Si-Hong; YUAN Yong; WANG Hui-Qi; LUO Mao-Kang

    2011-01-01

    @@ The sensitive characteristic to the initial value of chaos system sufficiently demonstrates the superiority in weak signal parameters detection.Analyzing the current chaos-based frequency detection method, a novel generalized Duffing equation is proposed to detect weak signal frequency.By choosing a suitable adjusting factor, when the outside driving force frequency is equal to that of the detected signal, the generalized Duffing oscillator is in great period state, which can obtain the frequency information of the detected signal.The simulation results indicate this method is rapidly convenient and shows better accuracy.%The sensitive characteristic to the initial value of chaos system sufficiently demonstrates the superiority in weak signal parameters detection. Analyzing the current chaos-based frequency detection method, a novel generalized Duffing equation is proposed to detect weak signal frequency. By choosing a suitable adjusting factor, when the outside driving force frequency is equal to that of the detected signal, the generalized Duffing oscillator is in great period state, which can obtain the frequency information of the detected signal. The simulation results indicate this method is rapidly convenient and shows better accuracy.

  14. Reducing measurement scale mismatch to improve surface energy flux estimation

    Science.gov (United States)

    Iwema, Joost; Rosolem, Rafael; Rahman, Mostaquimur; Blyth, Eleanor; Wagener, Thorsten

    2016-04-01

    Soil moisture importantly controls land surface processes such as energy and water partitioning. A good understanding of these controls is needed especially when recognizing the challenges in providing accurate hyper-resolution hydrometeorological simulations at sub-kilometre scales. Soil moisture controlling factors can, however, differ at distinct scales. In addition, some parameters in land surface models are still often prescribed based on observations obtained at another scale not necessarily employed by such models (e.g., soil properties obtained from lab samples used in regional simulations). To minimize such effects, parameters can be constrained with local data from Eddy-Covariance (EC) towers (i.e., latent and sensible heat fluxes) and Point Scale (PS) soil moisture observations (e.g., TDR). However, measurement scales represented by EC and PS still differ substantially. Here we use the fact that Cosmic-Ray Neutron Sensors (CRNS) estimate soil moisture at horizontal footprint similar to that of EC fluxes to help answer the following question: Does reduced observation scale mismatch yield better soil moisture - surface fluxes representation in land surface models? To answer this question we analysed soil moisture and surface fluxes measurements from twelve COSMOS-Ameriflux sites in the USA characterized by distinct climate, soils and vegetation types. We calibrated model parameters of the Joint UK Land Environment Simulator (JULES) against PS and CRNS soil moisture data, respectively. We analysed the improvement in soil moisture estimation compared to uncalibrated model simulations and then evaluated the degree of improvement in surface fluxes before and after calibration experiments. Preliminary results suggest that a more accurate representation of soil moisture dynamics is achieved when calibrating against observed soil moisture and further improvement obtained with CRNS relative to PS. However, our results also suggest that a more accurate

  15. Statistical Outlier Detection for Jury Based Grading Systems

    DEFF Research Database (Denmark)

    Thompson, Mary Kathryn; Clemmensen, Line Katrine Harder; Rosas, Harvey

    2013-01-01

    This paper presents an algorithm that was developed to identify statistical outliers from the scores of grading jury members in a large project-based first year design course. The background and requirements for the outlier detection system are presented. The outlier detection algorithm and the f...

  16. Active Fault Detection Based on a Statistical Test

    DEFF Research Database (Denmark)

    Sekunda, André Krabdrup; Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2016-01-01

    In this paper active fault detection of closed loop systems using dual Youla-Jabr-Bongiorno-Kucera(YJBK) parameters is presented. Until now all detector design for active fault detection using the dual YJBK parameters has been based on CUSUM detectors. Here a method for design of a matched filter...

  17. Revisiting anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, Damiano

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  18. A new benchmark for stereo-based pedestrian detection

    NARCIS (Netherlands)

    C.G. Keller; M. Enzweiler; D.M. Gavrila

    2011-01-01

    Pedestrian detection is a rapidly evolving area in the intelligent vehicles domain. Stereo vision is an attractive sensor for this purpose. But unlike for monocular vision, there are no realistic, large scale benchmarks available for stereo-based pedestrian detection, to provide a common point of re

  19. Polypyrrole based gas sensor for ammonia detection

    Science.gov (United States)

    Dunst, K. J.; Cysewska, K.; Kalinowski, P.; Jasiński, P.

    2016-01-01

    The nature of polypyrrole response to toxic gases does not allow using the sensor in a conventional way. The main aim of this study is to acquire the information about the concentration using different approaches: a linear approximation, a non-linear approximation and a tangent method. In this paper a two-steps procedure for sensor response measurements has been utilized. Polypyrrole films were electrochemically synthesized on the interdigitated electrodes. Gas sensing measurements of polypyrrole based sensor were carried out at room temperature. The influence of the flow rate on the sensing performance to NH3 were investigated. The preliminary studies of aging of the sensor were also explored.

  20. Scintillation particle detection based on microfluidics

    CERN Document Server

    Mapelli, A; Renaud, P; Gorini, B; Trivino, N Vico; Jiguet, S; Vandelli, W; Haguenauer, M

    2010-01-01

    A novel type of particle detector based on scintillation, with precise spatial resolution and high radiation hardness, is being studied. It consists of a single microfluidic channel filled with a liquid scintillator and is designed to define an array of scintillating waveguides each independently coupled to a photodetector. Prototype detectors built using an SU-8 epoxy resin have been tested with electrons from a radioactive source. The experimental results show a light yield compatible with the theoretical expectations and confirm the validity of the approach. (C) 2010 Elsevier B.V. All rights reserved.

  1. A Multistep Framework for Vision Based Vehicle Detection

    Directory of Open Access Journals (Sweden)

    Hai Wang

    2014-01-01

    Full Text Available Vision based vehicle detection is a critical technology that plays an important role in not only vehicle active safety but also road video surveillance application. In this work, a multistep framework for vision based vehicle detection is proposed. In the first step, for vehicle candidate generation, a novel geometrical and coarse depth information based method is proposed. In the second step, for candidate verification, a deep architecture of deep belief network (DBN for vehicle classification is trained. In the last step, a temporal analysis method based on the complexity and spatial information is used to further reduce miss and false detection. Experiments demonstrate that this framework is with high true positive (TP rate as well as low false positive (FP rate. On road experimental results demonstrate that the algorithm performs better than state-of-the-art vehicle detection algorithm in testing data sets.

  2. Algorithms for Speeding up Distance-Based Outlier Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — The problem of distance-based outlier detection is difficult to solve efficiently in very large datasets because of potential quadratic time complexity. We address...

  3. Vibration Based Sun Gear Damage Detection

    Science.gov (United States)

    Hood, Adrian; LaBerge, Kelsen; Lewicki, David; Pines, Darryll

    2013-01-01

    Seeded fault experiments were conducted on the planetary stage of an OH-58C helicopter transmission. Two vibration based methods are discussed that isolate the dynamics of the sun gear from that of the planet gears, bearings, input spiral bevel stage, and other components in and around the gearbox. Three damaged sun gears: two spalled and one cracked, serve as the focus of this current work. A non-sequential vibration separation algorithm was developed and the resulting signals analyzed. The second method uses only the time synchronously averaged data but takes advantage of the signal/source mapping required for vibration separation. Both algorithms were successful in identifying the spall damage. Sun gear damage was confirmed by the presence of sun mesh groups. The sun tooth crack condition was inconclusive.

  4. Adaptive, Model-Based Monitoring and Threat Detection

    Science.gov (United States)

    Valdes, Alfonso; Skinner, Keith

    2002-09-01

    We explore the suitability of model-based probabilistic techniques, such as Bayes networks, to the field of intrusion detection and alert report correlation. We describe a network intrusion detection system (IDS) using Bayes inference, wherein the knowledge base is encoded not as rules but as conditional probability relations between observables and hypotheses of normal and malicious usage. The same high-performance Bayes inference library was employed in a component of the Mission-Based Correlation effort, using an initial knowledge base that adaptively learns the security administrator's preference for alert priority and rank. Another major effort demonstrated probabilistic techniques in heterogeneous sensor correlation. We provide results for simulated attack data, live traffic, and the CyberPanel Grand Challenge Problem. Our results establish that model-based probabilistic techniques are an important complementary capability to signature-based methods in detection and correlation.

  5. Voltage Sag Source Location Based on Instantaneous Energy Detection

    DEFF Research Database (Denmark)

    Chen, Zhe; Kong, Wei; Dong, Xinzhou

    2008-01-01

    Voltage sag is a major power quality problem, which could disrupt the operation of voltage-sensitive equipment. This paper presents the method based on variation components-based instantaneous energy for voltage sag source detection. Simulations have been performed to provide the thorough analysi...... for system with distributed generation units. The studies show that the presented method can effectively detect the location of voltage sag source....

  6. Abnormal traffic flow data detection based on wavelet analysis

    Directory of Open Access Journals (Sweden)

    Xiao Qian

    2016-01-01

    Full Text Available In view of the traffic flow data of non-stationary, the abnormal data detection is difficult.proposed basing on the wavelet analysis and least squares method of abnormal traffic flow data detection in this paper.First using wavelet analysis to make the traffic flow data of high frequency and low frequency component and separation, and then, combined with least square method to find abnormal points in the reconstructed signal data.Wavelet analysis and least square method, the simulation results show that using wavelet analysis of abnormal traffic flow data detection, effectively reduce the detection results of misjudgment rate and false negative rate.

  7. USING MORPHLET-BASED IMAGE REPRESENTATION FOR OBJECT DETECTION

    Directory of Open Access Journals (Sweden)

    V. S. Gorbatsevich

    2016-06-01

    Full Text Available In this paper, we propose an original method for objects detection based on a special tree-structured image representation – the trees of morphlets. The method provides robust detection of various types of objects in an image without employing a machine learning procedure. Along with a bounding box creation on a detection step, the method makes pre-segmentation, which can be further used for recognition purposes. Another important feature of the proposed approach is that there are no needs to use a running window as well as a features pyramid in order to detect the objects of different sizes.

  8. [Avoidance of patient-prosthesis mismatch].

    Science.gov (United States)

    Sakamoto, Y; Hashimoto, K

    2006-04-01

    To minimize the incidence of patient-prosthesis mismatch (PPM), we have routinely adopted aortic root enlargement to avoid PPM for patients with small aortic annulus. The aim of this study was to review our strategy of avoiding PPM. The Carpentier-Edwards Perimount (CEP) valves were implanted in 53 patients who were mostly aged over 65 and the St. Jude Medical (SJM) mechanical valves were used in 128 patients aged under 65. A standard 21-mm SJM valve was used in only 3 patients and no 19-mm valves were employed. However, 19-mm CEP valves were used in 12 patients with a small body surface area (1.43 +/- 0.14 m2). Of these, 26 patients (14.4%) who had a small aortic annulus and 24 patients aged under 65 underwent aortic root enlargement. No patient receiving an SJM valve had an projected indexed effective orifice area (EOAI) small annulus, the first choice for avoiding PPM is aortic annular enlargement, which may be avoided by high performance mechanical valves with larger EOA.

  9. Ensemble-based Malware Detection with Different Voting Schemes

    Directory of Open Access Journals (Sweden)

    Ms. Jyoti H. Landage

    2014-10-01

    Full Text Available Now a day’s computer security is the field which attempts to keep information on the computer safe and secure. Security means permitting things you do want, while preventing things you don’t want from happening. Malware represents a serious threat to security of computer system. Traditional anti-malware products use the signature-based, heuristic-based detection techniques to detect the malware. These techniques detect the known malware accurately but can’t detect the new, unknown malware. This paper presents a malware detection system based on the data mining and machine learning technique. The proposed method consists of disassemble process, feature extraction process and feature selection process. Three classification algorithms are employed on dataset to generate and train the classifiers named as Ripper, C4.5, IBk. The ensemble method Voting is used to improve the accuracy of results. Here majority voting and veto voting are implemented; the expected output is decided on the basis of majority and veto voting. The decision strategy of veto is improved by introducing the trust-based veto voting. The results of majority voting, veto voting and trust-based veto voting are compared. The experimental results show that the trust-based veto voting can accurately detect known and unknown malware instances better than majority voting and can identify the benign files better than veto voting.

  10. ENSEMBLE-BASED MALWARE DETECTION WITH DIFFERENT VOTING SCHEMES

    Directory of Open Access Journals (Sweden)

    Jyoti H. Landage

    2015-10-01

    Full Text Available Now a day’s computer security is the field which attempts to keep information on the computer safe and secure. Security means permitting things you do want, while preventing things you don't want from happening. Malware represents a serious threat to security of computer system. Traditional anti-malware products use the signature-based, heuristic-based detection techniques to detect the malware. These techniques detect the known malware accurately but can't detect the new, unknown malware. This paper presents a malware detection system based on the data mining and machine learning technique. The proposed method consists of disassemble process, feature extraction process and feature selection process. Three classification algorithms are employed on dataset to generate and train the classifiers named as Ripper, C4.5, IBk. The ensemble method Voting is used to improve the accuracy of results. Here majority voting and veto voting are implemented; the expected output is decided on the basis of majority and veto voting. The decision strategy of veto is improved by introducing the trust-based veto voting. The results of majority voting, veto voting and trust-based veto voting are compared. The experimental results show that the trust-based veto voting can accurately detect known and unknown malware instances better than majority voting and can identify the benign files better than veto voting.

  11. Association of common variants in mismatch repair genes and breast cancer susceptibility: a multigene study

    Directory of Open Access Journals (Sweden)

    Pina Julieta

    2009-09-01

    Full Text Available Abstract Background MMR is responsible for the repair of base-base mismatches and insertion/deletion loops. Besides this, MMR is also associated with an anti-recombination function, suppressing homologous recombination. Losses of heterozygosity and/or microsatellite instability have been detected in a large number of skin samples from breast cancer patients, suggesting a potential role of MMR in breast cancer susceptibility. Methods We carried out a hospital-based case-control study in a Caucasian Portuguese population (287 cases and 547 controls to estimate the susceptibility to non-familial breast cancer associated with some polymorphisms in mismatch repair genes (MSH3, MSH4, MSH6, MLH1, MLH3, PMS1 and MUTYH. Results Using unconditional logistic regression we found that MLH3 (L844P, G>A polymorphism GA (Leu/Pro and AA (Pro/Pro genotypes were associated with a decreased risk: OR = 0.65 (0.45-0.95 (p = 0.03 and OR = 0.62 (0.41-0.94 (p = 0.03, respectively. Analysis of two-way SNP interaction effects on breast cancer revealed two potential associations to breast cancer susceptibility: MSH3 Ala1045Thr/MSH6 Gly39Glu - AA/TC [OR = 0.43 (0.21-0.83, p = 0.01] associated with a decreased risk; and MSH4 Ala97Thr/MLH3 Leu844Pro - AG/AA [OR = 2.35 (1.23-4.49, p = 0.01], GG/AA [OR = 2.11 (1.12-3,98, p = 0.02], and GG/AG [adjusted OR = 1.88 (1.12-3.15, p = 0.02] all associated with an increased risk for breast cancer. Conclusion It is possible that some of these common variants in MMR genes contribute significantly to breast cancer susceptibility. However, further studies with a large sample size will be needed to support our results.

  12. A Smartphone Malware Detection Framework Based on Artificial Immunology

    Directory of Open Access Journals (Sweden)

    Min Zhao

    2013-02-01

    Full Text Available With the sharp increase in the number of smartphones, the Android platform pose to becoming a market leader that makes the need for malware analysis on this platform an urgent issue. The current Artificial Immune-Based malware detection systems research focus on traditional computers that uses information from OS or network, but the smartphone software behavior has its own structure and semantics. Current research cannot detect malware in smartphone exactly and efficiently. To address these problems, in this paper, we capitalize on earlier approaches for dynamic analysis of application behavior as a means for detecting malware in the smartphone. An Artificial Immune-Based Smartphone Malware Detection Framework is brought forwards and a prototype system is implemented, the experiment result show that the system can obtain higher detection rate and decrease the false positive rate.

  13. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  14. Outlier Mining Based Abnormal Machine Detection in Intelligent Maintenance

    Institute of Scientific and Technical Information of China (English)

    ZHANG Lei; CAO Qi-xin; LEE Jay

    2009-01-01

    Assessing machine's performance through comparing the same or similar machines is important to implement intelligent maintenance for swarm machine. In this paper, an outlier mining based abnormal machine detection algorithm is proposed for this purpose. Firstly, the outlier mining based on clustering is introduced and the definition of cluster-based global outlier factor (CBGOF) is presented. Then the modified swarm intelligence clustering(MSIC) algorithm is suggested and the outlier mining algorithm based on MSIC is proposed. The algorithm can not only cluster machines according to their performance but also detect possible abnormal machines. Finally, a comparison of mobile soccer robots' performance proves the algorithm is feasible and effective.

  15. Caption detection from video sequence based on fuzzy neural networks

    Science.gov (United States)

    Gao, Xinbo; Xin, Hong; Li, Jie

    2001-09-01

    Caption graphically superimposed in video frames can provide important indexing information. The automatic detection and recognition of video captions can be of great help in querying topics of interest in digital news library. To detect the caption from video sequence, we present algorithms based on fuzzy clustering neural networks. Since neural networks have the capabilities of learning and self-organizing and parallel computing mechanism, with the great increasing of digital images and video databases, neural networks based techniques become more efficient and popular tools for multimedia processing. Experimental results show that our caption detection scheme is effective and robust.

  16. Image Fakery Detection Based on Singular Value Decomposition

    Directory of Open Access Journals (Sweden)

    T. Basaruddin

    2009-11-01

    Full Text Available The growing of image processing technology nowadays make it easier for user to modify and fake the images. Image fakery is a process to manipulate part or whole areas of image either in it content or context with the help of digital image processing techniques. Image fakery is barely unrecognizable because the fake image is looking so natural. Yet by using the numerical computation technique it is able to detect the evidence of fake image. This research is successfully applied the singular value decomposition method to detect image fakery. The image preprocessing algorithm prior to the detection process yields two vectors orthogonal to the singular value vector which are important to detect fake image. The result of experiment to images in several conditions successfully detects the fake images with threshold value 0.2. Singular value decomposition-based detection of image fakery can be used to investigate fake image modified from original image accurately.

  17. Strain compensation in a semiconducting device structure using an intentionally mismatched uniform buffer layer

    Science.gov (United States)

    Kujofsa, Tedi; Ayers, John E.

    2016-12-01

    The extent of strain relaxation in semiconducting device heterostructures has important implications in the design of high electron mobility transistors, light-emitting diodes, and laser diodes, in which the residual strain affects the device characteristics. In this work, we develop the theoretical framework for understanding strain compensation in a semiconductor device layer using a uniform buffer layer which can be intentionally mismatched to the material above. Specifically, we determined the critical condition for complete strain compensation in the device layer by intentionally introducing a compositional mismatch at the device-buffer interface. We present minimum energy calculations and show that for a given device layer with fixed mismatch and layer thickness, the buffer layer may be designed with the appropriate combination of thickness and mismatch such that the device layer will have zero residual strain in equilibrium. Such a structure can be referred to as a completely strain-compensated design. In the more general case, there may be partial strain compensation, and we give a simple physics-based Gaussian-type function describing the residual strain in the device layer. We have applied this general framework to In x Ga1-x As/GaAs (001) heterostructures for the purpose of illustration, but the work is applicable to any diamond or zinc blende (001) heteroepitaxial material system.

  18. ROLE OF MISMATCH REPAIR PROTEINS IN THE PROCESSING OF CISPLATIN INTERSTRAND CROSS-LINKS

    Science.gov (United States)

    Sawant, Akshada; Kothandapani, Anbarasi; Zhitkovich, Anatoly; Sobol, Robert W.; Patrick, Steve M.

