WorldWideScience

Sample records for bit transposed files

  1. Effect of ambient light and bit depth of digital radiograph on observer performance in determination of endodontic file positioning.

    Science.gov (United States)

    Heo, Min-Suk; Han, Dong-Hun; An, Byung-Mo; Huh, Kyung-Hoe; Yi, Won-Jin; Lee, Sam-Sun; Choi, Soon-Chul

    2008-02-01

    To examine the effects of the luminance and bit depth of digital image on observer performance for determination of endodontic file positioning. Using extracted premolar teeth, no. 08 K-file was placed into the canal and positioned so that the tip was either flush or 1 mm short of the radiologic root apex. The samples were imaged with both conventional and digital radiographs at 8 and 12 bits. Eleven observers read the images under dark and bright condition, and receiver operating characteristics analysis was performed. Additionally, the interpreting time was measured. The 12-bit images showed similar observer performance compared with conventional images, and better than the 8-bit images. The interpretation time for bright condition and 8-bit images was longer than for dark condition and 12-bit images. Twelve-bit digital images were preferred to 8-bit for accurate determination of endodontic file position.

  2. Tensor Transpose and Its Properties

    OpenAIRE

    Pan, Ran

    2014-01-01

    Tensor transpose is a higher order generalization of matrix transpose. In this paper, we use permutations and symmetry group to define? the tensor transpose. Then we discuss the classification and composition of tensor transposes. Properties of tensor transpose are studied in relation to tensor multiplication, tensor eigenvalues, tensor decompositions and tensor rank.

  3. Transposable elements in mosquitoes.

    Science.gov (United States)

    Boulesteix, M; Biémont, C

    2005-01-01

    We describe the current state of knowledge about transposable elements (TEs) in different mosquito species. DNA-based elements (class II elements), non-LTR retrotransposons (class I elements), and MITEs (Miniature Inverted Repeat Transposable Elements) are found in the three genera, Anopheles, Aedes and Culex, whereas LTR retrotransposons (class I elements) are found only in Anopheles and Aedes. Mosquitoes were the first insects in which MITEs were reported; they have several LTR retrotransposons belonging to the Pao family, which is distinct from the Gypsy-Ty3 and Copia-Ty1 families. The number of TE copies shows huge variations between classes of TEs within a given species (from 1 to 1000), in sharp contrast to Drosophila, which shows only relatively minor differences in copy number between elements (from 1 to 100). The genomes of these insects therefore display major differences in the amount of TEs and therefore in their structure and global composition. We emphasize the need for more population genetic data about the activity of TEs, their distribution over chromosomes and their frequencies in natural populations of mosquitoes, to further the current attempts to develop a transgenic mosquito unable to transmit malaria that is intended to replace the natural populations.

  4. PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY

    Directory of Open Access Journals (Sweden)

    Lanny Sutanto

    2014-01-01

    Full Text Available The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key.

  5. Transposable elements and circular DNAs

    KAUST Repository

    Mourier, Tobias

    2016-09-26

    Circular DNAs are extra-chromosomal fragments that become circularized by genomic recombination events. We have recently shown that yeast LTR elements generate circular DNAs through recombination events between their flanking long terminal repeats (LTRs). Similarly, circular DNAs can be generated by recombination between LTRs residing at different genomic loci, in which case the circular DNA will contain the intervening sequence. In yeast, this can result in gene copy number variations when circles contain genes and origins of replication. Here, I speculate on the potential and implications of circular DNAs generated through recombination between human transposable elements.

  6. 8 bit computer

    OpenAIRE

    Jankovskij, Robert

    2018-01-01

    In this paper the author looks into an eight bit computer structure and the computers components, their structure, pros and cons. An eight bit computer which can execute basic instructions and arithmetic operations such as addition and subtraction of eight bit numbers is built out of integrated circuits. Data transfers between computer components are monitored and reviewed.

  7. Bit selection using field drilling data and mathematical investigation

    Science.gov (United States)

    Momeni, M. S.; Ridha, S.; Hosseini, S. J.; Meyghani, B.; Emamian, S. S.

    2018-03-01

    A drilling process will not be complete without the usage of a drill bit. Therefore, bit selection is considered to be an important task in drilling optimization process. To select a bit is considered as an important issue in planning and designing a well. This is simply because the cost of drilling bit in total cost is quite high. Thus, to perform this task, aback propagation ANN Model is developed. This is done by training the model using several wells and it is done by the usage of drilling bit records from offset wells. In this project, two models are developed by the usage of the ANN. One is to find predicted IADC bit code and one is to find Predicted ROP. Stage 1 was to find the IADC bit code by using all the given filed data. The output is the Targeted IADC bit code. Stage 2 was to find the Predicted ROP values using the gained IADC bit code in Stage 1. Next is Stage 3 where the Predicted ROP value is used back again in the data set to gain Predicted IADC bit code value. The output is the Predicted IADC bit code. Thus, at the end, there are two models that give the Predicted ROP values and Predicted IADC bit code values.

  8. Practical Relativistic Bit Commitment.

    Science.gov (United States)

    Lunghi, T; Kaniewski, J; Bussières, F; Houlmann, R; Tomamichel, M; Wehner, S; Zbinden, H

    2015-07-17

    Bit commitment is a fundamental cryptographic primitive in which Alice wishes to commit a secret bit to Bob. Perfectly secure bit commitment between two mistrustful parties is impossible through an asynchronous exchange of quantum information. Perfect security is, however, possible when Alice and Bob each split into several agents exchanging classical information at times and locations suitably chosen to satisfy specific relativistic constraints. In this Letter we first revisit a previously proposed scheme [C. Crépeau et al., Lect. Notes Comput. Sci. 7073, 407 (2011)] that realizes bit commitment using only classical communication. We prove that the protocol is secure against quantum adversaries for a duration limited by the light-speed communication time between the locations of the agents. We then propose a novel multiround scheme based on finite-field arithmetic that extends the commitment time beyond this limit, and we prove its security against classical attacks. Finally, we present an implementation of these protocols using dedicated hardware and we demonstrate a 2 ms-long bit commitment over a distance of 131 km. By positioning the agents on antipodal points on the surface of Earth, the commitment time could possibly be extended to 212 ms.

  9. 32-Bit FASTBUS computer

    International Nuclear Information System (INIS)

    Blossom, J.M.; Hong, J.P.; Kellner, R.G.

    1985-01-01

    Los Alamos National Laboratory is building a 32-bit FASTBUS computer using the NATIONAL SEMICONDUCTOR 32032 central processing unit (CPU) and containing 16 million bytes of memory. The board can act both as a FASTBUS master and as a FASTBUS slave. It contains a custom direct memory access (DMA) channel which can perform 80 million bytes per second block transfers across the FASTBUS

  10. IMAGE STEGANOGRAPHY DENGAN METODE LEAST SIGNIFICANT BIT (LSB

    Directory of Open Access Journals (Sweden)

    M. Miftakul Amin

    2014-02-01

    Full Text Available Security in delivering a secret message is an important factor in the spread of information in cyberspace. Protecting that message to be delivered to the party entitled to, should be made a message concealment mechanism. The purpose of this study was to hide a secret text message into digital images in true color 24 bit RGB format. The method used to insert a secret message using the LSB (Least Significant Bit by replacing the last bit or 8th bit in each RGB color component. RGB image file types option considering that messages can be inserted capacity greater than if use a grayscale image, this is because in one pixel can be inserted 3 bits message. Tests provide results that are hidden messages into a digital image does not reduce significantly the quality of the digital image, and the message has been hidden can be extracted again, so that messages can be delivered to the recipient safely.

  11. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    Variable length bit rate (VLBR) ariable length bit rate (VLBR) ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses video coding which broadly encompasses video coding which mandates a temporal frequency of 10 mandates a temporal frequency of 10 frames per frames per ...

  12. Transposable elements as a molecular evolutionary force

    Science.gov (United States)

    Fedoroff, N. V.

    1999-01-01

    This essay addresses the paradoxes of the complex and highly redundant genomes. The central theses developed are that: (1) the distinctive feature of complex genomes is the existence of epigenetic mechanisms that permit extremely high levels of both tandem and dispersed redundancy; (2) the special contribution of transposable elements is to modularize the genome; and (3) the labilizing forces of recombination and transposition are just barely contained, giving a dynamic genetic system of ever increasing complexity that verges on the chaotic.

  13. A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client

    Directory of Open Access Journals (Sweden)

    Algimantas Venčkauskas

    2016-05-01

    Full Text Available The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the artifacts left by the BitTorrent client. We proposed a methodology to locate the artifacts that indicate the BitTorrent client activity performed. Additionally, we designed and implemented a tool that searches for the evidence left by the BitTorrent client application in a local computer running Windows. The tool looks for the four files holding the evidence. The files are as follows: *.torrent, dht.dat, resume.dat, and settings.dat. The tool decodes the files, extracts important information for the forensic investigator and converts it into XML format. The results are combined into a single result file.

  14. 2015 Florida Panhandle RCD30 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These files contain imagery data collected with an RCD30 camera as 8-bit RGBN TIFF images. Imagery was required 1000m seaward of the land/water interface or to laser...

  15. 2015 Southwest Florida RCD30 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These files contain imagery data collected with an RCD30 camera as 8-bit RGBN TIFF images. Imagery was required 1000m seaward of the land/water interface or to laser...

  16. Quantum dynamics of quantum bits

    International Nuclear Information System (INIS)

    Nguyen, Bich Ha

    2011-01-01

    The theory of coherent oscillations of the matrix elements of the density matrix of the two-state system as a quantum bit is presented. Different calculation methods are elaborated in the case of a free quantum bit. Then the most appropriate methods are applied to the study of the density matrices of the quantum bits interacting with a classical pumping radiation field as well as with the quantum electromagnetic field in a single-mode microcavity. The theory of decoherence of a quantum bit in Markovian approximation is presented. The decoherence of a quantum bit interacting with monoenergetic photons in a microcavity is also discussed. The content of the present work can be considered as an introduction to the study of the quantum dynamics of quantum bits. (review)

  17. Transposable elements in the Anopheles funestus transcriptome.

    Science.gov (United States)

    Fernández-Medina, Rita D; Carareto, Claudia M A; Struchiner, Cláudio J; Ribeiro, José M C

    2017-06-01

    Transposable elements (TEs) are present in most of the eukaryotic genomes and their impact on genome evolution is increasingly recognized. Although there is extensive information on the TEs present in several eukaryotic genomes, less is known about the expression of these elements at the transcriptome level. Here we present a detailed analysis regarding the expression of TEs in Anopheles funestus, the second most important vector of human malaria in Africa. Several transcriptionally active TE families belonging both to Class I and II were identified and characterized. Interestingly, we have identified a full-length putative active element (including the presence of full length TIRs in the genomic sequence) belonging to the hAT superfamily, which presents active members in other insect genomes. This work contributes to a comprehensive understanding of the landscape of transposable elements in A. funestus transcriptome. Our results reveal that TEs are abundant and diverse in the mosquito and that most of the TE families found in the genome are represented in the mosquito transcriptome, a fact that could indicate activity of these elements.The vast diversity of TEs expressed in A. funestus suggests that there is ongoing amplification of several families in this organism.