    2015-01-01

    Mismatch repair (MMR) deficiency gives rise to cisplatin resistance and can lead to poor prognosis in cancers. Various models have been proposed to explain this low level of resistance caused due to loss of MMR proteins. We have shown that MMR proteins are required to maintain cisplatin interstrand cross-links (ICLs) on the DNA leading to increased cellular sensitivity. In our previous studies, we have shown that BER processing of the cisplatin ICLs is mutagenic. Polymerase β (Polβ) can generate mismatches which leads to the activation and the recruitment of mismatch repair proteins. In this paper, we distinguished between the requirement of different downstream MMR proteins for maintaining cisplatin sensitivity. We show that the MutSα (MSH2-MSH6) heterocomplex is required to maintain cisplatin sensitivity, whereas the Mutsβ complex has no effect. These results can be correlated with the increased repair of cisplatin ICLs and ICL induced DNA double strand breaks (DSBs) in the resistant cells. Moreover, we show that MLH1 proficient cells displayed a cisplatin sensitive phenotype when compared with the MLH1 deficient cells and the ATPase activity of MLH1 is essential to mediate this effect. Based on these results, we propose that MutSα as well as the downstream MMR pathway proteins are essential to maintain a cisplatin sensitive phenotype as a consequence of processing Polβ induced mismatches at sites flanking cisplatin ICLs. PMID:26519826

  19. Hairpin DNA Switch for Ultrasensitive Spectrophotometric Detection of DNA Hybridization Based on Gold Nanoparticles and Enzyme Signal Amplification

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Youyu; Tang, Zhiwen; Wang, Jun; Wu, Hong; Maham, Aihui; Lin, Yuehe

    2010-08-01

    A novel DNA detection platform based on a hairpin-DNA switch, nanoparticles, and enzyme signal amplification for ultrasensitive detection of DNA hybridization has been developed in this work. In this DNA assay, a “stem-loop” DNA probe dually labeled with a thiol at its 5’ end and a biotin at its 3’ end, respectively, was used. This probe was immobilized on the gold nanoparticles (AuNPs) anchored by a protein, globulin, on a 96-well microplate. In the absence of target DNA, the immobilized probe with the stem-loop structure shields the biotin from being approached by a bulky horseradish peroxidase linked-avidin (avidin-HRP) conjugate due to the steric hindrance. However, in the presence of target DNA, the hybridization between the hairpin DNA probe and the target DNA causes significant conformational change of the probe, which forces biotin away from the surface of AuNPs. As a result, the biotin becomes accessible by the avidin-HRP, and the target hybridization event can be sensitively detected via the HRP catalyzed substrate 3, 3', 5, 5'-tetramethylbenzidine using spectrophometric method. Some experimental parameters governing the performance of the assay have been optimized. At optimal conditions, this DNA assay can detect DNA at the concentration of femtomolar level by means of a signal amplification strategy based on the combination of enzymes and nanoparticles. This approach also has shown excellent specificity to distinguish single-base mismatches of DNA targets because of the intrinsic high selectivity of the hairpin DNA probe.

  20. Learning-Based Detection of Harmful Data in Mobile Devices

    Directory of Open Access Journals (Sweden)

    Seok-Woo Jang

    2016-01-01

    Full Text Available The Internet has supported diverse types of multimedia content flowing freely on smart phones and tablet PCs based on its easy accessibility. However, multimedia content that can be emotionally harmful for children is also easily spread, causing many social problems. This paper proposes a method to assess the harmfulness of input images automatically based on an artificial neural network. The proposed method first detects human face areas based on the MCT features from the input images. Next, based on color characteristics, this study identifies human skin color areas along with the candidate areas of nipples, one of the human body parts representing harmfulness. Finally, the method removes nonnipple areas among the detected candidate areas using the artificial neural network. The experimental results show that the suggested neural network learning-based method can determine the harmfulness of various types of images more effectively by detecting nipple regions from input images robustly.

  1. Detection of infrastructure manipulation with knowledge-based video surveillance

    Science.gov (United States)

    Muench, David; Hilsenbeck, Barbara; Kieritz, Hilke; Becker, Stefan; Grosselfinger, Ann-Kristin; Huebner, Wolfgang; Arens, Michael

    2016-10-01

    We are living in a world dependent on sophisticated technical infrastructure. Malicious manipulation of such critical infrastructure poses an enormous threat for all its users. Thus, running a critical infrastructure needs special attention to log the planned maintenance or to detect suspicious events. Towards this end, we present a knowledge-based surveillance approach capable of logging visual observable events in such an environment. The video surveillance modules are based on appearance-based person detection, which further is used to modulate the outcome of generic processing steps such as change detection or skin detection. A relation between the expected scene behavior and the underlying basic video surveillance modules is established. It will be shown that the combination already provides sufficient expressiveness to describe various everyday situations in indoor video surveillance. The whole approach is qualitatively and quantitatively evaluated on a prototypical scenario in a server room.

  2. A new approach toward object-based change detection

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Object-based change detection has been the hotspot in remote sensing image processing.A new approach toward object-based change detection is proposed.The two different temporal images are unitedly segmented using the mean shift procedure to obtain corresponding objects.Then change detection is implemented based on the integration of corresponding objects’ intensity and texture differences.Experiments are conducted on both panchromatic images and multispectral images and the results show that the integrated measure is robust with respect to illumination changes and noise.Supplementary color detection is conducted to determine whether the color of the unchanged objects changes or not when dealing with multispectral images.Some verification work is carried out to show the accuracy of the proposed approach.

  3. Detection of heavy metal by paper-based microfluidics.

    Science.gov (United States)

    Lin, Yang; Gritsenko, Dmitry; Feng, Shaolong; Teh, Yi Chen; Lu, Xiaonan; Xu, Jie

    2016-09-15

    Heavy metal pollution has shown great threat to the environment and public health worldwide. Current methods for the detection of heavy metals require expensive instrumentation and laborious operation, which can only be accomplished in centralized laboratories. Various microfluidic paper-based analytical devices have been developed recently as simple, cheap and disposable alternatives to conventional ones for on-site detection of heavy metals. In this review, we first summarize current development of paper-based analytical devices and discuss the selection of paper substrates, methods of device fabrication, and relevant theories in these devices. We then compare and categorize recent reports on detection of heavy metals using paper-based microfluidic devices on the basis of various detection mechanisms, such as colorimetric, fluorescent, and electrochemical methods. To finalize, the future development and trend in this field are discussed.

  4. An Efficient Fuzzy Clustering-Based Approach for Intrusion Detection

    CERN Document Server

    Nguyen, Huu Hoa; Darmont, Jérôme

    2011-01-01

    The need to increase accuracy in detecting sophisticated cyber attacks poses a great challenge not only to the research community but also to corporations. So far, many approaches have been proposed to cope with this threat. Among them, data mining has brought on remarkable contributions to the intrusion detection problem. However, the generalization ability of data mining-based methods remains limited, and hence detecting sophisticated attacks remains a tough task. In this thread, we present a novel method based on both clustering and classification for developing an efficient intrusion detection system (IDS). The key idea is to take useful information exploited from fuzzy clustering into account for the process of building an IDS. To this aim, we first present cornerstones to construct additional cluster features for a training set. Then, we come up with an algorithm to generate an IDS based on such cluster features and the original input features. Finally, we experimentally prove that our method outperform...

  5. Multicriteria Similarity-Based Anomaly Detection Using Pareto Depth Analysis.

    Science.gov (United States)

    Hsiao, Ko-Jen; Xu, Kevin S; Calder, Jeff; Hero, Alfred O

    2016-06-01

    We consider the problem of identifying patterns in a data set that exhibits anomalous behavior, often referred to as anomaly detection. Similarity-based anomaly detection algorithms detect abnormally large amounts of similarity or dissimilarity, e.g., as measured by the nearest neighbor Euclidean distances between a test sample and the training samples. In many application domains, there may not exist a single dissimilarity measure that captures all possible anomalous patterns. In such cases, multiple dissimilarity measures can be defined, including nonmetric measures, and one can test for anomalies by scalarizing using a nonnegative linear combination of them. If the relative importance of the different dissimilarity measures are not known in advance, as in many anomaly detection applications, the anomaly detection algorithm may need to be executed multiple times with different choices of weights in the linear combination. In this paper, we propose a method for similarity-based anomaly detection using a novel multicriteria dissimilarity measure, the Pareto depth. The proposed Pareto depth analysis (PDA) anomaly detection algorithm uses the concept of Pareto optimality to detect anomalies under multiple criteria without having to run an algorithm multiple times with different choices of weights. The proposed PDA approach is provably better than using linear combinations of the criteria, and shows superior performance on experiments with synthetic and real data sets.

  6. Adaptive Neural Stabilizing Controller for a Class of Mismatched Uncertain Nonlinear Systems by State and Output Feedback.

    Science.gov (United States)

    Arefi, Mohammad Mehdi; Jahed-Motlagh, Mohammad Reza; Karimi, Hamid Reza

    2015-08-01

    In this paper, first, an adaptive neural network (NN) state-feedback controller for a class of nonlinear systems with mismatched uncertainties is proposed. By using a radial basis function NN (RBFNN), a bound of unknown nonlinear functions is approximated so that no information about the upper bound of mismatched uncertainties is required. Then, an observer-based adaptive controller based on RBFNN is designed to stabilize uncertain nonlinear systems with immeasurable states. The state-feedback and observer-based controllers are based on Lyapunov and strictly positive real-Lyapunov stability theory, respectively, and it is shown that the asymptotic convergence of the closed-loop system to zero is achieved while maintaining bounded states at the same time. The presented methods are more general than the previous approaches, handling systems with no restriction on the dimension of the system and the number of inputs. Simulation results confirm the effectiveness of the proposed methods in the stabilization of mismatched nonlinear systems.

  7. Myocardial perfusion/metabolism mismatch and ventricular arrhythmias in the chronic post infarction state

    Energy Technology Data Exchange (ETDEWEB)

    Krause, B.J.; Poeppel, T.D.; Vosberg, H.; Mueller, H.W. [Dept. of Nuclear Medicine, Heinrich Heine Univ., Duesseldorf (Germany); Reinhardt, M. [Praxis fuer Radiologie und Nuklearmedizin, Dorsten (Germany); Vester, E.G. [Dept. of Cardiology, Evangelisches Krankenhaus, Duesseldorf (Germany); Yong, M.; Mau, J. [Dept. of Statistics in Medicine, Heinrich Heine Univ., Duesseldorf (Germany); Strauer, B.E. [Dept. of Medicine, Div. of Cardiology, Angiology and Pulmonary Disease, Heinrich Heine Univ., Duesseldorf (Germany)

    2005-07-01

    Aim: Ventricular arrhythmias have been shown to originate in the myocardial peri-infarct region due to irregular heterotopic conduction. Hypoperfused but viable myocardium is often localised in those areas and may be involved in the pathogenesis of arrhythmias. We tested the hypothesis that these myocardial perfusion/metabolism mismatches (MM) are significantly associated with ventricular arrhythmias in the chronic post infarction state. Patients, methods: 47 post infarction patients were included in the study. 33 suffered from ventricular arrhythmia whereas 14 did not. All patients underwent {sup 99m}Tc tetrofosmin SPECT and {sup 18}F-FDG PET. A region-of-interest(ROI)-analysis was used to assess viable myocardium based on predefined MM-criteria. Univariate analyses as well as a logistic regression model for the multivariate analysis were carried out. Results: 94% of the arrhythmic patients displayed at least one MM-segment as compared to 64% of the non-arrhythmic patients. MM-segments and arrhythmia showed a statistically significant relation (p=0.018). The logistic regression model predicted the occurrence or absence of arrhythmia in 85% of all cases. Multivariate analysis gave consistent results, after adjusting for symptomatic chronic heart failure (CHF), aneurysms and age. Conclusion: Our results support the hypothesis that hypoperfused but viable myocardium represents an arrhyhmogenic substrate and is a relevant risk factor for developing ventricular arrhythmias following myocardial infarction. Therefore, the detection of MM-segments allows the identification of patients with a higher risk for future cardiac events. (orig.)

  8. Lattice mismatch induced curved configurations of hybrid boron nitride-carbon nanotubes

    Science.gov (United States)

    Zhang, Jin

    2016-10-01

    A unique curved configuration is observed in freestanding hybrid boron nitride-carbon nanotubes (BN-CNTs) based on molecular dynamics simulations, which, in previous studies, was tacitly assumed as a straight configuration. The physical fundamentals of this phenomenon are explored by using the continuum mechanics theory, where the curved configuration of BN-CNTs is found to be induced by the bending effect due to the lattice mismatch between the C domain and the BN domain. In addition, our results show that the curvature of the curved BN-CNTs is determined by their radius and composition. The curvature of BN-CNTs decreases with growing radius of BN-CNTs and becomes ignorable when their radius is relatively large. A non-monotonic relationship is detected between the curvature and the composition of BN-CNTs. Specifically, the curvature of BN-CNTs increases with growing BN concentration when the molar fraction of BN atoms is smaller than a critical value 0.52, but decreases with growing BN concentration when the molar fraction of BN atoms is larger than this critical value.

  9. Mutation screening of mismatch repair gene Mlh3 in familial esophageal cancer

    Institute of Scientific and Technical Information of China (English)

    Hong-Xu Liu; Yu Li; Xue-Dong Jiang; Hong-Nian Yin; Lin Zhang; Yu Wang; Jun Yang

    2006-01-01

    AIM: To shed light on the possible role of mismatch repair gene Mlh3 in familial esophageal cancer (FEC).METHODS: A total of 66 members from 10 families suggestive of a genetic predisposition to hereditary esophageal cancer were screened for germline mutations in Mlh3 with denaturing high performance liquid chromatography (DHPLC), a newly developed method of comparative sequencing based on heteroduplex detection. For all samples exhibiting abnormal DHPLC profiles,sequence changes were evaluated by cycle sequencing.For any mutation in family members, we conducted a segregation study to compare its prevalence in sporadic esophageal cancer patients and normal controls.RESULTS: Exons of Mlh3 in all samples were successfully examined. Overall, 4 missense mutations and 3 polymorphisms were identified in 4 families. Mlh3 missense mutations in families 9 and 10 might be pathogenic, but had a reduced penetrance. While in families 1 and 7,there was no sufficient evidence supporting the monogenic explanations of esophageal cancers in families.The mutations were found in 33% of high-risk families and 50% of low-risk families.CONCLUSION: Mlh3 is a high risk gene with a reduced penetrance in some families. However, it acts as a low risk gene for esophageal cancer in most families. Mutations of Mlh3 may work together with other genes in an accumulated manner and result in an increased risk of esophageal tumor. DHPLC is a robust and sensitive technique for screening gene mutations.

  10. Auditory cortical and hippocampal-system mismatch responses to duration deviants in urethane-anesthetized rats.

    Directory of Open Access Journals (Sweden)

    Timo Ruusuvirta

    Full Text Available Any change in the invariant aspects of the auditory environment is of potential importance. The human brain preattentively or automatically detects such changes. The mismatch negativity (MMN of event-related potentials (ERPs reflects this initial stage of auditory change detection. The origin of MMN is held to be cortical. The hippocampus is associated with a later generated P3a of ERPs reflecting involuntarily attention switches towards auditory changes that are high in magnitude. The evidence for this cortico-hippocampal dichotomy is scarce, however. To shed further light on this issue, auditory cortical and hippocampal-system (CA1, dentate gyrus, subiculum local-field potentials were recorded in urethane-anesthetized rats. A rare tone in duration (deviant was interspersed with a repeated tone (standard. Two standard-to-standard (SSI and standard-to-deviant (SDI intervals (200 ms vs. 500 ms were applied in different combinations to vary the observability of responses resembling MMN (mismatch responses. Mismatch responses were observed at 51.5-89 ms with the 500-ms SSI coupled with the 200-ms SDI but not with the three remaining combinations. Most importantly, the responses appeared in both the auditory-cortical and hippocampal locations. The findings suggest that the hippocampus may play a role in (cortical manifestation of MMN.

  11. Subpixel edge detection method based on low-frequency filtering

    Science.gov (United States)

    Bylinsky, Yosip Y.; Kotyra, Andrzej; Gromaszek, Konrad; Iskakova, Aigul

    2016-09-01

    A method of edge detection in images is proposed basing that based on low-frequency filtering. The method uses polynomial interpolation to determine the coordinates of the edge point with subpixel accuracy. Some experiments have been results also have been provided.

  12. Analysis of second-harmonic generation microscopy under refractive index mismatch

    Institute of Scientific and Technical Information of China (English)

    Wang Xiang-Hui; Lin Lie; Zhang Yang

    2007-01-01

    On the basis of the vector diffraction theory and Green's function method, this paper investigates the effects of refractive index mismatch on second-harmonic generation (SHG) microscopy. The polarization distribution and SHG intensity are calculated as functions of the sample radius and probe depth. The numerical results show that refractive index mismatch can result in peak intensity degradation, increase secondary lobes and extension of secondharmonic polarization distribution. Because of the attenuation of polarization intensity, the detected SHG intensity significantly decreases with increasing probe depth, which can limit the imaging depth of SHG microcopy inside thick samples. Forward SHG intensity decays slowly than backward SHG, due to the combination of extension secondharmonic polarization distribution and strong dependency of forward SHG on sample radius.

  13. Noise analysis for sensitivity-based structural damage detection

    Institute of Scientific and Technical Information of China (English)

    YIN Tao; ZHU Hong-ping; YU Ling

    2007-01-01

    As vibration-based structural damage detection methods are easily affected by environmental noise, a new statistic-based noise analysis method is proposed together with the Monte Carlo technique to investigate the influence of experimental noise of modal data on sensitivity-based damage detection methods. Different from the commonly used random perturbation technique, the proposed technique is deduced directly by Moore-Penrose generalized inverse of the sensitivity matrix, which does not only make the analysis process more efficient but also can analyze the influence of noise on both frequencies and mode shapes for three commonly used sensitivity-based damage detection methods in a similar way. A one-story portal frame is adopted to evaluate the efficiency of the proposed noise analysis technique.

  14. A measurement-based technique for incipient anomaly detection

    KAUST Repository

    Harrou, Fouzi

    2016-06-13

    Fault detection is essential for safe operation of various engineering systems. Principal component analysis (PCA) has been widely used in monitoring highly correlated process variables. Conventional PCA-based methods, nevertheless, often fail to detect small or incipient faults. In this paper, we develop new PCA-based monitoring charts, combining PCA with multivariate memory control charts, such as the multivariate cumulative sum (MCUSUM) and multivariate exponentially weighted moving average (MEWMA) monitoring schemes. The multivariate control charts with memory are sensitive to small and moderate faults in the process mean, which significantly improves the performance of PCA methods and widen their applicability in practice. Using simulated data, we demonstrate that the proposed PCA-based MEWMA and MCUSUM control charts are more effective in detecting small shifts in the mean of the multivariate process variables, and outperform the conventional PCA-based monitoring charts. © 2015 IEEE.

  15. Automatic Vehicle License Recognition Based on Video Vehicular Detection System

    Institute of Scientific and Technical Information of China (English)

    YANG Zhaoxuan; CHEN Yang; HE Yinghua; WU Jun

    2006-01-01

    Traditional methods of license character extraction cannot meet the requirements of recognition accuracy and speed rendered by the video vehicular detection system.Therefore, a license plate localization method based on multi-scale edge detection and a character segmentation algorithm based on Markov random field model is presented.Results of experiments demonstrate that the method yields more accurate license character extraction in contrast to traditional localization method based on edge detection by difference operator and character segmentation based on threshold.The accuracy increases from 90% to 94% under preferable illumination, while under poor condition, it increases more than 5%.When the two improved algorithms are used, the accuracy and speed of automatic license recognition meet the system's requirement even under the noisy circumstance or uneven illumination.

  16. Anterior insula coordinates hierarchical processing of tactile mismatch responses.

    Science.gov (United States)

    Allen, Micah; Fardo, Francesca; Dietz, Martin J; Hillebrandt, Hauke; Friston, Karl J; Rees, Geraint; Roepstorff, Andreas

    2016-02-15

    The body underlies our sense of self, emotion, and agency. Signals arising from the skin convey warmth, social touch, and the physical characteristics of external stimuli. Surprising or unexpected tactile sensations can herald events of motivational salience, including imminent threats (e.g., an insect bite) and hedonic rewards (e.g., a caressing touch). Awareness of such events is thought to depend upon the hierarchical integration of body-related mismatch responses by the anterior insula. To investigate this possibility, we measured brain activity using functional magnetic resonance imaging, while healthy participants performed a roving tactile oddball task. Mass-univariate analysis demonstrated robust activations in limbic, somatosensory, and prefrontal cortical areas previously implicated in tactile deviancy, body awareness, and cognitive control. Dynamic Causal Modelling revealed that unexpected stimuli increased the strength of forward connections along a caudal to rostral hierarchy-projecting from thalamic and somatosensory regions towards insula, cingulate and prefrontal cortices. Within this ascending flow of sensory information, the AIC was the only region to show increased backwards connectivity to the somatosensory cortex, augmenting a reciprocal exchange of neuronal signals. Further, participants who rated stimulus changes as easier to detect showed stronger modulation of descending PFC to AIC connections by deviance. These results suggest that the AIC coordinates hierarchical processing of tactile prediction error. They are interpreted in support of an embodied predictive coding model where AIC mediated body awareness is involved in anchoring a global neuronal workspace.