  18. Novel non-autonomous transposable elements onWchromosome of ...

    Indian Academy of Sciences (India)

    Through these analyses, we found that almost all of these uncharacterized sequences were non-autonomous transposable elements that do not fit into the conventional classification. It is notable that some of these transposable elements contained the Bombyx short interspersed element (Bm1) sequences in the elements.

  19. Novel non-autonomous transposable elements on W chromosome ...

    Indian Academy of Sciences (India)

    2010-09-06

    Sep 6, 2010 ... Through these analyses, we found that almost all of these uncharacterized sequences were non-autonomous transposable elements that do not fit into the conventional classification. It is notable that some of these transposable elements contained the Bombyx short interspersed element (Bm1) sequences ...

  20. Transposable Elements: No More 'Junk DNA'

    Directory of Open Access Journals (Sweden)

    Yun-Ji Kim

    2012-12-01

    Full Text Available Since the advent of whole-genome sequencing, transposable elements (TEs, just thought to be 'junk' DNA, have been noticed because of their numerous copies in various eukaryotic genomes. Many studies about TEs have been conducted to discover their functions in their host genomes. Based on the results of those studies, it has been generally accepted that they have a function to cause genomic and genetic variations. However, their infinite functions are not fully elucidated. Through various mechanisms, including de novo TE insertions, TE insertion-mediated deletions, and recombination events, they manipulate their host genomes. In this review, we focus on Alu, L1, human endogenous retrovirus, and short interspersed element/variable number of tandem repeats/Alu (SVA elements and discuss how they have affected primate genomes, especially the human and chimpanzee genomes, since their divergence.

  1. Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code

    Science.gov (United States)

    Sikder, Somali; Ghosh, Shila

    2018-02-01

    This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.

  2. How valuable are model organisms for transposable element studies?

    Science.gov (United States)

    Kidwell, M G; Evgen'ev, M B

    1999-01-01

    Model organisms have proved to be highly informative for many types of genetic studies involving 'conventional' genes. The results have often been successfully generalized to other closely related organisms and also, perhaps surprisingly frequently, to more distantly related organisms. Because of the wealth of previous knowledge and their availability and convenience, model organisms were often the species of choice for many of the earlier studies of transposable elements. The question arises whether the results of genetic studies of transposable elements in model organisms can be extrapolated in the same ways as those of conventional genes? A number of observations suggest that special care needs to be taken in generalizing the results from model organisms to other species. A hallmark of many transposable elements is their ability to amplify rapidly in species genomes. Rapid spread of a newly invaded element throughout a species range has also been demonstrated. The types and genomic copy numbers of transposable elements have been shown to differ greatly between some closely related species. Horizontal transfer of transposable elements appears to be more frequent than for nonmobile genes. Furthermore, the population structure of some model organisms has been subject to drastic recent changes that may have some bearing on their transposable element genomic complements. In order to initiate discussion of this question, several case studies of transposable elements in well-studied Drosophila species are presented.

  3. Partial transpose of two disjoint blocks in XY spin chains

    International Nuclear Information System (INIS)

    Coser, Andrea; Tonni, Erik; Calabrese, Pasquale

    2015-01-01

    We consider the partial transpose of the spin reduced density matrix of two disjoint blocks in spin chains admitting a representation in terms of free fermions, such as XY chains. We exploit the solution of the model in terms of Majorana fermions and show that such partial transpose in the spin variables is a linear combination of four Gaussian fermionic operators. This representation allows to explicitly construct and evaluate the integer moments of the partial transpose. We numerically study critical XX and Ising chains and we show that the asymptotic results for large blocks agree with conformal field theory predictions if corrections to the scaling are properly taken into account. (paper)

  4. Quantum bit commitment protocol without quantum memory

    OpenAIRE

    Ramos, Rubens Viana; Mendonca, Fabio Alencar

    2008-01-01

    Quantum protocols for bit commitment have been proposed and it is largely accepted that unconditionally secure quantum bit commitment is not possible; however, it can be more secure than classical bit commitment. In despite of its usefulness, quantum bit commitment protocols have not been experimentally implemented. The main reason is the fact that all proposed quantum bit commitment protocols require quantum memory. In this work, we show a quantum bit commitment protocol that does not requir...

  5. The fate of transposed immature muscle and its clinical application.

    Science.gov (United States)

    Ger, R; Pinard, B; Ravo, B; Addei, K A; Savella, B J; Spiro, A

    1986-08-01

    Transposition of muscles with their intact neurovascular bundles is a well-accepted procedure in the adult with a predictable outcome. The fate of transposed immature muscle, however, has not been studied. For this reason, muscles were transposed in three 6-week-old puppies and harvested when the puppies were 6 months old. The developing normal and transposed muscles were studied using serial biopsies, electromyography, and histochemical methods, and the growth in bulk was assessed by serial radiography and measurements of length, breadth, height, and weight of the muscles at death. As judged by these criteria, the transposed muscle developed normally. A patient with prune-belly syndrome, treated by muscle transpositions from thigh to abdomen with satisfactory results, is also described.

  6. Bursts of transposable elements as an evolutionary driving force

    Czech Academy of Sciences Publication Activity Database

    Belyayev, Alexander

    2014-01-01

    Roč. 27, č. 12 (2014), s. 2573-2584 ISSN 1010-061X Institutional support: RVO:67985939 Keywords : evolution * genome * marginal populations * speciation * transposable elements Subject RIV: EF - Botanics Impact factor: 3.232, year: 2014

  7. Splinkerette PCR for mapping transposable elements in Drosophila.

    OpenAIRE

    Christopher J Potter; Liqun Luo

    2010-01-01

    Transposable elements (such as the P-element and piggyBac) have been used to introduce thousands of transgenic constructs into the Drosophila genome. These transgenic constructs serve many roles, from assaying gene/cell function, to controlling chromosome arm rearrangement. Knowing the precise genomic insertion site for the transposable element is often desired. This enables identification of genomic enhancer regions trapped by an enhancer trap, identification of the gene mutated by a transpo...

  8. PASTEC: an automatic transposable element classification tool.

    Science.gov (United States)

    Hoede, Claire; Arnoux, Sandie; Moisset, Mark; Chaumier, Timothée; Inizan, Olivier; Jamilloux, Véronique; Quesneville, Hadi

    2014-01-01

    The classification of transposable elements (TEs) is key step towards deciphering their potential impact on the genome. However, this process is often based on manual sequence inspection by TE experts. With the wealth of genomic sequences now available, this task requires automation, making it accessible to most scientists. We propose a new tool, PASTEC, which classifies TEs by searching for structural features and similarities. This tool outperforms currently available software for TE classification. The main innovation of PASTEC is the search for HMM profiles, which is useful for inferring the classification of unknown TE on the basis of conserved functional domains of the proteins. In addition, PASTEC is the only tool providing an exhaustive spectrum of possible classifications to the order level of the Wicker hierarchical TE classification system. It can also automatically classify other repeated elements, such as SSR (Simple Sequence Repeats), rDNA or potential repeated host genes. Finally, the output of this new tool is designed to facilitate manual curation by providing to biologists with all the evidence accumulated for each TE consensus. PASTEC is available as a REPET module or standalone software (http://urgi.versailles.inra.fr/download/repet/REPET_linux-x64-2.2.tar.gz). It requires a Unix-like system. There are two standalone versions: one of which is parallelized (requiring Sun grid Engine or Torque), and the other of which is not.

  9. PASTEC: an automatic transposable element classification tool.

    Directory of Open Access Journals (Sweden)

    Claire Hoede

    Full Text Available SUMMARY: The classification of transposable elements (TEs is key step towards deciphering their potential impact on the genome. However, this process is often based on manual sequence inspection by TE experts. With the wealth of genomic sequences now available, this task requires automation, making it accessible to most scientists. We propose a new tool, PASTEC, which classifies TEs by searching for structural features and similarities. This tool outperforms currently available software for TE classification. The main innovation of PASTEC is the search for HMM profiles, which is useful for inferring the classification of unknown TE on the basis of conserved functional domains of the proteins. In addition, PASTEC is the only tool providing an exhaustive spectrum of possible classifications to the order level of the Wicker hierarchical TE classification system. It can also automatically classify other repeated elements, such as SSR (Simple Sequence Repeats, rDNA or potential repeated host genes. Finally, the output of this new tool is designed to facilitate manual curation by providing to biologists with all the evidence accumulated for each TE consensus. AVAILABILITY: PASTEC is available as a REPET module or standalone software (http://urgi.versailles.inra.fr/download/repet/REPET_linux-x64-2.2.tar.gz. It requires a Unix-like system. There are two standalone versions: one of which is parallelized (requiring Sun grid Engine or Torque, and the other of which is not.

  10. Characteristics of transposable element exonization within human and mouse.

    Directory of Open Access Journals (Sweden)

    Noa Sela

    Full Text Available Insertion of transposed elements within mammalian genes is thought to be an important contributor to mammalian evolution and speciation. Insertion of transposed elements into introns can lead to their activation as alternatively spliced cassette exons, an event called exonization. Elucidation of the evolutionary constraints that have shaped fixation of transposed elements within human and mouse protein coding genes and subsequent exonization is important for understanding of how the exonization process has affected transcriptome and proteome complexities. Here we show that exonization of transposed elements is biased towards the beginning of the coding sequence in both human and mouse genes. Analysis of single nucleotide polymorphisms (SNPs revealed that exonization of transposed elements can be population-specific, implying that exonizations may enhance divergence and lead to speciation. SNP density analysis revealed differences between Alu and other transposed elements. Finally, we identified cases of primate-specific Alu elements that depend on RNA editing for their exonization. These results shed light on TE fixation and the exonization process within human and mouse genes.

  11. A Holistic Approach to Bit Preservation

    DEFF Research Database (Denmark)

    Zierau, Eld Maj-Britt Olmütz

    2011-01-01

    This thesis presents three main results for a holistic approach to bit preservation, where the ultimate goal is to find the optimal bit preservation strategy for specific digital material that must be digitally preserved. Digital material consists of sequences of bits, where a bit is a binary digit...... which can have the value 0 or 1. Bit preservation must ensure that the bits remain intact and readable in the future, but bit preservation is not concerned with how bits can be interpreted as e.g. an image. A holistic approach to bit preservation includes aspects that influence the final choice of a bit...... preservation strategy. This can be aspects of how the permanent access to the digital material must be ensured. It can also be aspects of how the material must be treated as part of using it. This includes aspects related to how the digital material to be bit preserved is represented, as well as requirements...