  17. Anterior insula coordinates hierarchical processing of tactile mismatch responses

    Science.gov (United States)

    Allen, Micah; Fardo, Francesca; Dietz, Martin J.; Hillebrandt, Hauke; Friston, Karl J.; Rees, Geraint; Roepstorff, Andreas

    2016-01-01

    The body underlies our sense of self, emotion, and agency. Signals arising from the skin convey warmth, social touch, and the physical characteristics of external stimuli. Surprising or unexpected tactile sensations can herald events of motivational salience, including imminent threats (e.g., an insect bite) and hedonic rewards (e.g., a caressing touch). Awareness of such events is thought to depend upon the hierarchical integration of body-related mismatch responses by the anterior insula. To investigate this possibility, we measured brain activity using functional magnetic resonance imaging, while healthy participants performed a roving tactile oddball task. Mass-univariate analysis demonstrated robust activations in limbic, somatosensory, and prefrontal cortical areas previously implicated in tactile deviancy, body awareness, and cognitive control. Dynamic Causal Modelling revealed that unexpected stimuli increased the strength of forward connections along a caudal to rostral hierarchy—projecting from thalamic and somatosensory regions towards insula, cingulate and prefrontal cortices. Within this ascending flow of sensory information, the AIC was the only region to show increased backwards connectivity to the somatosensory cortex, augmenting a reciprocal exchange of neuronal signals. Further, participants who rated stimulus changes as easier to detect showed stronger modulation of descending PFC to AIC connections by deviance. These results suggest that the AIC coordinates hierarchical processing of tactile prediction error. They are interpreted in support of an embodied predictive coding model where AIC mediated body awareness is involved in anchoring a global neuronal workspace. PMID:26584870

  18. Communication in the Home and Classroom: Match or Mismatch?

    Science.gov (United States)

    Iglesias, Aquiles

    1985-01-01

    The article examines variations in communication of cultural-linguistic minority children at home and in school and describes a communicative match/mismatch model. Implications of educational policy and program development are noted. (CL)

  19. Understanding the Consequences of Property Rights Mismatches: a Case Study of New Zealand's Marine Resources

    Directory of Open Access Journals (Sweden)

    Tracy Yandle

    2007-12-01

    Full Text Available Within fisheries and natural resource management literature, there is considerable discussion about the key roles that property rights can play in building biologically and socially sustainable resource management regimes. A key point of agreement is that secure long-term property rights provide an incentive for resource users to manage the resource sustainably. However, property rights mismatches create ambiguity and conflict in resource use. Though the term mismatches is usually associated with problems in matching temporal and spatial resource characteristics with institutional characteristics, I expand it here to include problems that can arise when property rights are incompletely defined or incompletely distributed. Property rights mismatches are particularly likely to occur over marine resources, for which multiple types of resource and resource user can be engaged and managed under a variety of regulatory regimes. I used New Zealand's marine resources to examine the causes and consequences of these property rights mismatches. New Zealand is particularly interesting because its property-rights-based commercial fishing regime, in the form of individual transferable quotas, has attracted considerable positive attention. However, my review of the marine natural resource management regime from a broader property rights perspective highlights a series of problems caused by property rights mismatches, including competition for resources among commercial, customary, and recreational fishers; spatial conflict among many marine resource users; and conflicting incentives and objectives for the management of resources over time. The use of a property rights perspective also highlights some potential solutions such as the layering of institutional arrangements and the improvement of how property rights are defined to encourage long-term sustainability.

  20. Multi-core Processors based Network Intrusion Detection Method

    Directory of Open Access Journals (Sweden)

    Ziqian Wan

    2012-09-01

    Full Text Available It is becoming increasingly hard to build an intrusion detection system (IDS, because of the higher traffic throughput and the rising sophistication of attacking. Scale will be an important issue to address in the intrusion detection area. For hardware, tomorrow’s performance gains will come from multi-core architectures in which a number of CPU executes concurrently. We take the advantage of multi-core processors’ full power for intrusion detection in this work. We present an intrusion detection system based on the Snort open-source IDS that exploits the computational power of MIPS multi-core architecture to offload the costly pattern matching operations from the CPU, and thus increase the system’s processing throughput. A preliminary experiment demonstrates the potential of this system. The experiment results indicate that this method can be used effectively to speed up intrusion detection systems.

  1. Distributed intrusion detection system based on fuzzy rules

    Science.gov (United States)

    Qiao, Peili; Su, Jie; Liu, Yahui

    2006-04-01

    Computational Intelligence is the theory and method solving problems by simulating the intelligence of human using computer and it is the development of Artificial Intelligence. Fuzzy Technique is one of the most important theories of computational Intelligence. Genetic Fuzzy Technique and Neuro-Fuzzy Technique are the combination of Fuzzy Technique and novel techniques. This paper gives a distributed intrusion detection system based on fuzzy rules that has the characters of distributed parallel processing, self-organization, self-learning and self-adaptation by the using of Neuro-Fuzzy Technique and Genetic Fuzzy Technique. Specially, fuzzy decision technique can be used to reduce false detection. The results of the simulation experiment show that this intrusion detection system model has the characteristics of distributed, error tolerance, dynamic learning, and adaptation. It solves the problem of low identifying rate to new attacks and hidden attacks. The false detection rate is low. This approach is efficient to the distributed intrusion detection.

  2. Nanomaterial-Based Biosensors for Detection of Pesticides and Explosives

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Jun; Lin, Yuehe

    2009-01-01

    In this chapter, we describe nanomaterial-based biosensors for detecting OP pesticides and explosives. CNTs and functionalized silica nanoparticles have been chosen for this study. The biosensors were combined with the flow-injection system, providing great advantages for onsite, real-time, and continuous detection of environmental pollutants such as OPs and TNT. The sensors take advantage of the electrocatalytic properties of CNTs, which makes it feasible to achieve a sensitive electrochemical detection of the products from enzymatic reactions at low potential. This approach uses a large aspect ratio of silica nanoparticles, which can be used as a carrier for loading a large amount of electroactive species, such as poly(guanine), for amplified detection of explosives. These methods offer a new environmental monitoring tool for rapid, inexpensive, and highly sensitive detection of OPs or TNT compounds.

  3. Enhancing Community Detection By Affinity-based Edge Weighting Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Andy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanders, Geoffrey [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Henson, Van [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vassilevski, Panayot [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-05

    Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is ideal for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.

  4. a Uav-Based ROE Deer Fawn Detection System

    Science.gov (United States)

    Israel, M.

    2011-09-01

    This paper presents a UAV based remote sensing system for the detection of fawns in the meadows. There is a high demand because during pasture mowing many wild animals, especially roe deer fawns are killed by mowing machines. The system was tested in several real situations especially with differing weather and iluminating conditions. Its primary sensor is a lightweight thermal infrared camera. The images are captured onboard of the flight system and also transmitted as analog video stream to the ground station, where the user can follow the camera live stream on a monitor for manual animal detection. Beside a high detection rate a fast workflow is another very important objective for this application. Therefore a waypoint planning software was developed that accelerates the workflow. At adequate illuminating and weather conditions the presented UAV-based fawn detection via thermal imaging is a comfortable, fast and reliable method.

  5. Using Case-Based Reasoning for detecting computer virus

    Directory of Open Access Journals (Sweden)

    Abdellatif Berkat

    2011-07-01

    Full Text Available The typical antivirus approach consists of waiting for a number of computers to be infected, detecting the virus, designing a solution, delivering and deploying a solution. In such a situation, it is very difficult to prevent every machine from being compromised by viruses. In this paper, we propose a new method, for detecting computer viruses, that is based on the technique of Case-Based Reasoning (CBR. In this method: (1 even new viruses that do not exist in the database can be detected (2 The updating of the virus database is done automatically without connecting to the Internet. Whenever a new virus is detected, it will be automatically added to the database used by our application. This presents a major advantage

  6. The Unknown Computer Viruses Detection Based on Similarity

    Science.gov (United States)

    Liu, Zhongda; Nakaya, Naoshi; Koui, Yuuji

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.

  7. A Detection Scheme for Cavity-based Dark Matter Searches

    CERN Document Server

    Bukhari, M H S

    2016-01-01

    We present here proposal of a scheme and some useful ideas for resonant cavity-based detection of cold dark matter axions with hope to improve the existing endeavors. The scheme is based upon our idea of a detector, which incorporates an integrated tunnel diode and a GaAs HEMT or HFET, High Electron Mobility Transistor or Heterogenous FET, for resonance detection and amplification from a resonant cavity (in a strong transverse magnetic field from a cylindrical array of halbach magnets). The idea of a TD-oscillator-amplifier combination could possibly serve as a more sensitive and viable resonance detection regime while maintaining an excellent performance with low noise temperature, whereas the halbach magnets array may offer a compact and permanent solution replacing the conventional electromagnets scheme. We believe that all these factors could possibly increase the sensitivity and accuracy of axion detection searches and reduce complications (and associated costs) in the experiments, in addition to help re...

  8. Stratification-Based Outlier Detection over the Deep Web.

    Science.gov (United States)

    Xian, Xuefeng; Zhao, Pengpeng; Sheng, Victor S; Fang, Ligang; Gu, Caidong; Yang, Yuanfeng; Cui, Zhiming

    2016-01-01

    For many applications, finding rare instances or outliers can be more interesting than finding common patterns. Existing work in outlier detection never considers the context of deep web. In this paper, we argue that, for many scenarios, it is more meaningful to detect outliers over deep web. In the context of deep web, users must submit queries through a query interface to retrieve corresponding data. Therefore, traditional data mining methods cannot be directly applied. The primary contribution of this paper is to develop a new data mining method for outlier detection over deep web. In our approach, the query space of a deep web data source is stratified based on a pilot sample. Neighborhood sampling and uncertainty sampling are developed in this paper with the goal of improving recall and precision based on stratification. Finally, a careful performance evaluation of our algorithm confirms that our approach can effectively detect outliers in deep web.

  9. Arduino-based noise robust online heart-rate detection.

    Science.gov (United States)

    Das, Sangita; Pal, Saurabh; Mitra, Madhuchhanda

    2017-04-01

    This paper introduces a noise robust real time heart rate detection system from electrocardiogram (ECG) data. An online data acquisition system is developed to collect ECG signals from human subjects. Heart rate is detected using window-based autocorrelation peak localisation technique. A low-cost Arduino UNO board is used to implement the complete automated process. The performance of the system is compared with PC-based heart rate detection technique. Accuracy of the system is validated through simulated noisy ECG data with various levels of signal to noise ratio (SNR). The mean percentage error of detected heart rate is found to be 0.72% for the noisy database with five different noise levels.

  10. Moving object detection in aerial video based on spatiotemporal saliency

    Institute of Scientific and Technical Information of China (English)

    Shen Hao; Li Shuxiao; Zhu Chengfei; Chang Hongxing; Zhang Jinglan

    2013-01-01

    In this paper, the problem of moving object detection in aerial video is addressed. While motion cues have been extensively exploited in the literature, how to use spatial information is still an open problem. To deal with this issue, we propose a novel hierarchical moving target detection method based on spatiotemporal saliency. Temporal saliency is used to get a coarse segmentation, and spatial saliency is extracted to obtain the object’s appearance details in candidate motion regions. Finally, by combining temporal and spatial saliency information, we can get refined detec-tion results. Additionally, in order to give a full description of the object distribution, spatial sal-iency is detected in both pixel and region levels based on local contrast. Experiments conducted on the VIVID dataset show that the proposed method is efficient and accurate.

  11. Statistical detection of structural damage based on model reduction

    Institute of Scientific and Technical Information of China (English)

    Tao YIN; Heung-fai LAM; Hong-ping ZHU

    2009-01-01

    This paper proposes a statistical method for damage detection based on the finite element (FE) model reduction technique that utilizes measured modal data with a limited number of sensors.A deterministic damage detection process is formulated based on the model reduction technique.The probabilistic process is integrated into the deterministic damage detection process using a perturbation technique,resulting in a statistical structural damage detection method.This is achieved by deriving the firstand second-order partial derivatives of uncertain parameters,such as elasticity of the damaged member,with respect to the measurement noise,which allows expectation and covariance matrix of the uncertain parameters to be calculated.Besides the theoretical development,this paper reports numerical verification of the proposed method using a portal frame example and Monte Carlo simulation.

  12. Stratification-Based Outlier Detection over the Deep Web

    Directory of Open Access Journals (Sweden)

    Xuefeng Xian

    2016-01-01

    Full Text Available For many applications, finding rare instances or outliers can be more interesting than finding common patterns. Existing work in outlier detection never considers the context of deep web. In this paper, we argue that, for many scenarios, it is more meaningful to detect outliers over deep web. In the context of deep web, users must submit queries through a query interface to retrieve corresponding data. Therefore, traditional data mining methods cannot be directly applied. The primary contribution of this paper is to develop a new data mining method for outlier detection over deep web. In our approach, the query space of a deep web data source is stratified based on a pilot sample. Neighborhood sampling and uncertainty sampling are developed in this paper with the goal of improving recall and precision based on stratification. Finally, a careful performance evaluation of our algorithm confirms that our approach can effectively detect outliers in deep web.

  13. Assessment of primer/template mismatch effects on real-time PCR amplification of target taxa for GMO quantification.

    Science.gov (United States)

    Ghedira, Rim; Papazova, Nina; Vuylsteke, Marnik; Ruttink, Tom; Taverniers, Isabel; De Loose, Marc

    2009-10-28

    GMO quantification, based on real-time PCR, relies on the amplification of an event-specific transgene assay and a species-specific reference assay. The uniformity of the nucleotide sequences targeted by both assays across various transgenic varieties is an important prerequisite for correct quantification. Single nucleotide polymorphisms (SNPs) frequently occur in the maize genome and might lead to nucleotide variation in regions used to design primers and probes for reference assays. Further, they may affect the annealing of the primer to the template and reduce the efficiency of DNA amplification. We assessed the effect of a minor DNA template modification, such as a single base pair mismatch in the primer attachment site, on real-time PCR quantification. A model system was used based on the introduction of artificial mismatches between the forward primer and the DNA template in the reference assay targeting the maize starch synthase (SSIIb) gene. The results show that the presence of a mismatch between the primer and the DNA template causes partial to complete failure of the amplification of the initial DNA template depending on the type and location of the nucleotide mismatch. With this study, we show that the presence of a primer/template mismatch affects the estimated total DNA quantity to a varying degree.

  14. The Unknown Computer Viruses Detection Based on Similarity

    OpenAIRE

    Liu, Zhongda; NAKAYA, Naoshi; KOUI, Yuuji

    2009-01-01

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and k...

  15. Compressive sensing holography based on optical heterodyne detection

    Science.gov (United States)

    Hu, Youjun; Zhou, Dingfu; Yuan, Sheng; Wei, Yayun; Wang, Mengting; Zhou, Xin

    2016-12-01

    In this paper, compressive sensing holography based on optical heterodyne detection is presented, which can photograph the hologram of an object. The complex hologram is composed of a sine-hologram and a cosine-hologram. A single pixel photoelectric conversion element is used to detect the time-varying optical field which contains the amplitude and phase information of the transmitted light, and a simulation result is demonstrated further by recording the Fresnel hologram of a complex amplitude object.

  16. An Eavesdropping Detecting Approach Based on Mode-Mode Correlation

    Institute of Scientific and Technical Information of China (English)

    XIONG Jin; ZENG Gui-Hua; ZHOU Nan-Run

    2005-01-01

    @@ We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed'vacuum states. With this approach, eavesdropping can be easily detected without sacrificing extra secret bits as the test key. In addition, the efficiency of the quantum key distribution protocol is enhanced greatly.

  17. Fabric Defect Detection Based on Regional Growing PCNN

    OpenAIRE

    2012-01-01

    This paper presents an adaptive image segmentation method based on a new Regional Growing Pulse Coupled Neural Network (PCNN) model for detecting fabric defects. In this method, the pixels of analyzed image are mapped on the neurons in a pulse coupled neural network. Improved PCNN model and regional growing theory are combined in the light of the requirements for fabric defect detection. And the mean and variance value of the defect-free images are introduced into this model. The validation t...

  18. Edge Detection of Concrete Mesostructure Based on DIS Operator

    OpenAIRE

    Feng, Bin; Xu, Zicheng; Xia, Jin; Jin, Shijie; Jin, Weiliang

    2016-01-01

    Aggregate edge detection is the basis of creating concrete mesoscale model, which is applied to analyze concrete mesoscale characteristics. A concrete digital image edge detection method using DIS operator is presented in this paper. Mean filter, multi-scale filter, and Gaussian filter are compared on the effect of concrete image noise reduction. Based on the result, Gaussian filter is the most optimum method to reduce image noise and remain aggregate edge distinct. Sobel operator, Laplacian ...

  19. Polarization-Based Radar Detection in Sea Clutter

    Science.gov (United States)

    2015-02-27

    Report 3. DATES COVERED (From - To) 01-04-2012 to 28-02-2015 4. TITLE AND SUBTITLE Polarization -Based Radar Detection in Sea Clutter 5a...14. ABSTRACT The goal of the proposed research is to characterize and model polarization -related behaviors of sea clutter and to use these models...that is to be exploited in this new form of detection is termed polarization mode dispersion (PMD), which is characterized by a spread in the received

  20. Inverse Problem Solution in Landmines Detection Based on Active Thermography

    Directory of Open Access Journals (Sweden)

    B. Szymanik

    2014-12-01

    Full Text Available Landmines still affect numerous territories in the whole world and pose a serious threat, mostly to civilians. Widely used non-metallic landmines are undetectable using metal detector. Therefore, there is an urging need to improve methods of detecting such objects. In the present study we introduce relatively new method of landmines' detection: active infrared thermography with microwave excitation. In this paper we present the optimization based method of solving inverse problem for microwave heating. This technique will be used in the reconstruction of detected landmines geometric and material properties.

  1. Image edge detection based on multi-fractal spectrum analysis

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-yuan; WANG Yao-nan

    2006-01-01

    In this paper,an image edge detection method based on multi-fractal spectrum analysis is presented.The coarse grain H(o)lder exponent of the image pixels is first computed,then,its multi-fractal spectrum is estimated by the kernel estimation method.Finally,the image edge detection is done by means of different multi-fractal spectrum values.Simulation results show that this method is efficient and has better locality compared with the traditional edge detection methods such as the Sobel method.

  2. QRS Detection Based on an Advanced Multilevel Algorithm

    Directory of Open Access Journals (Sweden)

    Wissam Jenkal

    2016-01-01

    Full Text Available This paper presents an advanced multilevel algorithm used for the QRS complex detection. This method is based on three levels. The first permits the extraction of higher peaks using an adaptive thresholding technique. The second allows the QRS region detection. The last level permits the detection of Q, R and S waves. The proposed algorithm shows interesting results compared to recently published methods. The perspective of this work is the implementation of this method on an embedded system for a real time ECG monitoring system.

  3. MIXED SCHEME FOR IMAGE EDGE DETECTION BASED ON WAVELET TRANSFORM

    Institute of Scientific and Technical Information of China (English)

    Xie Hongmei; Yu Bianzhang; Zhao Jian

    2004-01-01

    A mixed scheme based on Wavelet Transformation (WT) is proposed for image edge detection. The scheme combines the wavelet transform and traditional Sobel and LoG (Laplacian of Gaussian) operator edge-detection algorithms. The precise theory analysis is given to show that the wavelet transformation has an advantage for signal processing. Simulation results show that the new scheme is better than only using the Sobel or LoG methods. Complexity analysis is also given and the conclusion is acceptable, therefore the proposed scheme is effective for edge detection.

  4. INTRUSION DETECTION BASED ON THE SECOND-ORDER STOCHASTIC MODEL

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper presents a new method based on a second-order stochastic model for computer intrusion detection. The results show that the performance of the second-order stochastic model is better than that of a first-order stochastic model. In this study, different window sizes are also used to test the performance of the model. The detection results show that the second-order stochastic model is not so sensitive to the window size, comparing with the first-order stochastic model and other previous researches. The detection result of window sizes 6 and 10 is the same.

  5. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    LuoMin; ZhangHuan-guo; WangLi-na

    2003-01-01

    An unsupervised clustering-based intrusion detection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal duster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesn't need labeled training data sets. The experiment coneludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  6. Vision-Based People Detection System for Heavy Machine Applications

    Directory of Open Access Journals (Sweden)

    Vincent Fremont

    2016-01-01

    Full Text Available This paper presents a vision-based people detection system for improving safety in heavy machines. We propose a perception system composed of a monocular fisheye camera and a LiDAR. Fisheye cameras have the advantage of a wide field-of-view, but the strong distortions that they create must be handled at the detection stage. Since people detection in fisheye images has not been well studied, we focus on investigating and quantifying the impact that strong radial distortions have on the appearance of people, and we propose approaches for handling this specificity, adapted from state-of-the-art people detection approaches. These adaptive approaches nevertheless have the drawback of high computational cost and complexity. Consequently, we also present a framework for harnessing the LiDAR modality in order to enhance the detection algorithm for different camera positions. A sequential LiDAR-based fusion architecture is used, which addresses directly the problem of reducing false detections and computational cost in an exclusively vision-based system. A heavy machine dataset was built, and different experiments were carried out to evaluate the performance of the system. The results are promising, in terms of both processing speed and performance.