  12. Bits and q-bits as versatility measures

    Directory of Open Access Journals (Sweden)

    José R.C. Piqueira

    2004-06-01

    Full Text Available Using Shannon information theory is a common strategy to measure any kind of variability in a signal or phenomenon. Some methods were developed to adapt information entropy measures to bird song data trying to emphasize its versatility aspect. This classical approach, using the concept of bit, produces interesting results. Now, the original idea developed in this paper is to use the quantum information theory and the quantum bit (q-bit concept in order to provide a more complete vision of the experimental results.Usar a teoria da informação de Shannon é uma estratégia comum para medir todo tipo de variabilidade em um sinal ou fenômeno. Alguns métodos foram desenvolvidos para adaptar a medida de entropia informacional a dados de cantos de pássaro, tentando enfatizar seus aspectos de versatilidade. Essa abordagem clássica, usando o conceito de bit, produz resultados interessantes. Agora, a idéia original desenvolvida neste artigo é usar a teoria quântica da informação e o conceito de q-bit, com a finalidade de proporcionar uma visão mais completa dos resultados experimentais.

  13. Flexible Bit Preservation on a National Basis

    DEFF Research Database (Denmark)

    Jurik, Bolette; Nielsen, Anders Bo; Zierau, Eld

    2012-01-01

    In this paper we present the results from The Danish National Bit Repository project. The project aim was establishment of a system that can offer flexible and sustainable bit preservation solutions to Danish cultural heritage institutions. Here the bit preservation solutions must include support...... of bit safety as well as other requirements like e.g. confidentiality and availability. The Danish National Bit Repository is motivated by the need to investigate and handle bit preservation for digital cultural heritage. Digital preservation relies on the integrity of the bits which digital material...

  14. Cheat Sensitive Quantum Bit Commitment

    OpenAIRE

    Hardy, Lucien; Kent, Adrian

    1999-01-01

    We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We give an example of an unconditionally secure cheat sensitive non-relativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a simple relativistic protocol.

  15. Cheat sensitive quantum bit commitment.

    Science.gov (United States)

    Hardy, Lucien; Kent, Adrian

    2004-04-16

    We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We describe an unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a simple relativistic protocol.

  16. Hey! A Louse Bit Me!

    Science.gov (United States)

    ... of a sesame seed, and are tan to gray in color. Lice need to suck a tiny bit of blood to survive, and they sometimes live on people's heads and lay eggs in the hair , on the back of the neck, or behind ...

  17. Transposable elements and genetic instabilities in crop plants

    Energy Technology Data Exchange (ETDEWEB)

    Burr, B.; Burr, F.

    1981-04-10

    Transposable elements have long been associated with certain unstable loci in maize and have been intensively studied by McClintock and others. It is known that a transposable element can control the expression of the structural genes at the locus where it resides. These controlling elements in maize are now beginning to be studied at the molecular level. Using recombinant molecular probes we have been able to describe the changes induced by the controlling element Ds at the shrunken locus. Ds elements appear to be large and dissimilar insertions into the wild-type locus - two elements actually map within the transcribed region of the gene. Genetic instabilities have been described in other economically important plants but the bases for these phenomena have not been understood. We believe that it is likely that some of these instabilities are the result of transposable element activity much as in the case of maize.

  18. Mobility of hobo transposable elements in non-drosophilid insects

    International Nuclear Information System (INIS)

    Atkinson, P.W.; Whyard, S.; Mende, H.A.; Pinkerton, A.C.; Coates, C.J.; Warren, W.D.; Saville, K.J.; O'Brochta, D.A.

    1998-01-01

    We will describe the development and implementation of assays which permit the mobility of hobo elements injected into developing insects embryos to be detected and examined. These assays have enabled us to classify hobo elements as members of a transposable element family which includes the Ac element of maize and the Tam3 element of snapdragon - two plant transposable elements that have wide host ranges. We will present data that show that hobo also has a wide host range in that it can excise and transpose in a number of non-drosophilid insect species. These results have led us to use hobo as a gene vector in the tephritid, Bactrocera tryoni, and we will discuss the progress of these ongoing experiments. (author)

  19. Research on bit synchronization based on GNSS

    Science.gov (United States)

    Yu, Huanran; Liu, Yi-jun

    2017-05-01

    The signals transmitted by GPS satellites are divided into three components: carrier, pseudocode and data code. The processes of signal acquisition are acquisition, tracking, bit synchronization, frame synchronization, navigation message extraction, observation extraction and position speed calculation, among which bit synchronization is of greatest importance. The accuracy of bit synchronization and the shortening of bit synchronization time can help us to use satellite to realize positioning and acquire the information transmitted by satellite signals more accurately. Even under the condition of weak signal, how to improve bit synchronization performance is what we need to research. We adopt a method of polymorphic energy accumulation minima so as to find the bit synchronization point, as well as complete the computer simulation to conclude that under the condition of extremely weak signal power, this method still has superior synchronization performance, which can achieve high bit edge detection rate and the optimal bit error rate.

  20. A holistic approach to bit preservation

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    Purpose: The purpose of this paper is to point out the importance of taking a holistic approach to bit preservation when setting out to find an optimal bit preservation solution for specific digital materials. In the last decade there has been an increasing awareness that bit preservation, which...... is to keep bits intact and readable, is far more complex than first anticipated, even in this narrow definition. This paper takes a more holistic approach to bit preservation, and looks at how an optimal bit preservation strategy can be found, when requirements like confidentiality, availability and costs...... are taken into account. Design/methodology/approach: The paper describes the various findings from previous research which have led to the holistic approach to bit preservation. This paper also includes an introduction to digital preservation with a focus on the role of bit preservation, which sets...

  1. Flexible Bit Preservation on a National Basis

    DEFF Research Database (Denmark)

    Jurik, Bolette; Nielsen, Anders Bo; Zierau, Eld

    2012-01-01

    In this paper we present the results from The Danish National Bit Repository project. The project aim was establishment of a system that can offer flexible and sustainable bit preservation solutions to Danish cultural heritage institutions. Here the bit preservation solutions must include support...... of bit safety as well as other requirements like e.g. confidentiality and availability. The Danish National Bit Repository is motivated by the need to investigate and handle bit preservation for digital cultural heritage. Digital preservation relies on the integrity of the bits which digital material...... consists of, and it is with this focus that the project was initiated. This paper summarizes the requirements for a general system to offer bit preservation to cultural heritage institutions. On this basis the paper describes the resulting flexible system which can support such requirements. The paper...

  2. Entangled states with positive partial transposes arising from indecomposable positive linear maps

    International Nuclear Information System (INIS)

    Ha, Kil-Chan; Kye, Seung-Hyeok; Park, Young Sung

    2003-01-01

    We construct entangled states with positive partial transposes using indecomposable positive linear maps between matrix algebras. We also exhibit concrete examples of entangled states with positive partial transposes arising in this way, and show that they generate extreme rays in the cone of all positive semi-definite matrices with positive partial transposes. They also have Schmidt numbers two

  3. Transposable genetic elements in Spirulina and potential applications for genetic engineering

    Science.gov (United States)

    Hiroyuki, Kojima; Qin, Song; Thankappan, Ajith Kumar; Yoshikazu, Kawata; Shin-Ichi, Yano

    1998-03-01

    Transposable elements in cyanobacteria are briefly reviewed. Evidence is presented to show that transposable elements in Spirulina platensis is actually reflected on the phenotype change, i e., helical to straight filaments. Transposition intermediates of DNA were isolated from the extrachromosome and the transposition was related to helical variations in Spirulina. Uses of transposable elements for microalgal recombination are discussed based on the transposition mechanism.

  4. Orthodontic Intervention to Impacted and Transposed Lower Canines

    Directory of Open Access Journals (Sweden)

    Nihat Kılıç

    2017-01-01

    Full Text Available Impacted and transposed teeth cause serious difficulties in tooth eruption and movement as well as esthetic and functional outcomes. Proper treatment planning including good biomechanical control is essential in order to avoid side effects during traction and aligning of the impacted and/or transposed teeth. The purpose of the present study was to present a successfully treated female patient having transposed and impacted lower canines by means of a modified lingual arch and fixed orthodontic appliance. A female patient aged 13 years and 9 months presented to the orthodontic department with a chief compliant of bilateral spacing and missing teeth in mandibular dentition. After leveling and creating sufficient space in the mandibular arch for the canines, a modified lingual arch was cemented to the mandibular first molars. The lingual arch had two hooks extending to the distobuccal areas of the canine spaces. Elastic chains were applied between the hooks on the lingual arch and the ligatures tied to the attachments on the canine crowns. The light forces generated by elastic materials caused impacted canines to erupt and tend towards their own spaces in the dental arch. As a result, impacted and transposed lower canines were properly positioned in their spaces, and the treatment results were stable during the retention period.

  5. The Transposing of Isomer Yields in the Methanolyses of N ...

    African Journals Online (AJOL)

    The effect of triethylamine in transposing the respective yields of the two isomeric esters ensuing from the methanolysis of N-substituted quinolinimides is described and is rationalized with a mechanism. Keywords: N-Substituted quinolinimides, methyl 2-carbamoyl-3-pyridinecarboxylates, methyl ...

  6. Irreversibility of Asymptotic Entanglement Manipulation Under Quantum Operations Completely Preserving Positivity of Partial Transpose

    Science.gov (United States)

    Wang, Xin; Duan, Runyao

    2017-11-01

    We demonstrate the irreversibility of asymptotic entanglement manipulation under quantum operations that completely preserve the positivity of partial transpose (PPT), resolving a major open problem in quantum information theory. Our key tool is a new efficiently computable additive lower bound for the asymptotic relative entropy of entanglement with respect to PPT states, which can be used to evaluate the entanglement cost under local operations and classical communication (LOCC). We find that for any rank-two mixed state supporting on the 3 ⊗3 antisymmetric subspace, the amount of distillable entanglement by PPT operations is strictly smaller than one entanglement bit (ebit) while its entanglement cost under PPT operations is exactly one ebit. As a by-product, we find that for this class of states, both the Rains's bound and its regularization are strictly less than the asymptotic relative entropy of entanglement. So, in general, there is no unique entanglement measure for the manipulation of entanglement by PPT operations. We further show a computable sufficient condition for the irreversibility of entanglement distillation by LOCC (or PPT) operations.

  7. Distribution of digital games via BitTorrent

    DEFF Research Database (Denmark)

    Drachen, Anders; Bauer, Kevin; Veitch, Robert W. D.

    2011-01-01

    distribution across game titles and game genres. This paper presents the first large-scale, open-method analysis of the distribution of digital game titles, which was conducted by monitoring the BitTorrent peer-to-peer (P2P) file-sharing protocol. The sample includes 173 games and a collection period of three......The practice of illegally copying and distributing digital games is at the heart of one of the most heated and divisive debates in the international games environment. Despite the substantial interest in game piracy, there is very little objective information available about its magnitude or its...

  8. Splinkerette PCR for mapping transposable elements in Drosophila.

    Directory of Open Access Journals (Sweden)

    Christopher J Potter

    2010-04-01

    Full Text Available Transposable elements (such as the P-element and piggyBac have been used to introduce thousands of transgenic constructs into the Drosophila genome. These transgenic constructs serve many roles, from assaying gene/cell function, to controlling chromosome arm rearrangement. Knowing the precise genomic insertion site for the transposable element is often desired. This enables identification of genomic enhancer regions trapped by an enhancer trap, identification of the gene mutated by a transposon insertion, or simplifying recombination experiments. The most commonly used transgene mapping method is inverse PCR (iPCR. Although usually effective, limitations with iPCR hinder its ability to isolate flanking genomic DNA in complex genomic loci, such as those that contain natural transposons. Here we report the adaptation of the splinkerette PCR (spPCR method for the isolation of flanking genomic DNA of any P-element or piggyBac. We report a simple and detailed protocol for spPCR. We use spPCR to 1 map a GAL4 enhancer trap located inside a natural transposon, pinpointing a master regulatory region for olfactory neuron expression in the brain; and 2 map all commonly used centromeric FRT insertion sites. The ease, efficiency, and efficacy of spPCR could make it a favored choice for the mapping of transposable element in Drosophila.

  9. Cooperation is fleeting in the world of transposable elements.

    Directory of Open Access Journals (Sweden)

    Andreas Wagner

    2006-12-01

    Full Text Available Composite transposons are key vehicles for the worldwide spreading of genes that allow bacteria to survive toxic compounds. Composite transposons consist of two smaller transposable elements called insertion sequences (ISs, which flank the genes that permit such survival. Each IS in a composite transposon can either transpose alone, selfishly, or it can transpose cooperatively, jointly with the other IS. Cooperative transposition can enhance an IS's chance of survival, but it also carries the risk of transposon destruction. I use game theory to show that the conditions under which cooperative transposition is an evolutionarily stable strategy (ESS are not biologically realistic. I then analyze the distribution of thousands of ISs in more than 200 bacterial genomes to test the following prediction of the game-theoretical model: if cooperative transposition was an ESS, then the closely spaced ISs that characterize composite transposons should be more abundant in genomes than expected by chance. The data show that this is not the case. Cooperativity can only be maintained in a transitional, far-from-equilibrium state shortly after a selection pressure first arises. This is the case in the spreading of antibiotic resistance, where we are witnessing a fleeting moment in evolution, a moment in which cooperation among selfish DNA molecules has provided a means of survival. Because such cooperation does not pay in the long run, the vehicles of such survival will eventually disappear again. My analysis demonstrates that game theory can help explain behavioral strategies even for mobile DNA.

  10. Gene expression variation in Drosophila melanogaster due to rare transposable element insertion alleles of large effect.

    Science.gov (United States)

    Cridland, Julie M; Thornton, Kevin R; Long, Anthony D

    2015-01-01

    Transposable elements are a common source of genetic variation that may play a substantial role in contributing to gene expression variation. However, the contribution of transposable elements to expression variation thus far consists of a handful of examples. We used previously published gene expression data from 37 inbred Drosophila melanogaster lines from the Drosophila Genetic Reference Panel to perform a genome-wide assessment of the effects of transposable elements on gene expression. We found thousands of transcripts with transposable element insertions in or near the transcript and that the presence of a transposable element in or near a transcript is significantly associated with reductions in expression. We estimate that within this example population, ∼2.2% of transcripts have a transposable element insertion, which significantly reduces expression in the line containing the transposable element. We also find that transcripts with insertions within 500 bp of the transcript show on average a 0.67 standard deviation decrease in expression level. These large decreases in expression level are most pronounced for transposable element insertions close to transcripts and the effect diminishes for more distant insertions. This work represents the first genome-wide analysis of gene expression variation due to transposable elements and suggests that transposable elements are an important class of mutation underlying expression variation in Drosophila and likely in other systems, given the ubiquity of these mobile elements in eukaryotic genomes. Copyright © 2015 by the Genetics Society of America.

  11. In bits, bytes and stone

    DEFF Research Database (Denmark)

    Sabra, Jakob Borrits; Andersen, Hans Jørgen

    designs'. Urns, coffins, graves, cemeteries, memorials, monuments, websites, applications and software services, whether cut in stone or made of bits, are all influenced by discourses of publics, economics, power, technology and culture. Designers, programmers, stakeholders and potential end-users often....... The findings in this paper are contextualized through a qualitative ethnographic research design based on Danish cemetery users and mourners and their different experiences with and attitudes towards new online grief, mourning and remembrance designs, platforms, services and initiatives. Additionally...... constitute parts of an intricately weaved and interrelated network of practices dealing with death, mourning, memorialization and remembrance. Design pioneering company IDEO'S recent failed attempt to 'redesign death' is an example of how delicate and difficult it is to work with digital and symbolic 'death...

  12. FastBit Reference Manual

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng

    2007-08-02

    An index in a database system is a data structure that utilizes redundant information about the base data to speed up common searching and retrieval operations. Most commonly used indexes are variants of B-trees, such as B+-tree and B*-tree. FastBit implements a set of alternative indexes call compressed bitmap indexes. Compared with B-tree variants, these indexes provide very efficient searching and retrieval operations by sacrificing the efficiency of updating the indexes after the modification of an individual record. In addition to the well-known strengths of bitmap indexes, FastBit has a special strength stemming from the bitmap compression scheme used. The compression method is called the Word-Aligned Hybrid (WAH) code. It reduces the bitmap indexes to reasonable sizes and at the same time allows very efficient bitwise logical operations directly on the compressed bitmaps. Compared with the well-known compression methods such as LZ77 and Byte-aligned Bitmap code (BBC), WAH sacrifices some space efficiency for a significant improvement in operational efficiency. Since the bitwise logical operations are the most important operations needed to answer queries, using WAH compression has been shown to answer queries significantly faster than using other compression schemes. Theoretical analyses showed that WAH compressed bitmap indexes are optimal for one-dimensional range queries. Only the most efficient indexing schemes such as B+-tree and B*-tree have this optimality property. However, bitmap indexes are superior because they can efficiently answer multi-dimensional range queries by combining the answers to one-dimensional queries.

  13. Stinger Enhanced Drill Bits For EGS

    Energy Technology Data Exchange (ETDEWEB)

    Durrand, Christopher J. [Novatek International, Inc., Provo, UT (United States); Skeem, Marcus R. [Novatek International, Inc., Provo, UT (United States); Crockett, Ron B. [Novatek International, Inc., Provo, UT (United States); Hall, David R. [Novatek International, Inc., Provo, UT (United States)

    2013-04-29

    The project objectives were to design, engineer, test, and commercialize a drill bit suitable for drilling in hard rock and high temperature environments (10,000 meters) likely to be encountered in drilling enhanced geothermal wells. The goal is provide a drill bit that can aid in the increased penetration rate of three times over conventional drilling. Novatek has sought to leverage its polycrystalline diamond technology and a new conical cutter shape, known as the Stinger®, for this purpose. Novatek has developed a fixed bladed bit, known as the JackBit®, populated with both shear cutter and Stingers that is currently being tested by major drilling companies for geothermal and oil and gas applications. The JackBit concept comprises a fixed bladed bit with a center indenter, referred to as the Jack. The JackBit has been extensively tested in the lab and in the field. The JackBit has been transferred to a major bit manufacturer and oil service company. Except for the attached published reports all other information is confidential.

  14. Efficient Bit-to-Symbol Likelihood Mappings

    Science.gov (United States)

    Moision, Bruce E.; Nakashima, Michael A.

    2010-01-01

    This innovation is an efficient algorithm designed to perform bit-to-symbol and symbol-to-bit likelihood mappings that represent a significant portion of the complexity of an error-correction code decoder for high-order constellations. Recent implementation of the algorithm in hardware has yielded an 8- percent reduction in overall area relative to the prior design.

  15. Hey! A Mosquito Bit Me! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Español Hey! A Mosquito Bit Me! KidsHealth / For Kids / Hey! A Mosquito Bit Me! Print en español ¡ ...

  16. Transposable Elements and Genome Size Variations in Plants

    Directory of Open Access Journals (Sweden)

    Sung-Il Lee

    2014-09-01

    Full Text Available Although the number of protein-coding genes is not highly variable between plant taxa, the DNA content in their genomes is highly variable, by as much as 2,056-fold from a 1C amount of 0.0648 pg to 132.5 pg. The mean 1C-value in plants is 2.4 pg, and genome size expansion/contraction is lineage-specific in plant taxonomy. Transposable element fractions in plant genomes are also variable, as low as ~3% in small genomes and as high as ~85% in large genomes, indicating that genome size is a linear function of transposable element content. Of the 2 classes of transposable elements, the dynamics of class 1 long terminal repeat (LTR retrotransposons is a major contributor to the 1C value differences among plants. The activity of LTR retrotransposons is under the control of epigenetic suppressing mechanisms. Also, genome-purging mechanisms have been adopted to counter-balance the genome size amplification. With a wealth of information on whole-genome sequences in plant genomes, it was revealed that several genome-purging mechanisms have been employed, depending on plant taxa. Two genera, Lilium and Fritillaria, are known to have large genomes in angiosperms. There were twice times of concerted genome size evolutions in the family Liliaceae during the divergence of the current genera in Liliaceae. In addition to the LTR retrotransposons, non-LTR retrotransposons and satellite DNAs contributed to the huge genomes in the two genera by possible failure of genome counter-balancing mechanisms.

  17. Roadmap for annotating transposable elements in eukaryote genomes.

    Science.gov (United States)

    Permal, Emmanuelle; Flutre, Timothée; Quesneville, Hadi

    2012-01-01

    Current high-throughput techniques have made it feasible to sequence even the genomes of non-model organisms. However, the annotation process now represents a bottleneck to genome analysis, especially when dealing with transposable elements (TE). Combined approaches, using both de novo and knowledge-based methods to detect TEs, are likely to produce reasonably comprehensive and sensitive results. This chapter provides a roadmap for researchers involved in genome projects to address this issue. At each step of the TE annotation process, from the identification of TE families to the annotation of TE copies, we outline the tools and good practices to be used.

  18. High bit depth infrared image compression via low bit depth codecs

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Mantel, Claire; Forchhammer, Søren

    Future infrared remote sensing systems, such as monitoring of the Earth's environment by satellites, infrastructure inspection by unmanned airborne vehicles etc., will require 16 bit depth infrared images to be compressed and stored or transmitted for further analysis. Such systems are equipped...... with low power embedded platforms where image or video data is compressed by a hardware block called the video processing unit (VPU). However, in many cases using two 8-bit VPUs can provide advantages compared with using higher bit depth image compression directly. We propose to compress 16 bit depth...... images via 8 bit depth codecs in the following way. First, an input 16 bit depth image is mapped into 8 bit depth images, e.g., the first image contains only the most significant bytes (MSB image) and the second one contains only the least significant bytes (LSB image). Then each image is compressed...