  7. Cell-based detection of microbial biomaterial contaminations.

    Science.gov (United States)

    Roch, Toralf; Ma, Nan; Kratz, Karl; Lendlein, Andreas

    2015-01-01

    A major challenge in biomaterial synthesis and functionalization is the prevention of microbial contaminations such as endotoxins (lipopolysaccharides (LPS)). In addition to LPS, which are exclusively expressed by Gram negative bacteria, also other microbial products derived from fungi or Gram positive bacteria can be found as contaminations in research laboratories. Typically, the Limulus amebocyte lysate (LAL)-test is used to determine the endotoxin levels of medical devices. However, this test fails to detect material-bound LPS and other microbial contaminations and, as demonstrated in this study, detects LPS from various bacterial species with different sensitivities.In this work, a cell-based assay using genetically engineered RAW macrophages, which detect not only soluble but also material-bound microbial contaminations is introduced.The sensitivity of this cell-line towards different LPS species and different heat-inactivated microbes was investigated. As proof of principle a soft hydrophobic poly(n-butyl acrylate) network (cPnBA), which may due to adhesive properties strongly bind microbes, was deliberately contaminated with heat-inactivated bacteria. While the LAL-test failed to detect the microbial contamination, the cell-based assay clearly detected material-bound microbial contaminations. Our data demonstrate that a cell-based detection system should routinely be used as supplement to the LAL-test to determine microbial contaminations of biomaterials.

  8. Deceiving entropy-based DoS detection

    Science.gov (United States)

    Özçelik, Ä.°lker; Brooks, Richard R.

    2014-06-01

    Denial of Service (DoS) attacks disable network services for legitimate users. A McAfee report shows that eight out of ten Critical Infrastructure Providers (CIPs) surveyed had a significant Distributed DoS (DDoS) attack in 2010.1 Researchers proposed many approaches for detecting these attacks in the past decade. Anomaly based DoS detection is the most common. In this approach, the detector uses statistical features; such as the entropy of incoming packet header fields like source IP addresses or protocol type. It calculates the observed statistical feature and triggers an alarm if an extreme deviation occurs. However, intrusion detection systems (IDS) using entropy based detection can be fooled by spoofing. An attacker can sniff the network to collect header field data of network packets coming from distributed nodes on the Internet and fuses them to calculate the entropy of normal background traffic. Then s/he can spoof attack packets to keep the entropy value in the expected range during the attack. In this study, we present a proof of concept entropy spoofing attack that deceives entropy based detection approaches. Our preliminary results show that spoofing attacks cause significant detection performance degradation.

  9. Distinct Clinicopathological Patterns of Mismatch Repair Status in Colorectal Cancer Stratified by KRAS Mutations.

    Directory of Open Access Journals (Sweden)

    Wenbin Li

    Full Text Available In sporadic colorectal cancer (CRC, the BRAFV600E mutation is associated with deficient mismatch repair (MMR status and inversely associated with to KRAS mutations. In contrast to deficient MMR (dMMR CRC, data on the presence of KRAS oncogenic mutations in proficient MMR (pMMR CRC and their relationship with tumor progression are scarce. We therefore examined the MMR status in combination with KRAS mutations in 913 Chinese patients and correlated the findings obtained with clinical and pathological features. The MMR status was determined based on detection of MLH1, MSH2, MSH6 and PMS2 expression. KRAS mutation and dMMR status were detected in 36.9% and 7.5% of cases, respectively. Four subtypes were determined by MMR and KRAS mutation status: KRAS (+/pMMR (34.0%, KRAS (+/dMMR (2.9%, KRAS (-/pMMR (58.5% and KRAS (-/dMMR (4.6%. A higher percentage of pMMR tumors with KRAS mutation were most likely to be female (49.0%, proximal located (45.5%, a mucinous histology (38.4%, and to have increased lymph node metastasis (60.3%, compared with pMMR tumors without BRAFV600E and KRAS mutations (36.0%, 29.3%, 29.4% and 50.7%, respectively; all P < 0.01. To the contrary, compared with those with KRAS(-/dMMR tumors, patients with KRAS(+/dMMR tumors demonstrated no statistically significant differences in gender, tumor location, pT depth of invasion, lymph node metastasis, pTNM stage, and histologic grade. This study revealed that specific epidemiologic and clinicopathologic characteristics are associated with MMR status stratified by KRAS mutation. Knowledge of MMR and KRAS mutation status may enhance molecular pathologic staging of CRC patients and metastatic progression in CRC can be estimated based on the combination of these biomarkers.

  10. Vision Based Obstacle Detection mechanism of a Fixed Wing UAV

    Directory of Open Access Journals (Sweden)

    S.N. Omkar

    2014-03-01

    Full Text Available In this paper we have developed a vision based navigation and obstacle detection mechanism for unmanned aerial vehicles (UAVs which can be used effectively in GPS denied regions as well as in regions where remote controlled UAV navigation is impossible thus making the UAV more versatile and fully autonomous. We used a fixed single onboard video camera on the UAV that extracts images of the environment of a UAV. These images are then processed and detect an obstacle in the path if any. This method is effective in detecting dark as well as light coloured obstacles in the vicinity of the UAV. We developed two algorithms. The first one is to detect the horizon and land in the images extracted from the camera and to detect an obstacle in its path. The second one is specifically to detect a light coloured obstacle in the environment thus making our method more precise. The time taken for processing of the images and generating a result is very small thus this algorithm is also fit to be used in real time applications. These Algorithms are more effective than previously developed in this field because this algorithm does the detection of any obstacle without knowing the size of it beforehand. This algorithm is also capable of detecting light coloured obstacles in the sky which otherwise might be missed by an UAV or even a human pilot sometimes. Thus it makes the navigation more precise.

  11. Mechanism of mismatch recognition revealed by human MutS[beta] bound to unpaired DNA loops

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Shikha; Gellert, Martin; Yang, Wei (NIH)

    2012-04-17

    DNA mismatch repair corrects replication errors, thus reducing mutation rates and microsatellite instability. Genetic defects in this pathway cause Lynch syndrome and various cancers in humans. Binding of a mispaired or unpaired base by bacterial MutS and eukaryotic MutS{alpha} is well characterized. We report here crystal structures of human MutS{beta} in complex with DNA containing insertion-deletion loops (IDL) of two, three, four or six unpaired nucleotides. In contrast to eukaryotic MutS{alpha} and bacterial MutS, which bind the base of a mismatched nucleotide, MutS{beta} binds three phosphates in an IDL. DNA is severely bent at the IDL; unpaired bases are flipped out into the major groove and partially exposed to solvent. A normal downstream base pair can become unpaired; a single unpaired base can thereby be converted to an IDL of two nucleotides and recognized by MutS{beta}. The C-terminal dimerization domains form an integral part of the MutS structure and coordinate asymmetrical ATP hydrolysis by Msh2 and Msh3 with mismatch binding to signal for repair.

  12. 基于运行模式切换的低不匹配误差高动态范围CMOS智能温度传感器∗%A Low Mismatch Error and High Dynamic Range CMOS Smart Temperature Sensor Based on Operational Modes Switching

    Institute of Scientific and Technical Information of China (English)

    单文焘; 张培勇; 冯忱晖

    2015-01-01

    A new circuit structure which can switch between two operational modes is proposed to reduce the mis-match errors of CMOS smart temperature sensors and ensure a high dynamic range of the output. The new structure can reduce more than 66%of the mismatch error in contrast to traditional circuit by theoretical analysis. The simula-tion between -55 ℃ and 125℃ based on 0.18μm process shows that a dynamic range of about 90% which is lar-ger than the output of Pertijs’ structure can be acquired using this new structure. This conclusion is verified by chip testing result between -10 ℃ and 100 ℃.%提出了一种新的电路结构,通过两种运行模式的切换,可以在降低CMOS智能温度传感器不匹配误差的同时,保证输出有尽可能高的动态范围。理论分析得出,相对于传统结构,新结构的不匹配误差能减小66%以上。0.18μm工艺环境下的仿真结果表明,在-55℃~125℃的温度范围内,输出能达到90%左右的动态范围,和Pertijs提出的改进结构相比,有较大幅度的提高。芯片实测结果在-10℃~100℃的温度范围内证实了这个结论。

  13. Analysis of Vehicle Detection with WSN-Based Ultrasonic Sensors

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2014-08-01

    Full Text Available Existing traffic information acquisition systems suffer from high cost and low scalability. To address these problems, the application of wireless sensor networks (WSNs has been studied, as WSN-based systems are highly scalable and have a low cost of installing and replacing the systems. Magnetic, acoustic and accelerometer sensors have been considered for WSN-based traffic surveillance, but the use of ultrasonic sensors has not been studied. The limitations of WSN-based systems make it necessary to employ power saving methods and vehicle detection algorithms with low computational complexity. In this paper, we model and analyze optimal power saving methodologies for an ultrasonic sensor and present a computationally-efficient vehicle detection algorithm using ultrasonic data. The proposed methodologies are implemented and evaluated with a tiny microprocessor on real roads. The evaluation results show that the low computational complexity of our algorithm does not compromise the accuracy of vehicle detection.

  14. Analysis of vehicle detection with WSN-based ultrasonic sensors.

    Science.gov (United States)

    Jo, Youngtae; Jung, Inbum

    2014-08-04

    Existing traffic information acquisition systems suffer from high cost and low scalability. To address these problems, the application of wireless sensor networks (WSNs) has been studied, as WSN-based systems are highly scalable and have a low cost of installing and replacing the systems. Magnetic, acoustic and accelerometer sensors have been considered for WSN-based traffic surveillance, but the use of ultrasonic sensors has not been studied. The limitations of WSN-based systems make it necessary to employ power saving methods and vehicle detection algorithms with low computational complexity. In this paper, we model and analyze optimal power saving methodologies for an ultrasonic sensor and present a computationally-efficient vehicle detection algorithm using ultrasonic data. The proposed methodologies are implemented and evaluated with a tiny microprocessor on real roads. The evaluation results show that the low computational complexity of our algorithm does not compromise the accuracy of vehicle detection.

  15. The detection of bulk explosives using nuclear-based techniques

    Energy Technology Data Exchange (ETDEWEB)

    Morgado, R.E.; Gozani, T.; Seher, C.C.

    1988-01-01

    In 1986 we presented a rationale for the detection of bulk explosives based on nuclear techniques that addressed the requirements of civil aviation security in the airport environment. Since then, efforts have intensified to implement a system based on thermal neutron activation (TNA), with new work developing in fast neutron and energetic photon reactions. In this paper we will describe these techniques and present new results from laboratory and airport testing. Based on preliminary results, we contended in our earlier paper that nuclear-based techniques did provide sufficiently penetrating probes and distinguishable detectable reaction products to achieve the FAA operational goals; new data have supported this contention. The status of nuclear-based techniques for the detection of bulk explosives presently under investigation by the US Federal Aviation Administration (FAA) is reviewed. These include thermal neutron activation (TNA), fast neutron activation (FNA), the associated particle technique, nuclear resonance absorption, and photoneutron activation. The results of comprehensive airport testing of the TNA system performed during 1987-88 are summarized. From a technical point of view, nuclear-based techniques now represent the most comprehensive and feasible approach for meeting the operational criteria of detection, false alarms, and throughput. 9 refs., 5 figs., 2 tabs.

  16. Wafer weak point detection based on aerial images or WLCD

    Science.gov (United States)

    Ning, Guoxiang; Philipp, Peter; Litt, Lloyd C.; Ackmann, Paul; Crell, Christian; Chen, Norman

    2015-10-01

    Aerial image measurement is a key technique for model based optical proximity correction (OPC) verification. Actual aerial images obtained by AIMS (aerial image measurement system) or WLCD (wafer level critical dimension) can detect printed wafer weak point structures in advance of wafer exposure and defect inspection. Normally, the potential wafer weak points are determined based on optical rule check (ORC) simulation in advance. However, the correlation to real wafer weak points is often not perfect due to the contribution of mask three dimension (M3D) effects, actual mask errors, and scanner lens effects. If the design weak points can accurately be detected in advance, it will reduce the wafer fab cost and improve cycle time. WLCD or AIMS tools are able to measure the aerial images CD and bossung curve through focus window. However, it is difficult to detect the wafer weak point in advance without defining selection criteria. In this study, wafer weak points sensitive to mask mean-to-nominal values are characterized for a process with very high MEEF (normally more than 4). Aerial image CD uses fixed threshold to detect the wafer weak points. By using WLCD through threshold and focus window, the efficiency of wafer weak point detection is also demonstrated. A novel method using contrast range evaluation is shown in the paper. Use of the slope of aerial images for more accurate detection of the wafer weak points using WLCD is also discussed. The contrast range can also be used to detect the wafer weak points in advance. Further, since the mean to nominal of the reticle contributes to the effective contrast range in a high MEEF area this work shows that control of the mask error is critical for high MEEF layers such as poly, active and metal layers. Wafer process based weak points that cannot be detected by wafer lithography CD or WLCD will be discussed.

  17. Detecting Chemically Modified DNA Bases Using Surface Enhanced Raman Spectroscopy.

    Science.gov (United States)

    Barhoumi, Aoune; Halas, Naomi J

    2011-12-15

    Post-translational modifications of DNA- changes in the chemical structure of individual bases that occur without changes in the DNA sequence- are known to alter gene expression. They are believed to result in frequently deleterious phenotypic changes, such as cancer. Methylation of adenine, methylation and hydroxymethylation of cytosine, and guanine oxidation are the primary DNA base modifications identified to date. Here we show it is possible to use surface enhanced Raman spectroscopy (SERS) to detect these primary DNA base modifications. SERS detection of modified DNA bases is label-free and requires minimal additional sample preparation, reducing the possibility of additional chemical modifications induced prior to measurement. This approach shows the feasibility of DNA base modification assessment as a potentially routine analysis that may be further developed for clinical diagnostics.

  18. Obstacle detection of mobile robot based on data fusion

    Institute of Scientific and Technical Information of China (English)

    YUAN Xin; SU Li; SUN Li-ning

    2009-01-01

    To study the problem of obstacle detection based on multi-sensors data fusion, the multi-target track-ing theory and techniques are introduced into obstacle detection systems, and the exact position of obstacle can be determined. Data fusion problems are discussed directly based on achievable data from some sensors without considering the specific structure of each individual sensor. With respect to normal linear systems and nonlinear systems, the corresponding algorithms are proposed. The validity of the method is confirmed by simulation re-suits.

  19. Nanobiosensors Based on Localized Surface Plasmon Resonance for Biomarker Detection

    Directory of Open Access Journals (Sweden)

    Yoochan Hong

    2012-01-01

    Full Text Available Localized surface plasmon resonance (LSPR is induced by incident light when it interacts with noble metal nanoparticles that have smaller sizes than the wavelength of the incident light. Recently, LSPR-based nanobiosensors were developed as tools for highly sensitive, label-free, and flexible sensing techniques for the detection of biomolecular interactions. In this paper, we describe the basic principles of LSPR-based nanobiosensing techniques and LSPR sensor system for biomolecule sensing. We also discuss the challenges using LSPR nanobiosensors for detection of biomolecules as a biomarker.

  20. 3D face recognition algorithm based on detecting reliable components

    Institute of Scientific and Technical Information of China (English)

    Huang Wenjun; Zhou Xuebing; Niu Xiamu

    2007-01-01

    Fisherfaces algorithm is a popular method for face recognition. However, there exist some unstable components that degrade recognition performance. In this paper, we propose a method based on detecting reliable components to overcome the problem and introduce it to 3D face recognition. The reliable components are detected within the binary feature vector, which is generated from the Fisherfaces feature vector based on statistical properties, and is used for 3D face recognition as the final feature vector. Experimental results show that the reliable components feature vector is much more effective than the Fisherfaces feature vector for face recognition.

  1. An Improved Retransmission-based Network Steganography: Design and Detection

    Directory of Open Access Journals (Sweden)

    Jiangtao Zhai

    2013-01-01

    Full Text Available Network steganography is a covert communication technique that uses redundancies in network protocols to transfer secret information. The retransmission-based steganography (RSTEG embeds covert messages into the payload field of the intentionally retransmission packets. So its capacity is higher than most of the existing methods. Because TCP checksum field of the original packet is different from that of the retransmitted packet, RSTEG is not stealthy in fact. An improved method named IRSTEG is presented to resolve the flaw by introducing the payload compensation. Further, a method is proposed to detect IRSTEG based the payload segment comparison. Experiments show that the method can detect IRSTEG well.

  2. DNA methylation detection based on difference of base content

    Science.gov (United States)

    Sato, Shinobu; Ohtsuka, Keiichi; Honda, Satoshi; Sato, Yusuke; Takenaka, Shigeori

    2016-04-01

    Methylation frequently occurs in cytosines of CpG sites to regulate gene expression. The identification of aberrant methylation of certain genes is important for cancer marker analysis. The aim of this study was to determine the methylation frequency in DNA samples of unknown length and/or concentration. Unmethylated cytosine is known to be converted to thymine following bisulfite treatment and subsequent PCR. For this reason, the AT content in DNA increases with an increasing number of methylation sites. In this study, the fluorescein-carrying bis-acridinyl peptide (FKA) molecule was used for the detection of methylation frequency. FKA contains fluorescein and two acridine moieties, which together allow for the determination of the AT content of double-stranded DNA fragments. Methylated and unmethylated human genomes were subjected to bisulfide treatment and subsequent PCR using primers specific for the CFTR, CDH4, DBC1, and NPY genes. The AT content in the resulting PCR products was estimated by FKA, and AT content estimations were found to be in good agreement with those determined by DNA sequencing. This newly developed method may be useful for determining methylation frequencies of many PCR products by measuring the fluorescence in samples excited at two different wavelengths.

  3. Image edge-enhancement in optical microscopy with a phase mismatched spiral phase plate

    Institute of Scientific and Technical Information of China (English)

    Shibiao Wei; Jing Bu; Siwei Zhu; Xiaocong Yuan

    2011-01-01

    @@ We present a spiral phase filtering system with a large tolerance for edge enhancement of both phase and amplitude objects in optical microscopy.The method is based on a Fourier 4-f spatial filtering system.A phase mismatched spiral phase plate (SPP) fabricated by electron beam lithography is employed as the radial Hilbert transform for image edge enhancement.Compared with holography, SPP is simple,economical, reliable, and easy to integrate.%We present a spiral phase filtering system with a large tolerance for edge enhancement of both phase and amplitude objects in optical microscopy. The method is based on a Fourier 4-f spatial filtering system.A phase mismatched spiral phase plate (SPP) fabricated by electron beam lithography is employed as the radial Hilbert transform for image edge enhancement. Compared with holography, SPP is simple,economical, reliable, and easy to integrate.

  4. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  5. Real-time fault detection method based on belief rule base for aircraft navigation system

    Institute of Scientific and Technical Information of China (English)

    Zhao Xin; Wang Shicheng; Zhang Jinsheng; Fan Zhiliang; Min Haibo

    2013-01-01

    Real-time and accurate fault detection is essential to enhance the aircraft navigation system's reliability and safety.The existent detection methods based on analytical model draws back at simultaneously detecting gradual and sudden faults.On account of this reason,we propose an online detection solution based on non-analytical model.In this article,the navigation system fault detection model is established based on belief rule base (BRB),where the system measuring residual and its changing rate are used as the inputs of BRB model and the fault detection function as the output.To overcome the drawbacks of current parameter optimization algorithms for BRB and achieve online update,a parameter recursive estimation algorithm is presented for online BRB detection model based on expectation maximization (EM) algorithm.Furthermore,the proposed method is verified by navigation experiment.Experimental results show that the proposed method is able to effectively realize online parameter evaluation in navigation system fault detection model.The output of the detection model can track the fault state very well,and the faults can be diagnosed in real time and accurately.In addition,the detection ability,especially in the probability of false detection,is superior to offline optimization method,and thus the system reliability has great improvement.

  6. Analysis of Android Device-Based Solutions for Fall Detection.

    Science.gov (United States)

    Casilari, Eduardo; Luque, Rafael; Morón, María-José

    2015-07-23

    Falls are a major cause of health and psychological problems as well as hospitalization costs among older adults. Thus, the investigation on automatic Fall Detection Systems (FDSs) has received special attention from the research community during the last decade. In this area, the widespread popularity, decreasing price, computing capabilities, built-in sensors and multiplicity of wireless interfaces of Android-based devices (especially smartphones) have fostered the adoption of this technology to deploy wearable and inexpensive architectures for fall detection. This paper presents a critical and thorough analysis of those existing fall detection systems that are based on Android devices. The review systematically classifies and compares the proposals of the literature taking into account different criteria such as the system architecture, the employed sensors, the detection algorithm or the response in case of a fall alarms. The study emphasizes the analysis of the evaluation methods that are employed to assess the effectiveness of the detection process. The review reveals the complete lack of a reference framework to validate and compare the proposals. In addition, the study also shows that most research works do not evaluate the actual applicability of the Android devices (with limited battery and computing resources) to fall detection solutions.