  19. Programming 16-Bit PIC Microcontrollers in C Learning to Fly the PIC 24

    CERN Document Server

    Di Jasio, Lucio

    2011-01-01

    New in the second edition: * MPLAB X support and MPLAB C for the PIC24F v3 and later libraries * I2C™ interface * 100% assembly free solutions * Improved video, PAL/NTSC * Improved audio, RIFF files decoding * PIC24F GA1, GA2, GB1 and GB2 support   Most readers will associate Microchip's name with the ubiquitous 8-bit PIC microcontrollers but it is the new 16-bit PIC24F family that is truly stealing the scene. Orders of magnitude increases of performance, memory size and the rich peripheral set make programming these devices in C a must. This new guide by Microchip insid

  20. Text Encryption Scheme Realized with a Chaotic Pseudo-Random Bit Generator

    Directory of Open Access Journals (Sweden)

    Ch. K. Volos

    2013-09-01

    Full Text Available In this work a new encryption scheme, which is realized with a Chaotic Pseudo-Random Bit Generator (CPRBG based on a Logistic map, is presented. The proposed system is used for encrypting text files for the purpose of creating secure data bases. The Logistic map is the most studied discrete nonlinear map because it has been used in many scientific fields. Also, the fact, that this discrete map has a known algebraic distribution, made the Logistic map a good candidate for use in the design of random bit generators. The proposed CPRBG, which is very easily implemented, uses the X-OR function, in the bit sequences, that are produced by two Logistic maps with different initial conditions and system’s parameters, to achieve better results concerning the “randomness” of the produced bits sequence. The detailed results of the statistical testing on generated bit sequences, done by the most well known tests of randomness: the FIPS-140-2 suite tests, confirmed the specific characteristics expected of random bit sequences.

  1. Bit-string scattering theory

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, H.P.

    1990-01-29

    We construct discrete space-time coordinates separated by the Lorentz-invariant intervals h/mc in space and h/mc{sup 2} in time using discrimination (XOR) between pairs of independently generated bit-strings; we prove that if this space is homogeneous and isotropic, it can have only 1, 2 or 3 spacial dimensions once we have related time to a global ordering operator. On this space we construct exact combinatorial expressions for free particle wave functions taking proper account of the interference between indistinguishable alternative paths created by the construction. Because the end-points of the paths are fixed, they specify completed processes; our wave functions are born collapsed''. A convenient way to represent this model is in terms of complex amplitudes whose squares give the probability for a particular set of observable processes to be completed. For distances much greater than h/mc and times much greater than h/mc{sup 2} our wave functions can be approximated by solutions of the free particle Dirac and Klein-Gordon equations. Using a eight-counter paradigm we relate this construction to scattering experiments involving four distinguishable particles, and indicate how this can be used to calculate electromagnetic and weak scattering processes. We derive a non-perturbative formula relating relativistic bound and resonant state energies to mass ratios and coupling constants, equivalent to our earlier derivation of the Bohr relativistic formula for hydrogen. Using the Fermi-Yang model of the pion as a relativistic bound state containing a nucleon-antinucleon pair, we find that (G{sub {pi}N}{sup 2}){sup 2} = (2m{sub N}/m{sub {pi}}){sup 2} {minus} 1. 21 refs., 1 fig.

  2. Bit-string scattering theory

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1990-01-01

    We construct discrete space-time coordinates separated by the Lorentz-invariant intervals h/mc in space and h/mc 2 in time using discrimination (XOR) between pairs of independently generated bit-strings; we prove that if this space is homogeneous and isotropic, it can have only 1, 2 or 3 spacial dimensions once we have related time to a global ordering operator. On this space we construct exact combinatorial expressions for free particle wave functions taking proper account of the interference between indistinguishable alternative paths created by the construction. Because the end-points of the paths are fixed, they specify completed processes; our wave functions are ''born collapsed''. A convenient way to represent this model is in terms of complex amplitudes whose squares give the probability for a particular set of observable processes to be completed. For distances much greater than h/mc and times much greater than h/mc 2 our wave functions can be approximated by solutions of the free particle Dirac and Klein-Gordon equations. Using a eight-counter paradigm we relate this construction to scattering experiments involving four distinguishable particles, and indicate how this can be used to calculate electromagnetic and weak scattering processes. We derive a non-perturbative formula relating relativistic bound and resonant state energies to mass ratios and coupling constants, equivalent to our earlier derivation of the Bohr relativistic formula for hydrogen. Using the Fermi-Yang model of the pion as a relativistic bound state containing a nucleon-antinucleon pair, we find that (G πN 2 ) 2 = (2m N /m π ) 2 - 1. 21 refs., 1 fig

  3. Transposed genes in Arabidopsis are often associated with flanking repeats.

    Directory of Open Access Journals (Sweden)

    Margaret R Woodhouse

    2010-05-01

    Full Text Available Much of the eukaryotic genome is known to be mobile, largely due to the movement of transposons and other parasitic elements. Recent work in plants and Drosophila suggests that mobility is also a feature of many nontransposon genes and gene families. Indeed, analysis of the Arabidopsis genome suggested that as many as half of all genes had moved to unlinked positions since Arabidopsis diverged from papaya roughly 72 million years ago, and that these mobile genes tend to fall into distinct gene families. However, the mechanism by which single gene transposition occurred was not deduced. By comparing two closely related species, Arabidopsis thaliana and Arabidopsis lyrata, we sought to determine the nature of gene transposition in Arabidopsis. We found that certain categories of genes are much more likely to have transposed than others, and that many of these transposed genes are flanked by direct repeat sequence that was homologous to sequence within the orthologous target site in A. lyrata and which was predominantly genic in identity. We suggest that intrachromosomal recombination between tandemly duplicated sequences, and subsequent insertion of the circular product, is the predominant mechanism of gene transposition.

  4. Gene vector and transposable element behavior in mosquitoes.

    Science.gov (United States)

    O'Brochta, David A; Sethuraman, Nagaraja; Wilson, Raymond; Hice, Robert H; Pinkerton, Alexandra C; Levesque, Cynthia S; Bideshi, Dennis K; Jasinskiene, Nijole; Coates, Craig J; James, Anthony A; Lehane, Michael J; Atkinson, Peter W

    2003-11-01

    The development of efficient germ-line transformation technologies for mosquitoes has increased the ability of entomologists to find, isolate and analyze genes. The utility of the currently available systems will be determined by a number of factors including the behavior of the gene vectors during the initial integration event and their behavior after chromosomal integration. Post-integration behavior will determine whether the transposable elements being employed currently as primary gene vectors will be useful as gene-tagging and enhancer-trapping agents. The post-integration behavior of existing insect vectors has not been extensively examined. Mos1 is useful as a primary germ-line transformation vector in insects but is inefficiently remobilized in Drosophila melanogaster and Aedes aegypti. Hermes transforms D. melanogaster efficiently and can be remobilized in this species. This element is also useful for creating transgenic A. aegypti, but its mode of integration in mosquitoes results in the insertion of flanking plasmid DNA. Hermes can be remobilized in the soma of A. aegypti and transposes using a common cut-and-paste mechanism; however, the element does not remobilize in the germ line. piggyBac can be used to create transgenic mosquitoes and occasionally integrates using a mechanism other than a simple cut-and-paste mechanism. Preliminary data suggest that remobilization is infrequent. Minos also functions in mosquitoes and, like the other gene vectors, appears to remobilize inefficiently following integration. These results have implications for future gene vector development efforts and applications.

  5. IMPACT OF TRANSPOSING THE STRATEGIC OBJECTIVES ON SUPPLY EFFICIENCY

    Directory of Open Access Journals (Sweden)

    Adam Kolinski

    2016-12-01

    Full Text Available Performance measurement is the basis of management with regard to controlling activities of an enterprise. Development of appropriate indicators and measurement techniques lead to many problems. The majority of enterprises begin to evaluate the efficiency, by the implementation of financial indicators that are practically incalculable. Only at a later stage, are measures used that are related to the specific problems and priorities of the process at the operational level. As a result, in most cases there is an inconsistency or it is almost impossible to manage the measurement system, which can lead to the opposite of the desired effect, and hence to a deterioration of efficiency. In order to create a coherent system of performance measures, the cause and effect at different levels of business management need to be linked. Controlling activities which are aimed at ensuring enterprise efficiency in terms of assumed goals can be helpful. The close link between strategic and operational levels enables deviation analysis of individual values of the plan at the tactical level and operational level. The compatibility of activities is evaluated on the basis of identifying strategic objectives that need to be transposed to the operational level. This article presents the problem of transposing the strategic objectives of the supply process to performance measures at the operational level and proposal of an indicator system of supply efficiency at the operational level. The main research problem of this article is to propose and develop a system of indicators and metrics of evaluation efficiency in the supply process.

  6. Reducing Bits in Electrodeposition Process of Commercial Vehicle - A Case Study

    Science.gov (United States)

    Rahim, Nabiilah Ab; Hamedon, Zamzuri; Mohd Turan, Faiz; Iskandar, Ismed

    2016-02-01

    Painting process is critical in commercial vehicle manufacturing process for protection and decorative. The good quality on painted body is important to reduce repair cost and achieve customer satisfaction. In order to achieve the good quality, it is important to reduce the defect at the first process in painting process which is electrodeposition process. The Pareto graph and cause and effect diagram in the seven QC tools is utilized to reduce the electrodeposition defects. The main defects in the electrodeposition process in this case study are the bits. The 55% of the bits are iron filings. The iron filings which come from the metal assembly process at the body shop are minimised by controlling the spot welding parameter, defect control and standard body cleaning process. However the iron filings are still remained on the body and carry over to the paint shop. The remained iron filings on the body are settled inside the dipping tank and removed by filtration system and magnetic separation. The implementation of filtration system and magnetic separation improved 27% of bits and reduced 42% of sanding man hour with a total saving of RM38.00 per unit.

  7. BitPAl: a bit-parallel, general integer-scoring sequence alignment algorithm.

    Science.gov (United States)

    Loving, Joshua; Hernandez, Yozen; Benson, Gary

    2014-11-15

    Mapping of high-throughput sequencing data and other bulk sequence comparison applications have motivated a search for high-efficiency sequence alignment algorithms. The bit-parallel approach represents individual cells in an alignment scoring matrix as bits in computer words and emulates the calculation of scores by a series of logic operations composed of AND, OR, XOR, complement, shift and addition. Bit-parallelism has been successfully applied to the longest common subsequence (LCS) and edit-distance problems, producing fast algorithms in practice. We have developed BitPAl, a bit-parallel algorithm for general, integer-scoring global alignment. Integer-scoring schemes assign integer weights for match, mismatch and insertion/deletion. The BitPAl method uses structural properties in the relationship between adjacent scores in the scoring matrix to construct classes of efficient algorithms, each designed for a particular set of weights. In timed tests, we show that BitPAl runs 7-25 times faster than a standard iterative algorithm. Source code is freely available for download at http://lobstah.bu.edu/BitPAl/BitPAl.html. BitPAl is implemented in C and runs on all major operating systems. jloving@bu.edu or yhernand@bu.edu or gbenson@bu.edu Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press.

  8. Bit Loading Algorithms for Cooperative OFDM Systems

    Directory of Open Access Journals (Sweden)

    Gui Bo

    2008-01-01

    Full Text Available Abstract We investigate the resource allocation problem for an OFDM cooperative network with a single source-destination pair and multiple relays. Assuming knowledge of the instantaneous channel gains for all links in the entire network, we propose several bit and power allocation schemes aiming at minimizing the total transmission power under a target rate constraint. First, an optimal and efficient bit loading algorithm is proposed when the relay node uses the same subchannel to relay the information transmitted by the source node. To further improve the performance gain, subchannel permutation, in which the subchannels are reallocated at relay nodes, is considered. An optimal subchannel permutation algorithm is first proposed and then an efficient suboptimal algorithm is considered to achieve a better complexity-performance tradeoff. A distributed bit loading algorithm is also proposed for ad hoc networks. Simulation results show that significant performance gains can be achieved by the proposed bit loading algorithms, especially when subchannel permutation is employed.

  9. FastBit: Interactively Searching Massive Data

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Ahern, Sean; Bethel, E. Wes; Chen, Jacqueline; Childs, Hank; Cormier-Michel, Estelle; Geddes, Cameron; Gu, Junmin; Hagen, Hans; Hamann, Bernd; Koegler, Wendy; Lauret, Jerome; Meredith, Jeremy; Messmer, Peter; Otoo, Ekow; Perevoztchikov, Victor; Poskanzer, Arthur; Prabhat,; Rubel, Oliver; Shoshani, Arie; Sim, Alexander; Stockinger, Kurt; Weber, Gunther; Zhang, Wei-Ming

    2009-06-23

    As scientific instruments and computer simulations produce more and more data, the task of locating the essential information to gain insight becomes increasingly difficult. FastBit is an efficient software tool to address this challenge. In this article, we present a summary of the key underlying technologies, namely bitmap compression, encoding, and binning. Together these techniques enable FastBit to answer structured (SQL) queries orders of magnitude faster than popular database systems. To illustrate how FastBit is used in applications, we present three examples involving a high-energy physics experiment, a combustion simulation, and an accelerator simulation. In each case, FastBit significantly reduces the response time and enables interactive exploration on terabytes of data.

  10. Tracking Contraband Files Transmitted Using Bittorrent

    Science.gov (United States)

    Schrader, Karl; Mullins, Barry; Peterson, Gilbert; Mills, Robert

    This paper describes a digital forensic tool that uses an FPGA-based embedded software application to identify and track contraband digital files shared using the BitTorrent protocol. The system inspects each packet on a network for a BitTorrent Handshake message, extracts the “info hash” of the file being shared, compares the hash against a list of known contraband files and, in the event of a match, adds the message to a log file for forensic analysis. Experiments demonstrate that the system is able to successfully capture and process BitTorrent Handshake messages with a probability of at least 99.0% under a network traffic load of 89.6 Mbps on a 100 Mbps network.

  11. Criteria for core sampling bit temperature monitor

    International Nuclear Information System (INIS)

    Francis, P.M.

    1994-08-01

    A temperature monitoring device needs to be developed for the tank core sampling trucks. It will provide an additional indication of safe drill bit temperatures and give the operator a better feel for the effects of changing drill settings. This document defines the criteria for the bit monitoring system, including performance requirements, information on the core sampling system, and other conditions that may be encountered

  12. Bit-Grooming: Shave Your Bits with Razor-sharp Precision

    Science.gov (United States)

    Zender, C. S.; Silver, J.

    2017-12-01

    Lossless compression can reduce climate data storage by 30-40%. Further reduction requires lossy compression that also reduces precision. Fortunately, geoscientific models and measurements generate false precision (scientifically meaningless data bits) that can be eliminated without sacrificing scientifically meaningful data. We introduce Bit Grooming, a lossy compression algorithm that removes the bloat due to false-precision, those bits and bytes beyond the meaningful precision of the data.Bit Grooming is statistically unbiased, applies to all floating point numbers, and is easy to use. Bit-Grooming reduces geoscience data storage requirements by 40-80%. We compared Bit Grooming to competitors Linear Packing, Layer Packing, and GRIB2/JPEG2000. The other compression methods have the edge in terms of compression, but Bit Grooming is the most accurate and certainly the most usable and portable.Bit Grooming provides flexible and well-balanced solutions to the trade-offs among compression, accuracy, and usability required by lossy compression. Geoscientists could reduce their long term storage costs, and show leadership in the elimination of false precision, by adopting Bit Grooming.

  13. SPTEdb: a database for transposable elements in salicaceous plants

    Science.gov (United States)

    Jia, Zirui; Xiao, Yao; Ma, Wenjun; Wang, Junhui

    2018-01-01

    Abstract Although transposable elements (TEs) play significant roles in structural, functional and evolutionary dynamics of the salicaceous plants genome and the accurate identification, definition and classification of TEs are still inadequate. In this study, we identified 18 393 TEs from Populus trichocarpa, Populus euphratica and Salix suchowensis using a combination of signature-based, similarity-based and De novo method, and annotated them into 1621 families. A comprehensive and user-friendly web-based database, SPTEdb, was constructed and served for researchers. SPTEdb enables users to browse, retrieve and download the TEs sequences from the database. Meanwhile, several analysis tools, including BLAST, HMMER, GetORF and Cut sequence, were also integrated into SPTEdb to help users to mine the TEs data easily and effectively. In summary, SPTEdb will facilitate the study of TEs biology and functional genomics in salicaceous plants. Database URL: http://genedenovoweb.ticp.net:81/SPTEdb/index.php PMID:29688371

  14. Identification and frequency of transposable elements in Eucalyptus

    Directory of Open Access Journals (Sweden)

    Maurício Bacci Jr.

    2005-01-01

    Full Text Available Transposable elements (TE are major components of eukaryotic genomes and involved in cell regulation and organism evolution. We have analyzed 123,889 expressed sequence tags of the Eucalyptus Genome Project database and found 124 sequences representing 76 TE in 9 groups, of which copia, MuDR and FAR1 groups were the most abundant. The low amount of sequences of TE may reflect the high efficiency of repression of these elements, a process that is called TE silencing. Frequency of groups of TE in Eucalyptus libraries which were prepared with different tissues or physiologic conditions from seedlings or adult plants indicated that developing plants experience the expression of a much wider spectrum of TE groups than that seen in adult plants. These are preliminary results that identify the most relevant TE groups involved with Eucalyptus development, which is important for industrial wood production.

  15. Transposable elements in TDP-43-mediated neurodegenerative disorders.

    Directory of Open Access Journals (Sweden)

    Wanhe Li

    Full Text Available Elevated expression of specific transposable elements (TEs has been observed in several neurodegenerative disorders. TEs also can be active during normal neurogenesis. By mining a series of deep sequencing datasets of protein-RNA interactions and of gene expression profiles, we uncovered extensive binding of TE transcripts to TDP-43, an RNA-binding protein central to amyotrophic lateral sclerosis (ALS and frontotemporal lobar degeneration (FTLD. Second, we find that association between TDP-43 and many of its TE targets is reduced in FTLD patients. Third, we discovered that a large fraction of the TEs to which TDP-43 binds become de-repressed in mouse TDP-43 disease models. We propose the hypothesis that TE mis-regulation contributes to TDP-43 related neurodegenerative diseases.

  16. The impact of transposable elements on mammalian development

    Science.gov (United States)

    Garcia-Perez, Jose L.; Widmann, Thomas J.; Adams, Ian R.

    2018-01-01

    Summary Despite often being classified as selfish or junk DNA, transposable elements (TEs) are a group of abundant genetic sequences that significantly impact on mammalian development and genome regulation. In recent years, our understanding of how pre-existing TEs affect genome architecture, gene regulatory networks and protein function during mammalian embryogenesis has dramatically expanded. In addition, the mobilization of active TEs in selected cell types has been shown to generate genetic variation during development and in fully differentiated tissues. Importantly, the ongoing domestication and evolution of TEs appears to provide a rich source of regulatory elements, functional modules and genetic variation that fuels the evolution of mammalian developmental processes. Here, we review the functional impact that TEs exert on mammalian developmental processes and how the somatic activity of TEs can influence gene regulatory networks. PMID:27875251

  17. Potential roles for transposable elements in creating imprinted expression.

    Science.gov (United States)

    Anderson, Sarah N; Springer, Nathan M

    2018-02-13

    Changes in gene expression can have profound effects on phenotype. Nature has provided many complex patterns of gene regulation such as imprinting. Imprinted genes exhibit differences in the expression of the maternal and paternal alleles, even though they reside in the same nucleus with access to the same trans-acting factors. Significant attention has been focused on the potential reasons that imprinted expression could be beneficial and stabilized by selection. However, less attention has focused on understanding how imprinted expression might arise or decay. We discuss the evidence for frequent turnover of imprinted expression based on evolutionary analyses in plants and the potential role for transposable elements (TEs) in creating imprinted expression patterns. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Transposing, Transforming and Transcending Tradition in Creative Digital Media

    DEFF Research Database (Denmark)

    Prager, Phillip; Thomas, Maureen; Selsjord, Marianne

    2015-01-01

    and storytelling arts combine to create rich, complex, and engaging moving-image based artworks with wide appeal. It examines how dramatist and interactive media artist Maureen Thomas and 3D media artist and conservator Marianne Selsjord deploy creative digital technologies to transpose, transform, and transcend......How can digital media technologies, contemporary theories of creativity, and tradition combine to develop the aesthetics of computer-based art today and in the future? Through contextualised case-studies, this chapter investigates how games, information technologies, and traditional visual...... pre-page arts and crafts for the digital era, making fresh work for new audiences. Researcher in digital aesthetics, creative cognition, and play behaviour Dr. Phillip Prager examines how such work is conducive to creative insight and worthwhile play, discussing its remediation of some...

  19. Transposable elements and small RNAs: Genomic fuel for species diversity.

    Science.gov (United States)

    Hoffmann, Federico G; McGuire, Liam P; Counterman, Brian A; Ray, David A

    2015-01-01

    While transposable elements (TE) have long been suspected of involvement in species diversification, identifying specific roles has been difficult. We recently found evidence of TE-derived regulatory RNAs in a species-rich family of bats. The TE-derived small RNAs are temporally associated with the burst of species diversification, suggesting that they may have been involved in the processes that led to the diversification. In this commentary, we expand on the ideas that were briefly touched upon in that manuscript. Specifically, we suggest avenues of research that may help to identify the roles that TEs may play in perturbing regulatory pathways. Such research endeavors may serve to inform evolutionary biologists of the ways that TEs have influenced the genomic and taxonomic diversity around us.