  7. Analysis of Android Device-Based Solutions for Fall Detection

    Directory of Open Access Journals (Sweden)

    Eduardo Casilari

    2015-07-01

    Full Text Available Falls are a major cause of health and psychological problems as well as hospitalization costs among older adults. Thus, the investigation on automatic Fall Detection Systems (FDSs has received special attention from the research community during the last decade. In this area, the widespread popularity, decreasing price, computing capabilities, built-in sensors and multiplicity of wireless interfaces of Android-based devices (especially smartphones have fostered the adoption of this technology to deploy wearable and inexpensive architectures for fall detection. This paper presents a critical and thorough analysis of those existing fall detection systems that are based on Android devices. The review systematically classifies and compares the proposals of the literature taking into account different criteria such as the system architecture, the employed sensors, the detection algorithm or the response in case of a fall alarms. The study emphasizes the analysis of the evaluation methods that are employed to assess the effectiveness of the detection process. The review reveals the complete lack of a reference framework to validate and compare the proposals. In addition, the study also shows that most research works do not evaluate the actual applicability of the Android devices (with limited battery and computing resources to fall detection solutions.

  8. Noise Based Detection and Segmentation of Nebulous Objects

    CERN Document Server

    Akhlaghi, Mohammad

    2015-01-01

    A noise based non parametric technique to detect nebulous objects, for example irregular or clumpy galaxies, and their structure in noise is introduced. Noise based and non parametric imply that it imposes negligible constraints on the properties of the targets and that it employs no regression analysis or fittings. The sub-sky detection threshold is defined, and initial detections are found, independent of the sky value. False detections are then estimated and removed using the ambient noise as a reference. This results in a purity level of 0.86 for the final detections as compared to 0.27 for SExtractor when a completeness of 1 is desired for a sample extremely faint and diffuse identical mock galaxy profiles. The dispersion in their measured magnitudes is less by one magnitude, allowing much more accurate photometry. Defining the accuracy of detection as the difference of the measured sky with the known background of mock images, an order of magnitude less biased sky measurement is achieved. A non parametr...

  9. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  10. aTrunk—An ALS-Based Trunk Detection Algorithm

    Directory of Open Access Journals (Sweden)

    Sebastian Lamprecht

    2015-08-01

    Full Text Available This paper presents a rapid multi-return ALS-based (Airborne Laser Scanning tree trunk detection approach. The multi-core Divide & Conquer algorithm uses a CBH (Crown Base Height estimation and 3D-clustering approach to isolate points associated with single trunks. For each trunk, a principal-component-based linear model is fitted, while a deterministic modification of LO-RANSAC is used to identify an optimal model. The algorithm returns a vector-based model for each identified trunk while parameters like the ground position, zenith orientation, azimuth orientation and length of the trunk are provided. The algorithm performed well for a study area of 109 trees (about 2/3 Norway Spruce and 1/3 European Beech, with a point density of 7.6 points per m2, while a detection rate of about 75% and an overall accuracy of 84% were reached. Compared to crown-based tree detection methods, the aTrunk approach has the advantages of a high reliability (5% commission error and its high tree positioning accuracy (0.59m average difference and 0.78m RMSE. The usage of overlapping segments with parametrizable size allows a seamless detection of the tree trunks.

  11. An EEG-Based Fatigue Detection and Mitigation System.

    Science.gov (United States)

    Huang, Kuan-Chih; Huang, Teng-Yi; Chuang, Chun-Hsiang; King, Jung-Tai; Wang, Yu-Kai; Lin, Chin-Teng; Jung, Tzyy-Ping

    2016-06-01

    Research has indicated that fatigue is a critical factor in cognitive lapses because it negatively affects an individual's internal state, which is then manifested physiologically. This study explores neurophysiological changes, measured by electroencephalogram (EEG), due to fatigue. This study further demonstrates the feasibility of an online closed-loop EEG-based fatigue detection and mitigation system that detects physiological change and can thereby prevent fatigue-related cognitive lapses. More importantly, this work compares the efficacy of fatigue detection and mitigation between the EEG-based and a nonEEG-based random method. Twelve healthy subjects participated in a sustained-attention driving experiment. Each participant's EEG signal was monitored continuously and a warning was delivered in real-time to participants once the EEG signature of fatigue was detected. Study results indicate suppression of the alpha- and theta-power of an occipital component and improved behavioral performance following a warning signal; these findings are in line with those in previous studies. However, study results also showed reduced warning efficacy (i.e. increased response times (RTs) to lane deviations) accompanied by increased alpha-power due to the fluctuation of warnings over time. Furthermore, a comparison of EEG-based and nonEEG-based random approaches clearly demonstrated the necessity of adaptive fatigue-mitigation systems, based on a subject's cognitive level, to deliver warnings. Analytical results clearly demonstrate and validate the efficacy of this online closed-loop EEG-based fatigue detection and mitigation mechanism to identify cognitive lapses that may lead to catastrophic incidents in countless operational environments.

  12. Accounting for detectability in fish distribution models: an approach based on time-to-first-detection

    Directory of Open Access Journals (Sweden)

    Mário Ferreira

    2015-12-01

    Full Text Available Imperfect detection (i.e., failure to detect a species when the species is present is increasingly recognized as an important source of uncertainty and bias in species distribution modeling. Although methods have been developed to solve this problem by explicitly incorporating variation in detectability in the modeling procedure, their use in freshwater systems remains limited. This is probably because most methods imply repeated sampling (≥ 2 of each location within a short time frame, which may be impractical or too expensive in most studies. Here we explore a novel approach to control for detectability based on the time-to-first-detection, which requires only a single sampling occasion and so may find more general applicability in freshwaters. The approach uses a Bayesian framework to combine conventional occupancy modeling with techniques borrowed from parametric survival analysis, jointly modeling factors affecting the probability of occupancy and the time required to detect a species. To illustrate the method, we modeled large scale factors (elevation, stream order and precipitation affecting the distribution of six fish species in a catchment located in north-eastern Portugal, while accounting for factors potentially affecting detectability at sampling points (stream depth and width. Species detectability was most influenced by depth and to lesser extent by stream width and tended to increase over time for most species. Occupancy was consistently affected by stream order, elevation and annual precipitation. These species presented a widespread distribution with higher uncertainty in tributaries and upper stream reaches. This approach can be used to estimate sampling efficiency and provide a practical framework to incorporate variations in the detection rate in fish distribution models.

  13. Ensemble regression model-based anomaly detection for cyber-physical intrusion detection in smart grids

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Gehrke, Oliver

    2016-01-01

    on an ensemble of non-linear artificial neural network DER models which detect and evaluate anomalies in DER operation. The proposed method is validated against measurement data which yields a precision of 0.947 and an accuracy of 0.976. This improves the precision and accuracy of a classic model-based anomaly...

  14. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  15. R-peaks detection based on stationary wavelet transform.

    Science.gov (United States)

    Merah, M; Abdelmalik, T A; Larbi, B H

    2015-10-01

    Automatic detection of the QRS complexes/R-peaks in an electrocardiogram (ECG) signal is the most important step preceding any kind of ECG processing and analysis. The performance of these systems heavily relies on the accuracy of the QRS detector. The objective of present work is to drive a new robust method based on stationary wavelet transform (SWT) for R-peaks detection. The decimation of the coefficients at each level of the transformation algorithm is omitted, more samples in the coefficient sequences are available and hence a better outlier detection can be performed. Using the information of local maxima, minima and zero crossings of the fourth SWT coefficient detail, the proposed algorithm identifies the significant points for detection and delineation of the QRS complexes, as well as detection and identification of the QRS individual waves peaks of the pre-processed ECG signal. Various experimental results show that the proposed algorithm exhibits reliable QRS detection as well as accurate ECG delineation, achieving excellent performance on different databases, on the MIT-BIH database (Se=99.84%, P=99.88%), on the QT Database (Se=99.94%, P=99.89%) and on MIT-BIH Noise Stress Test Database, (Se=95.30%, P=93.98%). Reliability and accuracy are close to the highest among the ones obtained in other studies. Experiments results being satisfactory, the SWT may represent a novel QRS detection tool, for a robust ECG signal analysis.

  16. An FPGA-based rapid wheezing detection system.

    Science.gov (United States)

    Lin, Bor-Shing; Yen, Tian-Shiue

    2014-01-29

    Wheezing is often treated as a crucial indicator in the diagnosis of obstructive pulmonary diseases. A rapid wheezing detection system may help physicians to monitor patients over the long-term. In this study, a portable wheezing detection system based on a field-programmable gate array (FPGA) is proposed. This system accelerates wheezing detection, and can be used as either a single-process system, or as an integrated part of another biomedical signal detection system. The system segments sound signals into 2-second units. A short-time Fourier transform was used to determine the relationship between the time and frequency components of wheezing sound data. A spectrogram was processed using 2D bilateral filtering, edge detection, multithreshold image segmentation, morphological image processing, and image labeling, to extract wheezing features according to computerized respiratory sound analysis (CORSA) standards. These features were then used to train the support vector machine (SVM) and build the classification models. The trained model was used to analyze sound data to detect wheezing. The system runs on a Xilinx Virtex-6 FPGA ML605 platform. The experimental results revealed that the system offered excellent wheezing recognition performance (0.912). The detection process can be used with a clock frequency of 51.97 MHz, and is able to perform rapid wheezing classification.

  17. An ellipse detection algorithm based on edge classification

    Science.gov (United States)

    Yu, Liu; Chen, Feng; Huang, Jianming; Wei, Xiangquan

    2015-12-01

    In order to enhance the speed and accuracy of ellipse detection, an ellipse detection algorithm based on edge classification is proposed. Too many edge points are removed by making edge into point in serialized form and the distance constraint between the edge points. It achieves effective classification by the criteria of the angle between the edge points. And it makes the probability of randomly selecting the edge points falling on the same ellipse greatly increased. Ellipse fitting accuracy is significantly improved by the optimization of the RED algorithm. It uses Euclidean distance to measure the distance from the edge point to the elliptical boundary. Experimental results show that: it can detect ellipse well in case of edge with interference or edges blocking each other. It has higher detecting precision and less time consuming than the RED algorithm.

  18. Microcontroller-based real-time QRS detection.

    Science.gov (United States)

    Sun, Y; Suppappola, S; Wrublewski, T A

    1992-01-01

    The authors describe the design of a system for real-time detection of QRS complexes in the electrocardiogram based on a single-chip microcontroller (Motorola 68HC811). A systematic analysis of the instrumentation requirements for QRS detection and of the various design techniques is also given. Detection algorithms using different nonlinear transforms for the enhancement of QRS complexes are evaluated by using the ECG database of the American Heart Association. The results show that the nonlinear transform involving multiplication of three adjacent, sign-consistent differences in the time domain gives a good performance and a quick response. When implemented with an appropriate sampling rate, this algorithm is also capable of rejecting pacemaker spikes. The eight-bit single-chip microcontroller provides sufficient throughput and shows a satisfactory performance. Implementation of multiple detection algorithms in the same system improves flexibility and reliability. The low chip count in the design also favors maintainability and cost-effectiveness.

  19. A Harmony Search Based Algorithm for Detecting Distributed Predicates

    Directory of Open Access Journals (Sweden)

    Eslam Al Maghayreh

    2012-10-01

    Full Text Available Detection of distributed predicates (also referred to as runtime verification can be used to verify that a particular run of a given distributed program satisfies certain properties (represented as predicates. Consequently, distributed predicates detection techniques can be used to effectively improve the dependability of a given distributed application. Due to concurrency, the detection of distributed predicates can incur significant overhead. Most of the effective techniques developed to solve this problem work efficiently for certain classes of predicates, like conjunctive predicates. In this paper, we have presented a technique based on harmony search to efficiently detect the satisfaction of a predicate under the possibly modality. We have implemented the proposed technique and we have conducted several experiments to demonstrate its effectiveness.

  20. Edge Detection Operators: Peak Signal to Noise Ratio Based Comparison

    Directory of Open Access Journals (Sweden)

    D. Poobathy

    2014-09-01

    Full Text Available Edge detection is the vital task in digital image processing. It makes the image segmentation and pattern recognition more comfort. It also helps for object detection. There are many edge detectors available for pre-processing in computer vision. But, Canny, Sobel, Laplacian of Gaussian (LoG, Robert’s and Prewitt are most applied algorithms. This paper compares each of these operators by the manner of checking Peak signal to Noise Ratio (PSNR and Mean Squared Error (MSE of resultant image. It evaluates the performance of each algorithm with Matlab and Java. The set of four universally standardized test images are used for the experimentation. The PSNR and MSE results are numeric values, based on that, performance of algorithms identified. The time required for each algorithm to detect edges is also documented. After the Experimentation, Canny operator found as the best among others in edge detection accuracy.

  1. [Fast Implementation Method of Protein Spots Detection Based on CUDA].

    Science.gov (United States)

    Xiong, Bangshu; Ye, Yijia; Ou, Qiaofeng; Zhang, Haodong

    2016-02-01

    In order to improve the efficiency of protein spots detection, a fast detection method based on CUDA was proposed. Firstly, the parallel algorithms of the three most time-consuming parts in the protein spots detection algorithm: image preprocessing, coarse protein point detection and overlapping point segmentation were studied. Then, according to single instruction multiple threads executive model of CUDA to adopted data space strategy of separating two-dimensional (2D) images into blocks, various optimizing measures such as shared memory and 2D texture memory are adopted in this study. The results show that the operative efficiency of this method is obviously improved compared to CPU calculation. As the image size increased, this method makes more improvement in efficiency, such as for the image with the size of 2,048 x 2,048, the method of CPU needs 52,641 ms, but the GPU needs only 4,384 ms.

  2. FPGA-based amplitude and phase detection in DLLRF

    Institute of Scientific and Technical Information of China (English)

    LIU Rong; WANG Zheng; PAN Wei-Min; WANG Guang-Wei; LIN Hai-Ying; SHA Peng; ZENG Ri-Hua

    2009-01-01

    The new generation particle accelerator requires a highly stable radio frequency (RF) system. The stability of the RF system is realized by the Low Level RF (LLRF) subsystem which controls the amplitude and phase of the RF signal. The detection of the RF signal's amplitude and phase is fundamental to LLRF controls. High-speed ADC (Analog to Digital Converter), DAC (Digital to Analog Converter) and FPGA (Field Programmable Gate Array) play very important roles in digital LLRF control systems. This paper describes the implementation of real-time amplitude and phase detection based of the FPGA with an analysis of the main factors that affect the detection accuracy such as jitter, algorithm's defects and non-linearity of devices, which is helpful for future work on high precision detection and control.

  3. Colour based fire detection method with temporal intensity variation filtration

    Science.gov (United States)

    Trambitckii, K.; Anding, K.; Musalimov, V.; Linß, G.

    2015-02-01

    Development of video, computing technologies and computer vision gives a possibility of automatic fire detection on video information. Under that project different algorithms was implemented to find more efficient way of fire detection. In that article colour based fire detection algorithm is described. But it is not enough to use only colour information to detect fire properly. The main reason of this is that in the shooting conditions may be a lot of things having colour similar to fire. A temporary intensity variation of pixels is used to separate them from the fire. These variations are averaged over the series of several frames. This algorithm shows robust work and was realised as a computer program by using of the OpenCV library.

  4. Scale Invariant Feature Transform Based Fingerprint Corepoint Detection

    Directory of Open Access Journals (Sweden)

    Madasu Hanmandlu

    2013-07-01

    Full Text Available The detection of singular points (core and delta accurately and reliably is very important for classification and matching of fingerprints. This paper presents a new approach for core point detection based on scale invariant feature transform (SIFT. Firstly, SIFT points are extracted ,then reliability and ridge frequency criteria are applied to reduce the candidate points required to make a decision on the core point. Finally a suitable mask is applied to detect an accurate core point. Experiments on FVC2002 and FVC2004 databases show that our approach locates a unique reference point with high accuracy. Results of our approach are compared with those of the existing methods in terms of accuracy of core point detection.Defence Science Journal, 2013, 63(4, pp.402-407, DOI:http://dx.doi.org/10.14429/dsj.63.2708

  5. Sparsity-based algorithm for detecting faults in rotating machines

    Science.gov (United States)

    He, Wangpeng; Ding, Yin; Zi, Yanyang; Selesnick, Ivan W.

    2016-05-01

    This paper addresses the detection of periodic transients in vibration signals so as to detect faults in rotating machines. For this purpose, we present a method to estimate periodic-group-sparse signals in noise. The method is based on the formulation of a convex optimization problem. A fast iterative algorithm is given for its solution. A simulated signal is formulated to verify the performance of the proposed approach for periodic feature extraction. The detection performance of comparative methods is compared with that of the proposed approach via RMSE values and receiver operating characteristic (ROC) curves. Finally, the proposed approach is applied to single fault diagnosis of a locomotive bearing and compound faults diagnosis of motor bearings. The processed results show that the proposed approach can effectively detect and extract the useful features of bearing outer race and inner race defect.

  6. Contributed Review: Quantum cascade laser based photoacoustic detection of explosives

    Energy Technology Data Exchange (ETDEWEB)

    Li, J. S., E-mail: jingsong-li@ahu.edu.cn; Yu, B. [Key Laboratory of Opto-Electronic Information Acquisition and Manipulation of Ministry of Education, Anhui University, Hefei (China); Fischer, H. [Department of Atmospheric Chemistry, Max Planck Institute for Chemistry, Mainz (Germany); Chen, W. [Laboratoire de Physicochimie de l’Atmosphére, Université du Littoral Côte d’Opale, Dunkerque (France); Yalin, A. P. [Department of Mechanical Engineering, Colorado State University, Fort Collins, Colorado 80523-1374 (United States)

    2015-03-15

    Detecting trace explosives and explosive-related compounds has recently become a topic of utmost importance for increasing public security around the world. A wide variety of detection methods and an even wider range of physical chemistry issues are involved in this very challenging area. Optical sensing methods, in particular mid-infrared spectrometry techniques, have a great potential to become a more desirable tools for the detection of explosives. The small size, simplicity, high output power, long-term reliability make external cavity quantum cascade lasers (EC-QCLs) the promising spectroscopic sources for developing analytical instrumentation. This work reviews the current technical progress in EC-QCL-based photoacoustic spectroscopy for explosives detection. The potential for both close-contact and standoff configurations using this technique is completely presented over the course of approximately the last one decade.

  7. Kernel-based fisher discriminant analysis for hyperspectral target detection

    Institute of Scientific and Technical Information of China (English)

    GU Yan-feng; ZHANG Ye; YOU Di

    2007-01-01

    A new method based on kernel Fisher discriminant analysis (KFDA) is proposed for target detection of hyperspectral images. The KFDA combines kernel mapping derived from support vector machine and the classical linear Fisher discriminant analysis (LFDA), and it possesses good ability to process nonlinear data such as hyperspectral images. According to the Fisher rule that the ratio of the between-class and within-class scatters is maximized, the KFDA is used to obtain a set of optimal discriminant basis vectors in high dimensional feature space. All pixels in the hyperspectral images are projected onto the discriminant basis vectors and the target detection is performed according to the projection result. The numerical experiments are performed on hyperspectral data with 126 bands collected by Airborne Visible/Infrared Imaging Spectrometer (AVIRIS). The experimental results show the effectiveness of the proposed detection method and prove that this method has good ability to overcome small sample size and spectral variability in the hyperspectral target detection.

  8. Farsi License Plate Detection and Recognition Based on Characters Features

    Directory of Open Access Journals (Sweden)

    Sedigheh Ghofrani

    2011-06-01

    Full Text Available In this paper a license plate detection and recognition system for Iranian private cars is implemented. The proposed license plate localization algorithm is based on region elements analysis which works properly independent of distance (how far a vehicle is, rotation (angle between camera and vehicle, and contrast (being dirty, reflected, or deformed. In addition, more than one car may exist in the image. The proposed method extracts edges and then determines the candidate regions by applying window movement. The region elements analysis includes binarization, character analysis, character continuity analysis and character parallelism analysis. After detecting license plates, we estimate the rotation angle and try to compensate it. In order to identify a detected plate, every character should be recognized. For this purpose, we present 25 features and use them as the input to an artificial neural network classifier. The experimental results show that our proposed method achieves appropriate performance for both detection and recognition of the Iranian license plates.

  9. A Method of Image Symmetry Detection Based on Phase Information

    Institute of Scientific and Technical Information of China (English)

    WU Jun; YANG Zhaoxuan; FENG Dengchao

    2005-01-01

    Traditional methods for detecting symmetry in image suffer greatly from the contrast of image and noise, and they all require some preprocessing. This paper presents a new method of image symmetry detection. This method detects symmetry with phase information utilizing logGabor wavelets, because phase information is stable and significant, while symmetric points produce patterns easy to be recognised and confirmable in local phase. Phase method does not require any preprocessing, and its result is accurate or invariant to contrast, rotation and illumination conditions. This method can detect mirror symmetry, rotating symmetry and curve symmetry at one time. Results of experiment show that, compared with pivotal element algorithm based on intensity information, phase method is more accurate and robust.

  10. An Algorithm for Quantitatively Calculating I/Q Gain and Phase Mismatch

    Directory of Open Access Journals (Sweden)

    Jin Liu

    2012-08-01

    Full Text Available The in-phase and quadrature modulator (IQ modulator is a key component in modern wireless transmitter. It provides a convenient method for modulating data bits or symbols onto an RF carrier. It has become the architecture of choice for implementing transmitter signal chains for end applications such as cellular, WiMAX, and wireless point-to-point. However, there are several non-ideal aspects of analog IQ modulator, include IQ gain imbalance, imperfect quadrature, and LO leakage. These imperfections will result in image spectral and degrade MER of the modulator, which in turn degrades bit error rate (BER. Gain matching and phase compensation both affect the total amount of image rejection. Factory calibration can detect the IQ gain and phase mismatch in different frequency and store the correction coefficients in nonvolatile memory. The key issue is how to get the exact mismatch. In this paper, a mathematical model of IQ modulator was established and an analytic solution is obtained about how to get the exact mismatch parameters.

  11. Detection of influenza A virus based on fluorescence resonance energy transfer from quantum dots to carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Tian Junping [Key Laboratory of Industrial Ecology and Environmental Engineering (Ministry of Education, China), School of Environmental Science and Technology, Dalian University of Technology, Dalian 116024 (China); Zhao Huimin, E-mail: zhaohuim@dlut.edu.cn [Key Laboratory of Industrial Ecology and Environmental Engineering (Ministry of Education, China), School of Environmental Science and Technology, Dalian University of Technology, Dalian 116024 (China); Liu Meng; Chen Yaqiong; Quan Xie [Key Laboratory of Industrial Ecology and Environmental Engineering (Ministry of Education, China), School of Environmental Science and Technology, Dalian University of Technology, Dalian 116024 (China)

    2012-04-20

    Highlights: Black-Right-Pointing-Pointer The quantum dots-ssDNA probe was designed for the determination of virus DNA. Black-Right-Pointing-Pointer The fluorescence of quantum dots was effectively quenched by carbon nanotubes. Black-Right-Pointing-Pointer The addition of target H5N1 DNA restored the quenched fluorescence of quantum dots. Black-Right-Pointing-Pointer The proposed method exhibited high sensitivity and good selectivity for H5N1 DNA. - Abstract: In this paper, a simple and sensitive approach for H5N1 DNA detection was described based on the fluorescence resonance energy transfer (FRET) from quantum dots (QDs) to carbon nanotubes (CNTs) in a QDs-ssDNA/oxCNTs system, in which the QDs (CdTe) modified with ssDNA were used as donors. In the initial stage, with the strong interaction between ssDNA and oxCNTs, QDs fluorescence was effectively quenched. Upon the recognition of the target, the effective competitive bindings of it to QDs-ssDNA occurred, which decreased the interactions between the QDs-ssDNA and oxCNTs, leading to the recovery of the QDs fluorescence. The recovered fluorescence of QDs was linearly proportional to the concentration of the target in the range of 0.01-20 {mu}M with a detection limit of 9.39 nM. Moreover, even a single-base mismatched target with the same concentration of target DNA can only recover a limited low fluorescence of QDs, illustrating the good anti-interference performance of this QDs-ssDNA/oxCNTs system. This FRET platform in the QDs-ssDNA/oxCNTs system was facilitated to the simple, sensitive and quantitative detection of virus nucleic acids and could have a wide range of applications in molecular diagnosis.

  12. Acetylcholinesterase biosensor for carbaryl detection based on interdigitated array microelectrodes.

    Science.gov (United States)

    Gong, Zhili; Guo, Yemin; Sun, Xia; Cao, Yaoyao; Wang, Xiangyou

    2014-10-01

    In this study, an acetylcholinesterase (AChE) biosensor with superior accuracy and sensitivity was successfully developed based on interdigitated array microelectrodes (IAMs). IAMs have a series of parallel microband electrodes with alternating microbands connected together. Chitosan was used as the enzyme immobilization material, and AChE was used as the model enzyme for carbaryl detection to fabricate AChE biosensor. Electrochemical impedance spectroscopy was used in conjunction with the fabricated biosensor to detect pesticide residues. Based on the inhibition of pesticides on the AChE activity, using carbaryl as model compounds, the biosensor exhibited a wide range, low detection limit, and high stability. Moreover, the biosensor can also be used as a new promising tool for pesticide residue analysis.

  13. Aircraft detection based on probability model of structural elements

    Science.gov (United States)

    Chen, Long; Jiang, Zhiguo

    2014-11-01

    Detecting aircrafts is important in the field of remote sensing. In past decades, researchers used various approaches to detect aircrafts based on classifiers for overall aircrafts. However, with the development of high-resolution images, the internal structures of aircrafts should also be taken into consideration now. To address this issue, a novel aircrafts detection method for satellite images based on probabilistic topic model is presented. We model aircrafts as the connected structural elements rather than features. The proposed method contains two major steps: 1) Use Cascade-Adaboost classier to identify the structural elements of aircraft firstly. 2) Connect these structural elements to aircrafts, where the relationships between elements are estimated by hierarchical topic model. The model places strict spatial constraints on structural elements which can identify differences between similar features. The experimental results demonstrate the effectiveness of the approach.

  14. Collision and containment detection between biomechanically based eye muscle volumes.

    Science.gov (United States)

    Santana Sosa, Graciela; Kaltofen, Thomas

    2011-01-01

    Collision and containment detection between three-dimensional objects is a common requirement in simulation systems. However, few solutions exist when exclusively working with deformable bodies. In our ophthalmologic diagnostic software system, the extraocular eye muscles are represented by surface models, which have been reconstructed from magnetic resonance images. Those models are projected onto the muscle paths calculated by the system's biomechanical model. Due to this projection collisions occur. For their detection, three approaches have been implemented, which we present in this paper: one based on image-space techniques using OpenGL, one based on the Bullet physics library and one using an optimized space-array data structure together with software rendering. Finally, an outlook on a possible response to the detected collisions is given.

  15. GPR-Based Landmine Detection and Identification Using Multiple Features

    Directory of Open Access Journals (Sweden)

    Kwang Hee Ko

    2012-01-01

    Full Text Available This paper presents a method to identify landmines in various burial conditions. A ground penetration radar is used to generate data set, which is then processed to reduce the ground effect and noise to obtain landmine signals. Principal components and Fourier coefficients of the landmine signals are computed, which are used as features of each landmine for detection and identification. A database is constructed based on the features of various types of landmines and the ground conditions, including the different levels of moisture and types of ground and the burial depths of the landmines. Detection and identification is performed by searching for features in the database. For a robust decision, the counting method and the Mahalanobis distance-based likelihood ratio test method are employed. Four landmines, different in size and material, are considered as examples that demonstrate the efficiency of the proposed method for detecting and identifying landmines.

  16. Incorporating privileged genetic information for fundus image based glaucoma detection.

    Science.gov (United States)

    Duan, Lixin; Xu, Yanwu; Li, Wen; Chen, Lin; Wing, Damon Wing Kee; Wong, Tien Yin; Liu, Jiang

    2014-01-01

    Visual features extracted from retinal fundus images have been increasingly used for glaucoma detection, as those images are generally easy to acquire. In recent years, genetic researchers have found that some single nucleic polymorphisms (SNPs) play important roles in the manifestation of glaucoma and also show superiority over fundus images for glaucoma detection. In this work, we propose to use the SNPs to form the so-called privileged information and deal with a practical problem where both fundus images and privileged genetic information exist for the training subjects, while the test objects only have fundus images. To solve this problem, we present an effective approach based on the learning using privileged information (LUPI) paradigm to train a predictive model for the image visual features. Extensive experiments demonstrate the usefulness of our approach in incorporating genetic information for fundus image based glaucoma detection.

  17. Vision-based multiple vehicle detection and tracking at nighttime

    Science.gov (United States)

    Xu, Wencong; Liu, Hai

    2011-08-01

    In this paper, we develop a robust vision-based approach for real-time traffic data collection at nighttime. The proposed algorithm detects and tracks vehicles through detection and location of vehicle headlights. First, we extract headlights candidates by an adaptive image segmentation algorithm. Then we group headlights candidates that belong to the same vehicle by spatial clustering and generate vehicle hypotheses by rule-based reasoning. The potential vehicles are then tracked over frames by region search and pattern analysis methods. The spatial and temporal continuity extracted from tracking process is used to confirm vehicle's presence. To handle problem of occlusions, we apply Kalman Filter to motion estimation. We test the algorithm on the video clips of nighttime traffic under different conditions. The experimental results show that real-time vehicle counting and tacking for multi-lanes are achieved and the total detection rate is above 96%.

  18. Fingerprint spoof detection using wavelet based local binary pattern

    Science.gov (United States)

    Kumpituck, Supawan; Li, Dongju; Kunieda, Hiroaki; Isshiki, Tsuyoshi

    2017-02-01

    In this work, a fingerprint spoof detection method using an extended feature, namely Wavelet-based Local Binary Pattern (Wavelet-LBP) is introduced. Conventional wavelet-based methods calculate wavelet energy of sub-band images as the feature for discrimination while we propose to use Local Binary Pattern (LBP) operation to capture the local appearance of the sub-band images instead. The fingerprint image is firstly decomposed by two-dimensional discrete wavelet transform (2D-DWT), and then LBP is applied on the derived wavelet sub-band images. Furthermore, the extracted features are used to train Support Vector Machine (SVM) classifier to create the model for classifying the fingerprint images into genuine and spoof. Experiments that has been done on Fingerprint Liveness Detection Competition (LivDet) datasets show the improvement of the fingerprint spoof detection by using the proposed feature.

  19. NETWORK INTRUSION DETECTION METHOD BASED ON RS-MSVM

    Institute of Scientific and Technical Information of China (English)

    Xiao Yun; Han Chongzhao; Zheng Qinghua; Zhang Junjie

    2006-01-01

    A new method called RS-MSVM (Rough Set and Multi-class Support Vector Machine) is proposed for network intrusion detection. This method is based on rough set followed by MSVM for attribute reduction and classification respectively. The number of attributes of the network data used in this paper is reduced from 41 to 30 using rough set theory. The kernel function of HVDM-RBF (Heterogeneous Value Difference Metric Radial Basis Function), based on the heterogeneous value difference metric of heterogeneous datasets, is constructed for the heterogeneous network data. HVDM-RBF and one-against-one method are applied to build MSVM. DARPA (Defense Advanced Research Projects Agency) intrusion detection evaluating data were used in the experiment. The testing results show that our method outperforms other methods mentioned in this paper on six aspects: detection accuracy, number of support vectors, false positive rate, false negative rate, training time and testing time.

  20. Section based traffic detection on motorways for incident management

    NARCIS (Netherlands)

    Noort, M. van; Klunder, G.

    2007-01-01

    Current vehicle detection on motorways is based generally on either inductive loop systems or various alternatives such as video cameras. Recently, we encountered two new developments that take a different approach: one from The Netherlands using microwave sensors, and the other from Sweden using bo

  1. PILOT-BASED FREQUENCY OFFSET DETECTION SCHEME IN OFDM SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Du Zheng; Zhu Jinkang

    2003-01-01

    The frequency offset information is extracted from local pilot amplitude characteristics, which suffer much less distortion in frequency-selective fading channels than those utilizing frequency domain correlation techniques. Simulation shows that the performance of this scheme has better performance than the existing frequency domain pilot-based frequency offset detection scheme.

  2. Detection of tonic epileptic seizures based on surface electromyography

    DEFF Research Database (Denmark)

    Larsen, Sigge N.; Conradsen, Isa; Beniczky, Sandor;

    2014-01-01

    The purpose of this project was to design an algorithm for detection of tonic seizures based on surface electromyography signals from the deltoids. A successful algorithm has a future prospect of being implemented in a wearable device as part of an alarm system. This has already been done...

  3. Clone Detection for Graph-Based Model Transformation Languages

    DEFF Research Database (Denmark)

    Strüber, Daniel; Plöger, Jennifer; Acretoaie, Vlad

    2016-01-01

    has been proposed for programming and modeling languages; yet no specific ones have emerged for model transformation languages. In this paper, we explore clone detection for graph-based model transformation languages. We introduce potential use cases for such techniques in the context of constructive...

  4. UPDATING NATIONAL TOPOGRAPHIC DATA BASE USING CHANGE DETECTION METHODS

    Directory of Open Access Journals (Sweden)

    E. Keinan

    2016-06-01

    The automatic process is based on high-resolution Digital Surface Model analysis, Multi Spectral (MS classification, MS segmentation, object analysis and shape forming algorithms. This article reviews the results of a novel change detection methodology as a first step for updating NTDB in the Survey of Israel.

  5. Two-Stage Part-Based Pedestrian Detection

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Prioletti, Antonio; Trivedi, Mohan M.;

    2012-01-01

    Detecting pedestrians is still a challenging task for automotive vision system due the extreme variability of targets, lighting conditions, occlusions, and high speed vehicle motion. A lot of research has been focused on this problem in the last 10 years and detectors based on classifiers has...

  6. Singularity Detection of Signals Based on their Wavelet Transform

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    This paper introduces a multiresolution decomposition of signals based on their wavelet transform. The different behaviors of the wavelet transform between the signal and the noise are compared. An algorithm of singularity detection and processing in signals is proposed by the modulus maximum of the wavelet transform.

  7. Corner Detection Based on Human Visual System Model

    Institute of Scientific and Technical Information of China (English)

    LU Xiaoguang; ZHOU Jie

    2001-01-01

    Corners are useful features in computer vision tasks.In this paper,we present an algorithm for corner detection based on a human visual system model.Experimental results proved that it ismore effective than conventional corner detector under uneven illumination conditions.

  8. Influence of hydrophobic mismatch on the catalytic activity of Escherichia coli GlpG rhomboid protease.

    Science.gov (United States)

    Foo, Alexander C Y; Harvey, Brandon G R; Metz, Jeff J; Goto, Natalie K

    2015-04-01

    Rhomboids comprise a broad family of intramembrane serine proteases that are found in a wide range of organisms and participate in a diverse array of biological processes. High-resolution structures of the catalytic transmembrane domain of the Escherichia coli GlpG rhomboid have provided numerous insights that help explain how hydrolytic cleavage can be achieved below the membrane surface. Key to this are observations that GlpG hydrophobic domain dimensions may not be sufficient to completely span the native lipid bilayer. This formed the basis for a model where hydrophobic mismatch Induces thinning of the local membrane environment to promote access to transmembrane substrates. However, hydrophobic mismatch also has the potential to alter the functional properties of the rhomboid, a possibility we explore in the current work. For this purpose, we purified the catalytic transmembrane domain of GlpG into phosphocholine or maltoside detergent micelles of varying alkyl chain lengths, and assessed proteolytic function with a model water-soluble substrate. Catalytic turnover numbers were found to depend on detergent alkyl chain length, with saturated chains containing 10-12 carbon atoms supporting maximal activity. Similar results were obtained in phospholipid bicelles, with no proteolytic activity being detected in longer-chain lipids. Although differences in thermal stability and GlpG oligomerization could not explain these activity differences, circular dichroism spectra suggest that mismatch gives rise to a small change in structure. Overall, these results demonstrate that hydrophobic mismatch can exert an inhibitory effect on rhomboid activity, with the potential for changes in local membrane environment to regulate activity in vivo.

  9. Citation-based plagiarism detection detecting disguised and cross-language plagiarism using citation pattern analysis

    CERN Document Server

    Gipp, Bela

    2014-01-01

    Plagiarism is a problem with far-reaching consequences for the sciences. However, even today's best software-based systems can only reliably identify copy & paste plagiarism. Disguised plagiarism forms, including paraphrased text, cross-language plagiarism, as well as structural and idea plagiarism often remain undetected. This weakness of current systems results in a large percentage of scientific plagiarism going undetected. Bela Gipp provides an overview of the state-of-the art in plagiarism detection and an analysis of why these approaches fail to detect disguised plagiarism forms. The aut

  10. A Simulated Multiagent-Based Architecture for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Onashoga S. Adebukola

    2013-04-01

    Full Text Available In this work, a Multiagent-based architecture for Intrusion Detection System (MIDS is proposed to overcome the shortcoming of current Mobile Agent-based Intrusion Detection System. MIDS is divided into three major phases namely: Data gathering, Detection and the Response phases. The data gathering stage involves data collection based on the features in the distributed system and profiling. The data collection components are distributed on both host and network. Closed Pattern Mining (CPM algorithm is introduced for profiling users’ activities in network database. The CPM algorithm is built on the concept of Frequent Pattern-growth algorithm by mining a prefix-tree called CPM-tree, which contains only the closed itemsets and its associated support count. According to the administrator’s specified thresholds, CPM-tree maintains only closed patterns online and incrementally outputs the current closed frequent pattern of users’ activities in real time. MIDS makes use of mobile and static agents to carry out the functions of intrusion detection. Each of these agents is built with rule-based reasoning to autonomously detect intrusions. Java 1.1.8 is chosen as the implementation language and IBM’s Java based mobile agent framework, Aglet 1.0.3 as the platform for running the mobile and static agents. In order to test the robustness of the system, a real-time simulation is carried out on University of Agriculture, Abeokuta (UNAAB network dataset and the results showed an accuracy of 99.94%, False Positive Rate (FPR of 0.13% and False Negative Rate (FNR of 0.04%. This shows an improved performance of MIDS when compared with other known MA-IDSs.

  11. Digital Signal Processing Based Real Time Vehicular Detection System

    Institute of Scientific and Technical Information of China (English)

    YANG Zhaoxuan; LIN Tao; LI Xiangping; LIU Chunyi; GAO Jian

    2005-01-01

    Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation.

  12. Miniaturized Aptamer-Based Assays for Protein Detection

    Directory of Open Access Journals (Sweden)

    Alessandro Bosco

    2016-09-01

    Full Text Available The availability of devices for cancer biomarker detection at early stages of the disease is one of the most critical issues in biomedicine. Towards this goal, to increase the assay sensitivity, device miniaturization strategies empowered by the employment of high affinity protein binders constitute a valuable approach. In this work we propose two different surface-based miniaturized platforms for biomarker detection in body fluids: the first platform is an atomic force microscopy (AFM-based nanoarray, where AFM is used to generate functional nanoscale areas and to detect biorecognition through careful topographic measurements; the second platform consists of a miniaturized electrochemical cell to detect biomarkers through electrochemical impedance spectroscopy (EIS analysis. Both devices rely on robust and highly-specific protein binders as aptamers, and were tested for thrombin detection. An active layer of DNA-aptamer conjugates was immobilized via DNA directed immobilization on complementary single-stranded DNA self-assembled monolayers confined on a nano/micro area of a gold surface. Results obtained with these devices were compared with the output of surface plasmon resonance (SPR assays used as reference. We succeeded in capturing antigens in concentrations as low as a few nM. We put forward ideas to push the sensitivity further to the pM range, assuring low biosample volume (μL range assay conditions.

  13. Vision Sensor-Based Road Detection for Field Robot Navigation.

    Science.gov (United States)

    Lu, Keyu; Li, Jian; An, Xiangjing; He, Hangen

    2015-11-24

    Road detection is an essential component of field robot navigation systems. Vision sensors play an important role in road detection for their great potential in environmental perception. In this paper, we propose a hierarchical vision sensor-based method for robust road detection in challenging road scenes. More specifically, for a given road image captured by an on-board vision sensor, we introduce a multiple population genetic algorithm (MPGA)-based approach for efficient road vanishing point detection. Superpixel-level seeds are then selected in an unsupervised way using a clustering strategy. Then, according to the GrowCut framework, the seeds proliferate and iteratively try to occupy their neighbors. After convergence, the initial road segment is obtained. Finally, in order to achieve a globally-consistent road segment, the initial road segment is refined using the conditional random field (CRF) framework, which integrates high-level information into road detection. We perform several experiments to evaluate the common performance, scale sensitivity and noise sensitivity of the proposed method. The experimental results demonstrate that the proposed method exhibits high robustness compared to the state of the art.

  14. Vision Sensor-Based Road Detection for Field Robot Navigation

    Directory of Open Access Journals (Sweden)

    Keyu Lu

    2015-11-01

    Full Text Available Road detection is an essential component of field robot navigation systems. Vision sensors play an important role in road detection for their great potential in environmental perception. In this paper, we propose a hierarchical vision sensor-based method for robust road detection in challenging road scenes. More specifically, for a given road image captured by an on-board vision sensor, we introduce a multiple population genetic algorithm (MPGA-based approach for efficient road vanishing point detection. Superpixel-level seeds are then selected in an unsupervised way using a clustering strategy. Then, according to the GrowCut framework, the seeds proliferate and iteratively try to occupy their neighbors. After convergence, the initial road segment is obtained. Finally, in order to achieve a globally-consistent road segment, the initial road segment is refined using the conditional random field (CRF framework, which integrates high-level information into road detection. We perform several experiments to evaluate the common performance, scale sensitivity and noise sensitivity of the proposed method. The experimental results demonstrate that the proposed method exhibits high robustness compared to the state of the art.