  20. Insights into the transposable mobilome of Paracoccus spp. (Alphaproteobacteria.

    Directory of Open Access Journals (Sweden)

    Lukasz Dziewit

    Full Text Available Several trap plasmids (enabling positive selection of transposition events were used to identify a pool of functional transposable elements (TEs residing in bacteria of the genus Paracoccus (Alphaproteobacteria. Complex analysis of 25 strains representing 20 species of this genus led to the capture and characterization of (i 37 insertion sequences (ISs representing 9 IS families (IS3, IS5, IS6, IS21, IS66, IS256, IS1182, IS1380 and IS1634, (ii a composite transposon Tn6097 generated by two copies of the ISPfe2 (IS1634 family containing two predicted genetic modules, involved in the arginine deiminase pathway and daunorubicin/doxorubicin resistance, (iii 3 non-composite transposons of the Tn3 family, including Tn5393 carrying streptomycin resistance and (iv a transposable genomic island TnPpa1 (45 kb. Some of the elements (e.g. Tn5393, Tn6097 and ISs of the IS903 group of the IS5 family were shown to contain strong promoters able to drive transcription of genes placed downstream of the target site of transposition. Through the application of trap plasmid pCM132TC, containing a promoterless tetracycline resistance reporter gene, we identified five ways in which transposition can supply promoters to transcriptionally silent genes. Besides highlighting the diversity and specific features of several TEs, the analyses performed in this study have provided novel and interesting information on (i the dynamics of the process of transposition (e.g. the unusually high frequency of transposition of TnPpa1 and (ii structural changes in DNA mediated by transposition (e.g. the generation of large deletions in the recipient molecule upon transposition of ISPve1 of the IS21 family. We also demonstrated the great potential of TEs and transposition in the generation of diverse phenotypes as well as in the natural amplification and dissemination of genetic information (of adaptative value by horizontal gene transfer, which is considered the driving force of

  1. DPTEdb, an integrative database of transposable elements in dioecious plants.

    Science.gov (United States)

    Li, Shu-Fen; Zhang, Guo-Jun; Zhang, Xue-Jin; Yuan, Jin-Hong; Deng, Chuan-Liang; Gu, Lian-Feng; Gao, Wu-Jun

    2016-01-01

    Dioecious plants usually harbor 'young' sex chromosomes, providing an opportunity to study the early stages of sex chromosome evolution. Transposable elements (TEs) are mobile DNA elements frequently found in plants and are suggested to play important roles in plant sex chromosome evolution. The genomes of several dioecious plants have been sequenced, offering an opportunity to annotate and mine the TE data. However, comprehensive and unified annotation of TEs in these dioecious plants is still lacking. In this study, we constructed a dioecious plant transposable element database (DPTEdb). DPTEdb is a specific, comprehensive and unified relational database and web interface. We used a combination of de novo, structure-based and homology-based approaches to identify TEs from the genome assemblies of previously published data, as well as our own. The database currently integrates eight dioecious plant species and a total of 31 340 TEs along with classification information. DPTEdb provides user-friendly web interfaces to browse, search and download the TE sequences in the database. Users can also use tools, including BLAST, GetORF, HMMER, Cut sequence and JBrowse, to analyze TE data. Given the role of TEs in plant sex chromosome evolution, the database will contribute to the investigation of TEs in structural, functional and evolutionary dynamics of the genome of dioecious plants. In addition, the database will supplement the research of sex diversification and sex chromosome evolution of dioecious plants.Database URL: http://genedenovoweb.ticp.net:81/DPTEdb/index.php. © The Author(s) 2016. Published by Oxford University Press.

  2. The Intertwining of Transposable Elements and Non-Coding RNAs

    Directory of Open Access Journals (Sweden)

    Nicholas Delihas

    2013-06-01

    Full Text Available Growing evidence shows a close association of transposable elements (TE with non-coding RNAs (ncRNA, and a significant number of small ncRNAs originate from TEs. Further, ncRNAs linked with TE sequences participate in a wide-range of regulatory functions. Alu elements in particular are critical players in gene regulation and molecular pathways. Alu sequences embedded in both long non-coding RNAs (lncRNA and mRNAs form the basis of targeted mRNA decay via short imperfect base-pairing. Imperfect pairing is prominent in most ncRNA/target RNA interactions and found throughout all biological kingdoms. The piRNA-Piwi complex is multifunctional, but plays a major role in protection against invasion by transposons. This is an RNA-based genetic immune system similar to the one found in prokaryotes, the CRISPR system. Thousands of long intergenic non-coding RNAs (lincRNAs are associated with endogenous retrovirus LTR transposable elements in human cells. These TEs can provide regulatory signals for lincRNA genes. A surprisingly large number of long circular ncRNAs have been discovered in human fibroblasts. These serve as “sponges” for miRNAs. Alu sequences, encoded in introns that flank exons are proposed to participate in RNA circularization via Alu/Alu base-pairing. Diseases are increasingly found to have a TE/ncRNA etiology. A single point mutation in a SINE/Alu sequence in a human long non-coding RNA leads to brainstem atrophy and death. On the other hand, genomic clusters of repeat sequences as well as lncRNAs function in epigenetic regulation. Some clusters are unstable, which can lead to formation of diseases such as facioscapulohumeral muscular dystrophy. The future may hold more surprises regarding diseases associated with ncRNAs andTEs.

  3. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  4. High bit depth infrared image compression via low bit depth codecs

    Science.gov (United States)

    Belyaev, Evgeny; Mantel, Claire; Forchhammer, Søren

    2017-08-01

    Future infrared remote sensing systems, such as monitoring of the Earth's environment by satellites, infrastructure inspection by unmanned airborne vehicles etc., will require 16 bit depth infrared images to be compressed and stored or transmitted for further analysis. Such systems are equipped with low power embedded platforms where image or video data is compressed by a hardware block called the video processing unit (VPU). However, in many cases using two 8-bit VPUs can provide advantages compared with using higher bit depth image compression directly. We propose to compress 16 bit depth images via 8 bit depth codecs in the following way. First, an input 16 bit depth image is mapped into 8 bit depth images, e.g., the first image contains only the most significant bytes (MSB image) and the second one contains only the least significant bytes (LSB image). Then each image is compressed by an image or video codec with 8 bits per pixel input format. We analyze how the compression parameters for both MSB and LSB images should be chosen to provide the maximum objective quality for a given compression ratio. Finally, we apply the proposed infrared image compression method utilizing JPEG and H.264/AVC codecs, which are usually available in efficient implementations, and compare their rate-distortion performance with JPEG2000, JPEG-XT and H.265/HEVC codecs supporting direct compression of infrared images in 16 bit depth format. A preliminary result shows that two 8 bit H.264/AVC codecs can achieve similar result as 16 bit HEVC codec.

  5. Useful parasites: the evolutionary biology and biotechnology applications of transposable elements.

    Science.gov (United States)

    Bonchev, Georgi N

    2016-12-01

    Transposable elements usually comprise the most abundant nongenic fraction of eukaryotic genomes. Because of their capacity to selfreplicate and to induce a wide range of mutations, transposable elements have long been considered as 'parasitic' or 'selfish'. Today, we recognize that the findings about genomic changes affected by transposable elements have considerably altered our view of the ways in which genomes evolve and work. Numerous studies have provided evidences that mobile elements have the potential to act as agents of evolution by increasing, rearranging and diversifying the genetic repertoire of their hosts. With large-scale sequencing becoming increasingly available, more and more scientists come across transposable element sequences in their data. I will provide examples that transposable elements, although having signatures of 'selfish' DNA, play a significant biological role in the maintainance of genome integrity and providing novel regulatoty networks. These features, along with the transpositional and mutagenic capacity to produce a raw genetic diversity, make the genome mobile fraction, a key player in species adaptation and microevolution. The last but not least, transposable elements stand as informative DNA markers that may complement other conventional DNA markers. Altogether, transposable elements represent a promising, but still largely unexplored research niche and deserve to be included into the agenda of molecular ecologists, evolutionary geneticists, conservation biologists and plant breeders.

  6. Stochastic p-Bits for Invertible Logic

    Directory of Open Access Journals (Sweden)

    Kerem Yunus Camsari

    2017-07-01

    Full Text Available Conventional semiconductor-based logic and nanomagnet-based memory devices are built out of stable, deterministic units such as standard metal-oxide semiconductor transistors, or nanomagnets with energy barriers in excess of ≈40–60  kT. In this paper, we show that unstable, stochastic units, which we call “p-bits,” can be interconnected to create robust correlations that implement precise Boolean functions with impressive accuracy, comparable to standard digital circuits. At the same time, they are invertible, a unique property that is absent in standard digital circuits. When operated in the direct mode, the input is clamped, and the network provides the correct output. In the inverted mode, the output is clamped, and the network fluctuates among all possible inputs that are consistent with that output. First, we present a detailed implementation of an invertible gate to bring out the key role of a single three-terminal transistorlike building block to enable the construction of correlated p-bit networks. The results for this specific, CMOS-assisted nanomagnet-based hardware implementation agree well with those from a universal model for p-bits, showing that p-bits need not be magnet based: any three-terminal tunable random bit generator should be suitable. We present a general algorithm for designing a Boltzmann machine (BM with a symmetric connection matrix [J] (J_{ij}=J_{ji} that implements a given truth table with p-bits. The [J] matrices are relatively sparse with a few unique weights for convenient hardware implementation. We then show how BM full adders can be interconnected in a partially directed manner (J_{ij}≠J_{ji} to implement large logic operations such as 32-bit binary addition. Hundreds of stochastic p-bits get precisely correlated such that the correct answer out of 2^{33} (≈8×10^{9} possibilities can be extracted by looking at the statistical mode or majority vote of a number of time samples. With perfect

  7. Stochastic p -Bits for Invertible Logic

    Science.gov (United States)

    Camsari, Kerem Yunus; Faria, Rafatul; Sutton, Brian M.; Datta, Supriyo

    2017-07-01

    Conventional semiconductor-based logic and nanomagnet-based memory devices are built out of stable, deterministic units such as standard metal-oxide semiconductor transistors, or nanomagnets with energy barriers in excess of ≈40 - 60 kT . In this paper, we show that unstable, stochastic units, which we call "p -bits," can be interconnected to create robust correlations that implement precise Boolean functions with impressive accuracy, comparable to standard digital circuits. At the same time, they are invertible, a unique property that is absent in standard digital circuits. When operated in the direct mode, the input is clamped, and the network provides the correct output. In the inverted mode, the output is clamped, and the network fluctuates among all possible inputs that are consistent with that output. First, we present a detailed implementation of an invertible gate to bring out the key role of a single three-terminal transistorlike building block to enable the construction of correlated p -bit networks. The results for this specific, CMOS-assisted nanomagnet-based hardware implementation agree well with those from a universal model for p -bits, showing that p -bits need not be magnet based: any three-terminal tunable random bit generator should be suitable. We present a general algorithm for designing a Boltzmann machine (BM) with a symmetric connection matrix [J ] (Ji j=Jj i) that implements a given truth table with p -bits. The [J ] matrices are relatively sparse with a few unique weights for convenient hardware implementation. We then show how BM full adders can be interconnected in a partially directed manner (Ji j≠Jj i) to implement large logic operations such as 32-bit binary addition. Hundreds of stochastic p -bits get precisely correlated such that the correct answer out of 233 (≈8 ×1 09) possibilities can be extracted by looking at the statistical mode or majority vote of a number of time samples. With perfect directivity (Jj i=0 ) a small

  8. Framed bit error rate testing for 100G ethernet equipment

    DEFF Research Database (Denmark)

    Rasmussen, Anders; Ruepp, Sarah Renée; Berger, Michael Stübert

    2010-01-01

    of performing bit error rate testing at 100Gbps. In particular, we show how Bit Error Rate Testing (BERT) can be performed over an aggregated 100G Attachment Unit Interface (CAUI) by encapsulating the test data in Ethernet frames at line speed. Our results show that framed bit error rate testing can...... functionality besides the bit error rate tester....