  15. Human visual system-based smoking event detection

    Science.gov (United States)

    Odetallah, Amjad D.; Agaian, Sos S.

    2012-06-01

    Human action (e.g. smoking, eating, and phoning) analysis is an important task in various application domains like video surveillance, video retrieval, human-computer interaction systems, and so on. Smoke detection is a crucial task in many video surveillance applications and could have a great impact to raise the level of safety of urban areas, public parks, airplanes, hospitals, schools and others. The detection task is challenging since there is no prior knowledge about the object's shape, texture and color. In addition, its visual features will change under different lighting and weather conditions. This paper presents a new scheme of a system for detecting human smoking events, or small smoke, in a sequence of images. In developed system, motion detection and background subtraction are combined with motion-region-saving, skin-based image segmentation, and smoke-based image segmentation to capture potential smoke regions which are further analyzed to decide on the occurrence of smoking events. Experimental results show the effectiveness of the proposed approach. As well, the developed method is capable of detecting the small smoking events of uncertain actions with various cigarette sizes, colors, and shapes.

  16. Pedestrian detection from thermal images: A sparse representation based approach

    Science.gov (United States)

    Qi, Bin; John, Vijay; Liu, Zheng; Mita, Seiichi

    2016-05-01

    Pedestrian detection, a key technology in computer vision, plays a paramount role in the applications of advanced driver assistant systems (ADASs) and autonomous vehicles. The objective of pedestrian detection is to identify and locate people in a dynamic environment so that accidents can be avoided. With significant variations introduced by illumination, occlusion, articulated pose, and complex background, pedestrian detection is a challenging task for visual perception. Different from visible images, thermal images are captured and presented with intensity maps based objects' emissivity, and thus have an enhanced spectral range to make human beings perceptible from the cool background. In this study, a sparse representation based approach is proposed for pedestrian detection from thermal images. We first adopted the histogram of sparse code to represent image features and then detect pedestrian with the extracted features in an unimodal and a multimodal framework respectively. In the unimodal framework, two types of dictionaries, i.e. joint dictionary and individual dictionary, are built by learning from prepared training samples. In the multimodal framework, a weighted fusion scheme is proposed to further highlight the contributions from features with higher separability. To validate the proposed approach, experiments were conducted to compare with three widely used features: Haar wavelets (HWs), histogram of oriented gradients (HOG), and histogram of phase congruency (HPC) as well as two classification methods, i.e. AdaBoost and support vector machine (SVM). Experimental results on a publicly available data set demonstrate the superiority of the proposed approach.

  17. Paper-based ELISA to rapidly detect Escherichia coli.

    Science.gov (United States)

    Shih, Cheng-Min; Chang, Chia-Ling; Hsu, Min-Yen; Lin, Jyun-Yu; Kuan, Chen-Meng; Wang, Hsi-Kai; Huang, Chun-Te; Chung, Mu-Chi; Huang, Kui-Chou; Hsu, Cheng-En; Wang, Chun-Yuan; Shen, Ying-Cheng; Cheng, Chao-Min

    2015-12-01

    Escherichia coli is a generic indicator of fecal contamination, and certain serotypes cause food- and water-borne illness such as O157:H7. In the clinic, detection of bacteriuria, which is often due to E. coli, is critical before certain surgical procedures or in cases of nosocomial infection to prevent further adverse events such as postoperative infection or sepsis. In low- and middle-income countries, where insufficient equipment and facilities preclude modern methods of detection, a simple, low-cost diagnostic device to detect E. coli in water and in the clinic will have significant impact. We have developed a simple paper-based colorimetric platform to detect E. coli contamination in 5h. On this platform, the mean color intensity for samples with 10(5)cells/mL is 0.118±0.002 (n=4), and 0.0145±0.003 (Ppaper-based ELISA is an innovative point-of-care diagnostic tool to rapidly detect E. coli, and possibly other pathogens when customized as appropriate, especially in areas that lack advanced clinical equipment.

  18. Micro-Vibration-Based Slip Detection in Tactile Force Sensors

    Directory of Open Access Journals (Sweden)

    Raul Fernandez

    2014-01-01

    Full Text Available Tactile sensing provides critical information, such as force, texture, shape or temperature, in manipulation tasks. In particular, tactile sensors traditionally used in robotics are emphasized in contact force determination for grasping control and object recognition. Nevertheless, slip detection is also crucial to successfully manipulate an object. Several approaches have appeared to detect slipping, the majority being a combination of complex sensors with complex algorithms. In this paper, we deal with simplicity, analyzing how a novel, but simple, algorithm, based on micro-vibration detection, can be used in a simple, but low-cost and durable, force sensor. We also analyze the results of using the same principle to detect slipping in other force sensors based on flexible parts. In particular, we show and compare the slip detection with: (i a flexible finger, designed by the authors, acting as a force sensor; (ii the finger torque sensor of a commercial robotic hand; (iii a commercial six-axis force sensor mounted on the wrist of a robot; and (iv a fingertip piezoresistive matrix sensor.

  19. Micro-vibration-based slip detection in tactile force sensors.

    Science.gov (United States)

    Fernandez, Raul; Payo, Ismael; Vazquez, Andres S; Becedas, Jonathan

    2014-01-03

    Tactile sensing provides critical information, such as force, texture, shape or temperature, in manipulation tasks. In particular, tactile sensors traditionally used in robotics are emphasized in contact force determination for grasping control and object recognition. Nevertheless, slip detection is also crucial to successfully manipulate an object. Several approaches have appeared to detect slipping, the majority being a combination of complex sensors with complex algorithms. In this paper, we deal with simplicity, analyzing how a novel, but simple, algorithm, based on micro-vibration detection, can be used in a simple, but low-cost and durable, force sensor. We also analyze the results of using the same principle to detect slipping in other force sensors based on flexible parts. In particular, we show and compare the slip detection with: (i) a flexible finger, designed by the authors, acting as a force sensor; (ii) the finger torque sensor of a commercial robotic hand; (iii) a commercial six-axis force sensor mounted on the wrist of a robot; and (iv) a fingertip piezoresistive matrix sensor.

  20. Disposable amperometric biosensor based on nanostructured bacteriophages for glucose detection

    Science.gov (United States)

    Kang, Yu Ri; Hwang, Kyung Hoon; Kim, Ju Hwan; Nam, Chang Hoon; Kim, Soo Won

    2010-10-01

    The selection of electrode material profoundly influences biosensor science and engineering, as it heavily influences biosensor sensitivity. Here we propose a novel electrochemical detection method using a working electrode consisting of bio-nanowires from genetically modified filamentous phages and nanoparticles. fd-tet p8MMM filamentous phages displaying a three-methionine (MMM) peptide on the major coat protein pVIII (designated p8MMM phages) were immobilized on the active area of an electrochemical sensor through physical adsorption and chemical bonding. Bio-nanowires composed of p8MMM phages and silver nanoparticles facilitated sensitive, rapid and selective detection of particular molecules. We explored whether the composite electrode with bio-nanowires was an effective platform to detect the glucose oxidase. The current response of the bio-nanowire sensor was high at various glucose concentrations (0.1 µm-0.1 mM). This method provides a considerable advantage to demonstrate analyte detection over low concentration ranges. Especially, phage-enabled bio-nanowires can serve as receptors with high affinity and specificity for the detection of particular biomolecules and provide a convenient platform for designing site-directed multifunctional scaffolds based on bacteriophages and may serve as a simple method for label-free detection.

  1. A Viola-Jones based hybrid face detection framework

    Science.gov (United States)

    Murphy, Thomas M.; Broussard, Randy; Schultz, Robert; Rakvic, Ryan; Ngo, Hau

    2013-12-01

    Improvements in face detection performance would benefit many applications. The OpenCV library implements a standard solution, the Viola-Jones detector, with a statistically boosted rejection cascade of binary classifiers. Empirical evidence has shown that Viola-Jones underdetects in some instances. This research shows that a truncated cascade augmented by a neural network could recover these undetected faces. A hybrid framework is constructed, with a truncated Viola-Jones cascade followed by an artificial neural network, used to refine the face decision. Optimally, a truncation stage that captured all faces and allowed the neural network to remove the false alarms is selected. A feedforward backpropagation network with one hidden layer is trained to discriminate faces based upon the thresholding (detection) values of intermediate stages of the full rejection cascade. A clustering algorithm is used as a precursor to the neural network, to group significant overlappings. Evaluated on the CMU/VASC Image Database, comparison with an unmodified OpenCV approach shows: (1) a 37% increase in detection rates if constrained by the requirement of no increase in false alarms, (2) a 48% increase in detection rates if some additional false alarms are tolerated, and (3) an 82% reduction in false alarms with no reduction in detection rates. These results demonstrate improved face detection and could address the need for such improvement in various applications.

  2. Wideband Array Signal Detection Algorithm Based on Power Focusing

    Directory of Open Access Journals (Sweden)

    Gong Bin

    2012-09-01

    Full Text Available Aiming at the requirement of real-time signal detection in the passive surveillance system, a wideband array signal detection algorithm is proposed based on the concept of power focusing. By making use of the phase difference of the signal received by a uniform linear array, the algorithm makes the power of the received signal focused in the Direction Of Arrival (DOA with improved cascade FFT. Subsequently, the probability density function of the output noise at each angle is derived. Furthermore, a Constant False Alarm Rate (CFAR test statistic and the corresponding detection threshold are constructed. The theoretical probability of detection is also derived for different false alarm rate and Signal-to-Noise Ratio (SNR. The proposed algorithm is computationally efficient, and the detection process is independent of the prior information. Meanwhile, the results can act as the initial value for other algorithms with higher precision. Simulation results show that the proposed algorithm achieves good performance for weak signal detection.

  3. A Novel Ultrasensitive ECL Sensor for DNA Detection Based on Nicking Endonuclease-Assisted Target Recycling Amplification, Rolling Circle Amplification and Hemin/G-Quadruplex

    Directory of Open Access Journals (Sweden)

    Fukang Luo

    2015-01-01

    Full Text Available In this study, we describe a novel universal and highly sensitive strategy for the electrochemiluminescent (ECL detection of sequence specific DNA at the aM level based on Nt.BbvCI (a nicking endonuclease-assisted target recycling amplification (TRA, rolling circle amplification (RCA and hemin/G-quadruplex. The target DNAs can hybridize with self-assembled capture probes and assistant probes to form “Y” junction structures on the electrode surface, thus triggering the execution of a TRA reaction with the aid of Nt.BbvCI. Then, the RCA reaction and the addition of hemin result in the production of numerous hemin/G-quadruplex, which consume the dissolved oxygen in the detection buffer and result in a significant ECL quenching effect toward the O2/S2O82− system. The proposed strategy combines the amplification ability of TRA, RCA and the inherent high sensitivity of the ECL technique, thus enabling low aM (3.8 aM detection for sequence-specific DNA and a wide linear range from 10.0 aM to 1.0 pM. At the same time, this novel strategy shows high selectivity against single-base mismatch sequences, which makes our novel universal and highly sensitive method a powerful addition to specific DNA sequence detection.

  4. Direct Mismatch Characterization of femto-Farad Capacitors

    KAUST Repository

    Omran, Hesham

    2015-08-17

    Reducing the capacitance of programmable capacitor arrays, commonly used in analog integrated circuits, is necessary for low-energy applications. However, limited mismatch data is available for small capacitors. We report mismatch measurement for a 2fF poly-insulator-poly (PIP) capacitor, which is the smallest reported PIP capacitor to the best of the authors’ knowledge. Instead of using complicated custom onchip circuitry, direct mismatch measurement is demonstrated and verified using Monte Carlo Simulations and experimental measurements. Capacitive test structures composed of 9 bit programmable capacitor arrays (PCAs) are implemented in a low-cost 0:35m CMOS process. Measured data is compared to mismatch of large PIP capacitors, theoretical models, and recently published data. Measurement results indicate an estimated average relative standard deviation of 0.43% for the 2fF unit capacitor, which is better than the reported mismatch of metal-oxide-metal (MOM) fringing capacitors implemented in an advanced 32nm CMOS process.

  5. The Effect of Codon Mismatch on the Protein Translation System.

    Directory of Open Access Journals (Sweden)

    Dinglin Zhang

    Full Text Available Incorrect protein translation, caused by codon mismatch, is an important problem of living cells. In this work, a computational model was introduced to quantify the effects of codon mismatch and the model was used to study the protein translation of Saccharomyces cerevisiae. According to simulation results, the probability of codon mismatch will increase when the supply of amino acids is unbalanced, and the longer is the codon sequence, the larger is the probability for incorrect translation to occur, making the synthesis of long peptide chain difficult. By comparing to simulation results without codon mismatch effects taken into account, the fraction of mRNAs with bound ribosome decrease faster along the mRNAs, making the 5' ramp phenomenon more obvious. It was also found in our work that the premature mechanism resulted from codon mismatch can reduce the proportion of incorrect translation when the amino acid supply is extremely unbalanced, which is one possible source of high fidelity protein synthesis after peptidyl transfer.

  6. Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes

    Directory of Open Access Journals (Sweden)

    Frances Bernadette C. De Ocampo

    2015-05-01

    Full Text Available Signature-based Intrusion Detection System (IDS helps in maintaining the integrity of data in a network controlled environment. Unfortunately, this type of IDS depends on predetermined intrusion patterns that are manually created. If the signature database of the Signature-based IDS is not updated, network attacks just pass through this type of IDS without being noticed. To avoid this, an Anomaly-based IDS is used in order to countercheck if a network traffic that is not detected by Signature-based IDS is a true malicious traffic or not. In doing so, the Anomaly-based IDS might come up with several numbers of logs containing numerous network attacks which could possibly be a false positive. This is the reason why the Anomaly-based IDS is not perfect, it would readily alarm the system that a network traffic is an attack just because it is not on its baseline. In order to resolve the problem between these two IDSs, the goal is to correlate data between the logs of the Anomaly-based IDS and the packet that has been captured in order to determine if a network traffic is really malicious or not. With the supervision of a security expert, the malicious network traffic would be verified as malicious. Using machine learning, the researchers can identify which algorithm is better than the other algorithms in classifying if a certain network traffic is really malicious. Upon doing so, the creation of signatures would follow by basing the automated creation of signatures from the detected malicious traffic.

  7. A Review On Cognitive Mismatch Between Computer and Information Technology And Physicians

    Directory of Open Access Journals (Sweden)

    Fozia Anwar

    2012-08-01

    Full Text Available Health Information Technology has a great potential to transform the existing health care systems by making them safe, effective and efficient. Multi-functionality and interoperability of health information systems are very important functions. Hence these features cannot be achieved without addressing the knowledge and skills of the health care personnel. There is a great mismatch between Information Technology knowledge and skills of physicians as this discipline is completely missing in their educational tenure. So usability of health information technologies and system as well as evidence based practice in the future can be improved by addressing this cognitive mismatch. This will result in persistent partnership in HIS design between physician and IT personnel to get maximum usibility of the systems,

  8. Convolutional Neural Network Based Fault Detection for Rotating Machinery

    Science.gov (United States)

    Janssens, Olivier; Slavkovikj, Viktor; Vervisch, Bram; Stockman, Kurt; Loccufier, Mia; Verstockt, Steven; Van de Walle, Rik; Van Hoecke, Sofie

    2016-09-01

    Vibration analysis is a well-established technique for condition monitoring of rotating machines as the vibration patterns differ depending on the fault or machine condition. Currently, mainly manually-engineered features, such as the ball pass frequencies of the raceway, RMS, kurtosis an crest, are used for automatic fault detection. Unfortunately, engineering and interpreting such features requires a significant level of human expertise. To enable non-experts in vibration analysis to perform condition monitoring, the overhead of feature engineering for specific faults needs to be reduced as much as possible. Therefore, in this article we propose a feature learning model for condition monitoring based on convolutional neural networks. The goal of this approach is to autonomously learn useful features for bearing fault detection from the data itself. Several types of bearing faults such as outer-raceway faults and lubrication degradation are considered, but also healthy bearings and rotor imbalance are included. For each condition, several bearings are tested to ensure generalization of the fault-detection system. Furthermore, the feature-learning based approach is compared to a feature-engineering based approach using the same data to objectively quantify their performance. The results indicate that the feature-learning system, based on convolutional neural networks, significantly outperforms the classical feature-engineering based approach which uses manually engineered features and a random forest classifier. The former achieves an accuracy of 93.61 percent and the latter an accuracy of 87.25 percent.

  9. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  10. Ground-based Nuclear Detonation Detection (GNDD) Technology Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Leslie A.

    2014-01-13

    This GNDD Technology Roadmap is intended to provide guidance to potential researchers and help management define research priorities to achieve technology advancements for ground-based nuclear explosion monitoring science being pursued by the Ground-based Nuclear Detonation Detection (GNDD) Team within the Office of Nuclear Detonation Detection in the National Nuclear Security Administration (NNSA) of the U.S. Department of Energy (DOE). Four science-based elements were selected to encompass the entire scope of nuclear monitoring research and development (R&D) necessary to facilitate breakthrough scientific results, as well as deliver impactful products. Promising future R&D is delineated including dual use associated with the Comprehensive Nuclear-Test-Ban Treaty (CTBT). Important research themes as well as associated metrics are identified along with a progression of accomplishments, represented by a selected bibliography, that are precursors to major improvements to nuclear explosion monitoring.

  11. A New Acoustic Emission Sensor Based Gear Fault Detection Approach

    Directory of Open Access Journals (Sweden)

    Junda Zhu

    2013-01-01

    Full Text Available In order to reduce wind energy costs, prognostics and health management (PHM of wind turbine is needed to ensure the reliability and availability of wind turbines. A gearbox is an important component of a wind turbine. Therefore, developing effective gearbox fault detection tools is important to the PHM of wind turbine. In this paper, a new acoustic emission (AE sensor based gear fault detection approach is presented. This approach combines a heterodyne based frequency reduction technique with time synchronous average (TSA and spectrum kurtosis (SK to process AE sensor signals and extract features as condition indictors for gear fault detection. Heterodyne technique commonly used in communication is first employed to preprocess the AE signals before sampling. By heterodyning, the AE signal frequency is down shifted from several hundred kHz to below 50 kHz. This reduced AE signal sampling rate is comparable to that of vibration signals. The presented approach is validated using seeded gear tooth crack fault tests on a notational split torque gearbox. The approach presented in this paper is physics based and the validation results have showed that it could effectively detect the gear faults.

  12. Sparsity based target detection for compressive spectral imagery

    Science.gov (United States)

    Boada, David Alberto; Arguello Fuentes, Henry

    2016-09-01

    Hyperspectral imagery provides significant information about the spectral characteristics of objects and materials present in a scene. It enables object and feature detection, classification, or identification based on the acquired spectral characteristics. However, it relies on sophisticated acquisition and data processing systems able to acquire, process, store, and transmit hundreds or thousands of image bands from a given area of interest which demands enormous computational resources in terms of storage, computationm, and I/O throughputs. Specialized optical architectures have been developed for the compressed acquisition of spectral images using a reduced set of coded measurements contrary to traditional architectures that need a complete set of measurements of the data cube for image acquisition, dealing with the storage and acquisition limitations. Despite this improvement, if any processing is desired, the image has to be reconstructed by an inverse algorithm in order to be processed, which is also an expensive task. In this paper, a sparsity-based algorithm for target detection in compressed spectral images is presented. Specifically, the target detection model adapts a sparsity-based target detector to work in a compressive domain, modifying the sparse representation basis in the compressive sensing problem by means of over-complete training dictionaries and a wavelet basis representation. Simulations show that the presented method can achieve even better detection results than the state of the art methods.

  13. Face detection based on multiple kernel learning algorithm

    Science.gov (United States)

    Sun, Bo; Cao, Siming; He, Jun; Yu, Lejun

    2016-09-01

    Face detection is important for face localization in face or facial expression recognition, etc. The basic idea is to determine whether there is a face in an image or not, and also its location, size. It can be seen as a binary classification problem, which can be well solved by support vector machine (SVM). Though SVM has strong model generalization ability, it has some limitations, which will be deeply analyzed in the paper. To access them, we study the principle and characteristics of the Multiple Kernel Learning (MKL) and propose a MKL-based face detection algorithm. In the paper, we describe the proposed algorithm in the interdisciplinary research perspective of machine learning and image processing. After analyzing the limitation of describing a face with a single feature, we apply several ones. To fuse them well, we try different kernel functions on different feature. By MKL method, the weight of each single function is determined. Thus, we obtain the face detection model, which is the kernel of the proposed method. Experiments on the public data set and real life face images are performed. We compare the performance of the proposed algorithm with the single kernel-single feature based algorithm and multiple kernels-single feature based algorithm. The effectiveness of the proposed algorithm is illustrated. Keywords: face detection, feature fusion, SVM, MKL

  14. Observer Based Fault Detection and Moisture Estimating in Coal Mill

    DEFF Research Database (Denmark)

    Odgaard, Peter Fogh; Mataji, Babak

    2008-01-01

    In this paper an observer-based method for detecting faults and estimating moisture content in the coal in coal mills is presented. Handling of faults and operation under special conditions, such as high moisture content in the coal, are of growing importance due to the increasing requirements to......In this paper an observer-based method for detecting faults and estimating moisture content in the coal in coal mills is presented. Handling of faults and operation under special conditions, such as high moisture content in the coal, are of growing importance due to the increasing...... requirements to the general performance of power plants. Detection  of faults and moisture content estimation are consequently of high interest in the handling of the problems caused by faults and moisture content. The coal flow out of the mill is the obvious variable to monitor, when detecting non-intended drops in the coal...... flow out of the coal mill. However, this variable is not measurable. Another estimated variable is the moisture content, which is only "measurable" during steady-state operations of the coal mill. Instead, this paper suggests a method where these unknown variables are estimated based on a simple energy...

  15. Analysis of Host-Based and Network-Based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Amrit Pal Singh

    2014-07-01

    Full Text Available Intrusion-detection systems (IDS aim at de-tecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host Based- IDS. This paper covers the scope of both the types and their result analysis along with their comparison as stated. OSSEC (HIDS is a free, open source host-base intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response. While Snort (NIDS is a lightweight intrusion detection system that can log packets coming across your network and can alert the user regarding any attack. Both are efficient in their own distinct fields.

  16. A Weld Defects Detection System Based on a Spectrometer

    Directory of Open Access Journals (Sweden)

    Sadek C. A. Alfaro

    2009-04-01

    Full Text Available Improved product quality and production methods, and decreased production costs are important objectives of industries. Welding processes are part of this goal. There are many studies about monitoring and controlling welding process. This work presents a non-intrusive on-line monitoriment system and some algorithms capable of detecting GTAW weld defects. Some experiments were made to simulate weld defects by disturbing the electric arc. The data comes from a spectrometer which captures perturbations on the electric arc by the radiation emission of chosen lines. Algorithms based on change detection methods are used to indicate the presence and localization of those defects.

  17. Ultrasonic flaw detection using EMD-based signal processing

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The precise detection of flaw echoes buried in backscattering noise caused by material microstructure is a problem of great importance in ultrasonic non-destructive testing (NDT). In this work, empirical mode decomposition (EMD) is proposed to deal with ultrasonic signal. A time-frequency filtering method based on EMD is designed to suppress noise and enhance flaw signals. Simulated results are presented,showing that the proposed method has an excellent performance even for a very low signal-to-noise ratio(SNR). The improvement in flaw detection was experimentally verified using stainless steel pipe sample with artificial flaws.

  18. Parametric roll resonance monitoring using signal-based detection

    DEFF Research Database (Denmark)

    Galeazzi, Roberto; Blanke, Mogens; Falkenberg, Thomas

    2015-01-01

    Extreme roll motion of ships can be caused by several phenomena, one of which is parametric roll resonance. Several incidents occurred unexpectedly around the millennium and caused vast fiscal losses on large container vessels. The phenomenon is now well understood and some consider parametric ro......-based monitoring system is a simple and effective mean to provide timely warning of resonance conditions...... algorithms in real conditions, and to evaluate the frequency of parametric roll events on the selected vessels. Detection performance is scrutinised through the validation of the detected events using owners’ standard methods, and supported by available wave radar data. Further, a bivariate statistical...

  19. Vehicle detection and tracking based on phase-correlation

    Institute of Scientific and Technical Information of China (English)

    Yi He(何毅); Xin Yang(杨新)

    2004-01-01

    This paper presents vehicle detection and tracking algorithms based on real-time background (RTB) and phase-correlation (PC) in the video sequence of urban highway with fixed camera. Firstly moving objects are obtained by subtracting RTB from serial images. After classification, PC is used to determine corresponding regions of moving objects between consecutive frames. The problems of vehicles' merging and splitting, sudden stop, and restart are also considered. Experiments show that the method is practical and can realize real-time detection and tracking of vehicles on highway.

  20. Model-based fault detection and diagnosis in ALMA subsystems

    Science.gov (United States)

    Ortiz, José; Carrasco, Rodrigo A.

    2016-07-01

    The Atacama Large Millimeter/submillimeter Array (ALMA) observatory, with its 66 individual telescopes and other central equipment, generates a massive set of monitoring data every day, collecting information on the performance of a variety of critical and complex electrical, electronic and mechanical components. This data is crucial for most troubleshooting efforts performed by engineering teams. More than 5 years of accumulated data and expertise allow for a more systematic approach to fault detection and diagnosis. This paper presents model-based fault detection and diagnosis techniques to support corrective and predictive maintenance in a 24/7 minimum-downtime observatory.

  1. Evaluation of Wind Farm Controller based Fault Detection and Isolation

    DEFF Research Database (Denmark)

    Odgaard, Peter Fogh; Shafiei, Seyed Ehsan

    2015-01-01

    detection and isolation and fault tolerant control has previously been proposed. Based on this model, and international competition on wind farm FDI was organized. The contributions were presented at the IFAC World Congress 2014. In this paper the top three contributions to this competition are shortly......In the process of lowering cost of energy of power generated by wind turbines, some focus has been drawn towards fault detection and isolation and as well as fault tolerant control of wind turbines with the purpose of increasing reliability and availability of the wind turbines. Most modern wind...

  2. Development of a Wearable-Sensor-Based Fall Detection System

    Directory of Open Access Journals (Sweden)

    Falin Wu

    2015-01-01

    Full Text Available Fall detection is a major challenge in the public healthcare domain, especially for the elderly as the decline of their physical fitness, and timely and reliable surveillance is necessary to mitigate the negative effects of falls. This paper develops a novel fall detection system based on a wearable device. The system monitors the movements of human body, recognizes a fall from normal daily activities by an effective quaternion algorithm, and automatically sends request for help to the caregivers with the patient’s location.

  3. Development of a Wearable-Sensor-Based Fall Detection System

    Science.gov (United States)

    Zhao, Hengyang; Zhao, Yan; Zhong, Haibo

    2015-01-01

    Fall detection is a major challenge in the public healthcare domain, especially for the elderly as the decline of their physical fitness, and timely and reliable surveillance is necessary to mitigate the negative effects of falls. This paper develops a novel fall detection system based on a wearable device. The system monitors the movements of human body, recognizes a fall from normal daily activities by an effective quaternion algorithm, and automatically sends request for help to the caregivers with the patient's location. PMID:25784933

  4. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Luo Min; Zhang Huan-guo; Wang Li-na

    2003-01-01

    An unsupervised clustering-based intrusion de tection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal cluster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesnt need labeled training data sets. The experiment concludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  5. Observer-based and Regression Model-based Detection of Emerging Faults in Coal Mills

    DEFF Research Database (Denmark)

    Odgaard, Peter Fogh; Lin, Bao; Jørgensen, Sten Bay

    2006-01-01

    In order to improve the reliability of power plants it is important to detect fault as fast as possible. Doing this it is interesting to find the most efficient method. Since modeling of large scale systems is time consuming it is interesting to compare a model-based method with data driven ones....... In this paper three different fault detection approaches are compared using a example of a coal mill, where a fault emerges. The compared methods are based on: an optimal unknown input observer, static and dynamic regression model-based detections. The conclusion on the comparison is that observer-based scheme...

  6. Structure of the EndoMS-DNA Complex as Mismatch Restriction Endonuclease.

    Science.gov (United States)

    Nakae, Setsu; Hijikata, Atsushi; Tsuji, Toshiyuki; Yonezawa, Kouki; Kouyama, Ken-Ichi; Mayanagi, Kouta; Ishino, Sonoko; Ishino, Yoshizumi; Shirai, Tsuyoshi

    2016-11-01

    Archaeal NucS nuclease was thought to degrade the single-stranded region of branched DNA, which contains flapped and splayed DNA. However, recent findings indicated that EndoMS, the orthologous enzyme of NucS, specifically cleaves double-stranded DNA (dsDNA) containing mismatched bases. In this study, we determined the structure of the EndoMS-DNA complex. The complex structure of the EndoMS dimer with dsDNA unexpectedly revealed that the mismatched bases were flipped out into binding sites, and the overall architecture most resembled that of restriction enzymes. The structure of the apo form was similar to the reported structure of Pyrococcus abyssi NucS, indicating that movement of the C-terminal domain from the resting state was required for activity. In addition, a model of the EndoMS-PCNA-DNA complex was preliminarily verified with electron microscopy. The structures strongly support the idea that EndoMS acts in a mismatch repair pathway.

  7. Applying different equations to evaluate the level of mismatch between students and school furniture.

    Science.gov (United States)

    Castellucci, H I; Arezes, P M; Molenbroek, J F M

    2014-07-01

    The mismatch between students and school furniture is likely to result in a number of negative effects, such as uncomfortable body posture, pain, and ultimately, it may also affect the learning process. This study's main aim is to review the literature describing the criteria equations for defining the mismatch between students and school furniture, to apply these equations to a specific sample and, based on the results, to propose a methodology to evaluate school furniture suitability. The literature review comprises one publications database, which was used to identify the studies carried out in the field of the abovementioned mismatch. The sample used for testing the different equations was composed of 2261 volunteer subjects from 14 schools. Fifteen studies were found to meet the criteria of this review and 21 equations to test 6 furniture dimensions were identified. Regarding seat height, there are considerable differences between the two most frequently used equations. Although seat to desk clearance was evaluated by knee height, this condition seems to be based on the false assumption that students are sitting on a chair with a proper seat height. Finally, the proposed methodology for suitability evaluation of school furniture should allow for a more reliable analysis of school furniture.

  8. A portable cell-based optical detection device for rapid detection of Listeria and Bacillus toxins

    Science.gov (United States)

    Banerjee, Pratik; Banada, Padmapriya P.; Rickus, Jenna L.; Morgan, Mark T.; Bhunia, Arun K.

    2005-11-01

    A mammalian cell-based optical biosensor was built to detect pathogenic Listeria and Bacillus species. This sensor measures the ability of the pathogens to infect and induce cytotoxicity on hybrid lymphocyte cell line (Ped-2E9) resulting in the release of alkaline phosphatase (ALP) that can be detected optically using a portable spectrophotometer. The Ped-2E9 cells were encapsulated in collagen gel matrices and grown in 48-well plates or in specially designed filtration tube units. Toxin preparations or bacterial cells were introduced and ALP release was assayed after 3-5 h. Pathogenic L. monocytogenes strains or the listeriolysin toxins preparation showed cytotoxicity ranging from 55% - 92%. Toxin preparations (~20 μg/ml) from B. cereus strains showed 24 - 98% cytotoxicity. In contrast, a non-pathogenic L. innocua (F4247) and a B. substilis induced only 2% and 8% cytotoxicity, respectively. This cell-based detection device demonstrates its ability to detect the presence of pathogenic Listeria and Bacillus species and can potentially be used onsite for food safety or in biosecurity application.

  9. Acoustic Evidence for Phonologically Mismatched Speech Errors

    Science.gov (United States)

    Gormley, Andrea

    2015-01-01

    Speech errors are generally said to accommodate to their new phonological context. This accommodation has been validated by several transcription studies. The transcription methodology is not the best choice for detecting errors at this level, however, as this type of error can be difficult to perceive. This paper presents an acoustic analysis of…

  10. Performance of a community detection algorithm based on semidefinite programming

    CERN Document Server

    Javanmard, Adel; Ricci-Tersenghi, Federico

    2016-01-01

    The problem of detecting communities in a graph is maybe one the most studied inference problems, given its simplicity and widespread diffusion among several disciplines. A very common benchmark for this problem is the stochastic block model or planted partition problem, where a phase transition takes place in the detection of the planted partition by changing the signal-to-noise ratio. Optimal algorithms for the detection exist which are based on spectral methods, but we show these are extremely sensible to slight modification in the generative model. Recently Javanmard, Montanari and Ricci-Tersenghi (arXiv:1511.08769) have used statistical physics arguments, and numerical simulations to show that finding communities in the stochastic block model via semidefinite programming is quasi optimal. Further, the resulting semidefinite relaxation can be solved efficiently, and is very robust with respect to changes in the generative model. In this paper we study in detail several practical aspects of this new algori...

  11. Pautomatic Sea Target Detection Based on Wavelet Transform

    Institute of Scientific and Technical Information of China (English)

    PEI Li-li; LUO Hai-bo

    2009-01-01

    An effective automatic target detection algorithm based on wavelet transform, which takes advantage of the localization and the orientation of wavelet analysis, is proposed. The algorithm detects the target in the vertical component of the wavelet transformation of the image. After mutual energy combination and sea clutter suppression through spatial weighting and thresholding, the target is located through maximum energy determination and its size is indicated through similarity measurement function of two overlapping windows. Experiment results show that the target can be detected by the algorithm in a single image frame and the better efficiency can be obtained also under the complicated backgrounds of existing the disturbances of cloud layer and fish scale light.

  12. Segment-based change detection for polarimetric SAR data

    DEFF Research Database (Denmark)

    Skriver, Henning; Nielsen, Allan Aasbjerg; Conradsen, Knut

    2006-01-01

    land areas for environmental or security applications. In many cases high resolution optical data are used for this purpose. However, SAR has also shown a potential due to the reliable data acquisition (i.e. independent of clouds), and the polarimetric SAR may provide the additional information...... to provide the most up-to-date map information to users. The update of topographic maps is an important and time consuming part of modern map production, and hence it is important to develop more robust and reliable methods to provide change detection information. Another example may be monitoring of larger...... criterion is based on the Wishart test statistic for fully polarimetric SAR data. 2. METHODOLOGY In change detection applications, at least two images must be available and used in the change detection process. If these images are segmented independently, the segments in the different images will most...

  13. MEMS-based extreme adaptive optics for planet detection

    Energy Technology Data Exchange (ETDEWEB)

    Macintosh, B A; Graham, J R; Oppenheimer, B; Poyneer, L; Sivaramakrishnan, A; Veran, J

    2005-11-18

    The next major step in the study of extrasolar planets will be the direct detection, resolved from their parent star, of a significant sample of Jupiter-like extrasolar giant planets. Such detection will open up new parts of the extrasolar planet distribution and allow spectroscopic characterization of the planets themselves. Detecting Jovian planets at 5-50 AU scale orbiting nearby stars requires adaptive optics systems and coronagraphs an order of magnitude more powerful than those available today--the realm of ''Extreme'' adaptive optics. We present the basic requirements and design for such a system, the Gemini Planet Imager (GPI.) GPI will require a MEMS-based deformable mirror with good surface quality, 2-4 micron stroke (operated in tandem with a conventional low-order ''woofer'' mirror), and a fully-functional 48-actuator-diameter aperture.

  14. Features Extraction for Object Detection Based on Interest Point

    Directory of Open Access Journals (Sweden)

    Amin Mohamed Ahsan

    2013-05-01

    Full Text Available In computer vision, object detection is an essential process for further processes such as object tracking, analyzing and so on. In the same context, extraction features play important role to detect the object correctly. In this paper we present a method to extract local features based on interest point which is used to detect key-points within an image, then, compute histogram of gradient (HOG for the region surround that point. Proposed method used speed-up robust feature (SURF method as interest point detector and exclude the descriptor. The new descriptor is computed by using HOG method. The proposed method got advantages of both mentioned methods. To evaluate the proposed method, we used well-known dataset which is Caltech101. The initial result is encouraging in spite of using a small data for training.

  15. Fabric Defect Detection Based on Regional Growing PCNN

    Directory of Open Access Journals (Sweden)

    Xiaoshu Si

    2012-10-01

    Full Text Available This paper presents an adaptive image segmentation method based on a new Regional Growing Pulse Coupled Neural Network (PCNN model for detecting fabric defects. In this method, the pixels of analyzed image are mapped on the neurons in a pulse coupled neural network. Improved PCNN model and regional growing theory are combined in the light of the requirements for fabric defect detection. And the mean and variance value of the defect-free images are introduced into this model. The validation tests on the developed algorithm were performed with fabric images from TILDA database and results showed that the proposed method is feasible and efficient for fabric defect detection

  16. Overlapping Communities Detection Based on Link Partition in Directed Networks

    Directory of Open Access Journals (Sweden)

    Qingyu Zou

    2013-09-01

    Full Text Available Many complex systems can be described as networks to comprehend both the structure and the function. Community structure is one of the most important properties of complex networks. Detecting overlapping communities in networks have been more attention in recent years, but the most of approaches to this problem have been applied to the undirected networks. This paper presents a novel approach based on link partition to detect overlapping communities structure in directed networks. In contrast to previous researches focused on grouping nodes, our algorithm defines communities as groups of directed links rather than nodes with the purpose of nodes naturally belong to more than one community. This approach can identify a suitable number of overlapping communities without any prior knowledge about the community in directed networks. We evaluate our algorithm on a simple artificial network and several real-networks. Experimental results demonstrate that the algorithm proposed is efficient for detecting overlapping communities in directed networks.  

  17. Structure damage detection based on random forest recursive feature elimination

    Science.gov (United States)

    Zhou, Qifeng; Zhou, Hao; Zhou, Qingqing; Yang, Fan; Luo, Linkai

    2014-05-01

    Feature extraction is a key former step in structural damage detection. In this paper, a structural damage detection method based on wavelet packet decomposition (WPD) and random forest recursive feature elimination (RF-RFE) is proposed. In order to gain the most effective feature subset and to improve the identification accuracy a two-stage feature selection method is adopted after WPD. First, the damage features are sorted according to original random forest variable importance analysis. Second, using RF-RFE to eliminate the least important feature and reorder the feature list each time, then get the new feature importance sequence. Finally, k-nearest neighbor (KNN) algorithm, as a benchmark classifier, is used to evaluate the extracted feature subset. A four-storey steel shear building model is chosen as an example in method verification. The experimental results show that using the fewer features got from proposed method can achieve higher identification accuracy and reduce the detection time cost.

  18. Model-Based Design of Tree WSNs for Decentralized Detection

    Directory of Open Access Journals (Sweden)

    Ashraf Tantawy

    2015-08-01

    Full Text Available The classical decentralized detection problem of finding the optimal decision rules at the sensor and fusion center, as well as variants that introduce physical channel impairments have been studied extensively in the literature. The deployment of WSNs in decentralized detection applications brings new challenges to the field. Protocols for different communication layers have to be co-designed to optimize the detection performance. In this paper, we consider the communication network design problem for a tree WSN. We pursue a system-level approach where a complete model for the system is developed that captures the interactions between different layers, as well as different sensor quality measures. For network optimization, we propose a hierarchical optimization algorithm that lends itself to the tree structure, requiring only local network information. The proposed design approach shows superior performance over several contentionless and contention-based network design approaches.

  19. Detecting weather radar clutter using satellite-based nowcasting products

    DEFF Research Database (Denmark)

    Jensen, Thomas B.S.; Gill, Rashpal S.; Overgaard, Søren

    2006-01-01

    This contribution presents the initial results from experiments with detection of weather radar clutter by information fusion with satellite based nowcasting products. Previous studies using information fusion of weather radar data and first generation Meteosat imagery have shown promising results...... for the detecting and removal of clutter. Naturally, the improved spatio-temporal resolution of the Meteosat Second Generation sensors, coupled with its increased number of spectral bands, is expected to yield even better detection accuracies. Weather radar data from three C-band Doppler weather radars...... for three rain intensity classes (heavy precipitation, light to moderate precipitation, and no precipitation) to every pixel in the Meteosat-8 images. Image fusion of the satellite image product and the radar composite images was done by resampling to a common grid of a spatial resolution dictated...

  20. Phase-Based Road Detection in Multi-Source Images

    Energy Technology Data Exchange (ETDEWEB)

    Sengupta, S K; Lopez, A S; Brase, J M; Paglieroni, D W

    2004-06-16

    The problem of robust automatic road detection in remotely sensed images is complicated by the fact that the sensor, spatial resolution, acquisition conditions, road width, road orientation and road material composition can all vary. A novel technique for detecting road pixels in multi-source remotely sensed images based on the phase (i.e., orientation or directional) information in edge pixels is described. A very dense map of edges extracted from the image is separated into channels, each containing edge pixels whose phases lie within a different range of orientations. The edge map associated with each channel is de-cluttered. A map of road pixels is formed by re-combining the de-cluttered channels into a composite edge image which is itself then separately de-cluttered. Road detection results are provided for DigitalGlobe and TerraServerUSA images. Road representations suitable for various applications are then discussed.