  9. Using magnetic permeability bits to store information

    Science.gov (United States)

    Timmerwilke, John; Petrie, J. R.; Wieland, K. A.; Mencia, Raymond; Liou, Sy-Hwang; Cress, C. D.; Newburgh, G. A.; Edelstein, A. S.

    2015-10-01

    Steps are described in the development of a new magnetic memory technology, based on states with different magnetic permeability, with the capability to reliably store large amounts of information in a high-density form for decades. The advantages of using the permeability to store information include an insensitivity to accidental exposure to magnetic fields or temperature changes, both of which are known to corrupt memory approaches that rely on remanent magnetization. The high permeability media investigated consists of either films of Metglas 2826 MB (Fe40Ni38Mo4B18) or bilayers of permalloy (Ni78Fe22)/Cu. Regions of films of the high permeability media were converted thermally to low permeability regions by laser or ohmic heating. The permeability of the bits was read by detecting changes of an external 32 Oe probe field using a magnetic tunnel junction 10 μm away from the media. Metglas bits were written with 100 μs laser pulses and arrays of 300 nm diameter bits were read. The high and low permeability bits written using bilayers of permalloy/Cu are not affected by 10 Mrad(Si) of gamma radiation from a 60Co source. An economical route for writing and reading bits as small at 20 nm using a variation of heat assisted magnetic recording is discussed.

  10. The best bits in an iris code.

    Science.gov (United States)

    Hollingsworth, Karen P; Bowyer, Kevin W; Flynn, Patrick J

    2009-06-01

    Iris biometric systems apply filters to iris images to extract information about iris texture. Daugman's approach maps the filter output to a binary iris code. The fractional Hamming distance between two iris codes is computed and decisions about the identity of a person are based on the computed distance. The fractional Hamming distance weights all bits in an iris code equally. However, not all the bits in an iris code are equally useful. Our research is the first to present experiments documenting that some bits are more consistent than others. Different regions of the iris are compared to evaluate their relative consistency, and contrary to some previous research, we find that the middle bands of the iris are more consistent than the inner bands. The inconsistent-bit phenomenon is evident across genders and different filter types. Possible causes of inconsistencies, such as segmentation, alignment issues, and different filters are investigated. The inconsistencies are largely due to the coarse quantization of the phase response. Masking iris code bits corresponding to complex filter responses near the axes of the complex plane improves the separation between the match and nonmatch Hamming distance distributions.

  11. Bits extraction for palmprint template protection with Gabor magnitude and multi-bit quantization

    NARCIS (Netherlands)

    Mu, Meiru; Shao, X.; Ruan, Qiuqi; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2013-01-01

    In this paper, we propose a method of fixed-length binary string extraction (denoted by LogGM_DROBA) from low-resolution palmprint image for developing palmprint template protection technology. In order to extract reliable (stable and discriminative) bits, multi-bit equal-probability-interval

  12. Managing the Number of Tag Bits Transmitted in a Bit-Tracking RFID Collision Resolution Protocol

    Directory of Open Access Journals (Sweden)

    Hugo Landaluce

    2014-01-01

    Full Text Available Radio Frequency Identification (RFID technology faces the problem of message collisions. The coexistence of tags sharing the communication channel degrades bandwidth, and increases the number of bits transmitted. The window methodology, which controls the number of bits transmitted by the tags, is applied to the collision tree (CT protocol to solve the tag collision problem. The combination of this methodology with the bit-tracking technology, used in CT, improves the performance of the window and produces a new protocol which decreases the number of bits transmitted. The aim of this paper is to show how the CT bit-tracking protocol is influenced by the proposed window, and how the performance of the novel protocol improves under different conditions of the scenario. Therefore, we have performed a fair comparison of the CT protocol, which uses bit-tracking to identify the first collided bit, and the new proposed protocol with the window methodology. Simulations results show that the proposed window positively decreases the total number of bits that are transmitted by the tags, and outperforms the CT protocol latency in slow tag data rate scenarios.

  13. Managing the number of tag bits transmitted in a bit-tracking RFID collision resolution protocol.

    Science.gov (United States)

    Landaluce, Hugo; Perallos, Asier; Angulo, Ignacio

    2014-01-08

    Radio Frequency Identification (RFID) technology faces the problem of message collisions. The coexistence of tags sharing the communication channel degrades bandwidth, and increases the number of bits transmitted. The window methodology, which controls the number of bits transmitted by the tags, is applied to the collision tree (CT) protocol to solve the tag collision problem. The combination of this methodology with the bit-tracking technology, used in CT, improves the performance of the window and produces a new protocol which decreases the number of bits transmitted. The aim of this paper is to show how the CT bit-tracking protocol is influenced by the proposed window, and how the performance of the novel protocol improves under different conditions of the scenario. Therefore, we have performed a fair comparison of the CT protocol, which uses bit-tracking to identify the first collided bit, and the new proposed protocol with the window methodology. Simulations results show that the proposed window positively decreases the total number of bits that are transmitted by the tags, and outperforms the CT protocol latency in slow tag data rate scenarios.

  14. SoyTEdb: a comprehensive database of transposable elements in the soybean genome

    Directory of Open Access Journals (Sweden)

    Zhu Liucun

    2010-02-01

    Full Text Available Abstract Background Transposable elements are the most abundant components of all characterized genomes of higher eukaryotes. It has been documented that these elements not only contribute to the shaping and reshaping of their host genomes, but also play significant roles in regulating gene expression, altering gene function, and creating new genes. Thus, complete identification of transposable elements in sequenced genomes and construction of comprehensive transposable element databases are essential for accurate annotation of genes and other genomic components, for investigation of potential functional interaction between transposable elements and genes, and for study of genome evolution. The recent availability of the soybean genome sequence has provided an unprecedented opportunity for discovery, and structural and functional characterization of transposable elements in this economically important legume crop. Description Using a combination of structure-based and homology-based approaches, a total of 32,552 retrotransposons (Class I and 6,029 DNA transposons (Class II with clear boundaries and insertion sites were structurally annotated and clearly categorized, and a soybean transposable element database, SoyTEdb, was established. These transposable elements have been anchored in and integrated with the soybean physical map and genetic map, and are browsable and visualizable at any scale along the 20 soybean chromosomes, along with predicted genes and other sequence annotations. BLAST search and other infrastracture tools were implemented to facilitate annotation of transposable elements or fragments from soybean and other related legume species. The majority (> 95% of these elements (particularly a few hundred low-copy-number families are first described in this study. Conclusion SoyTEdb provides resources and information related to transposable elements in the soybean genome, representing the most comprehensive and the largest manually

  15. Bit-padding information guided channel hopping

    KAUST Repository

    Yang, Yuli

    2011-02-01

    In the context of multiple-input multiple-output (MIMO) communications, we propose a bit-padding information guided channel hopping (BP-IGCH) scheme which breaks the limitation that the number of transmit antennas has to be a power of two based on the IGCH concept. The proposed scheme prescribes different bit-lengths to be mapped onto the indices of the transmit antennas and then uses padding technique to avoid error propagation. Numerical results and comparisons, on both the capacity and the bit error rate performances, are provided and show the advantage of the proposed scheme. The BP-IGCH scheme not only offers lower complexity to realize the design flexibility, but also achieves better performance. © 2011 IEEE.

  16. Ultra low bit-rate speech coding

    CERN Document Server

    Ramasubramanian, V

    2015-01-01

    "Ultra Low Bit-Rate Speech Coding" focuses on the specialized topic of speech coding at very low bit-rates of 1 Kbits/sec and less, particularly at the lower ends of this range, down to 100 bps. The authors set forth the fundamental results and trends that form the basis for such ultra low bit-rates to be viable and provide a comprehensive overview of various techniques and systems in literature to date, with particular attention to their work in the paradigm of unit-selection based segment quantization. The book is for research students, academic faculty and researchers, and industry practitioners in the areas of speech processing and speech coding.

  17. Color characters for white hot string bits

    Science.gov (United States)

    Curtright, Thomas L.; Raha, Sourav; Thorn, Charles B.

    2017-10-01

    The state space of a generic string bit model is spanned by N ×N matrix creation operators acting on a vacuum state. Such creation operators transform in the adjoint representation of the color group U (N ) [or S U (N ) if the matrices are traceless]. We consider a system of b species of bosonic bits and f species of fermionic bits. The string, emerging in the N →∞ limit, identifies P+=m M √{2 } where M is the bit number operator and P-=H √{2 } where H is the system Hamiltonian. We study the thermal properties of this string bit system in the case H =0 , which can be considered the tensionless string limit: the only dynamics is restricting physical states to color singlets. Then the thermal partition function Tr e-β m M can be identified, putting x =e-β m, with a generating function χ0b f(x ), for which the coefficient of xn in its expansion about x =0 is the number of color singlets with bit number M =n . This function is a purely group theoretic object, which is well studied in the literature. We show that at N =∞ this system displays a Hagedorn divergence at x =1 /(b +f ) with ultimate temperature TH=m /ln (b +f ). The corresponding function for finite N is perfectly finite for 0

  18. Introduction to bit slices and microprogramming

    International Nuclear Information System (INIS)

    Van Dam, A.

    1981-01-01

    Bit-slice logic blocks are fourth-generation LSI components which are natural extensions of traditional mulitplexers, registers, decoders, counters, ALUs, etc. Their functionality is controlled by microprogramming, typically to implement CPUs and peripheral controllers where both speed and easy programmability are required for flexibility, ease of implementation and debugging, etc. Processors built from bit-slice logic give the designer an alternative for approaching the programmibility of traditional fixed-instruction-set microprocessors with a speed closer to that of hardwired random logic. (orig.)

  19. Orthodontic correction of a transposed maxillary canine and first premolar in the permanent dentition.

    Science.gov (United States)

    Nishimura, Kazuaki; Nakao, Kimihisa; Aoki, Taijyu; Fuyamada, Mariko; Saito, Keisuke; Goto, Shigemi

    2012-10-01

    The patient was a 16-year-old Japanese girl whose chief complaints were crowding and transposition of the maxillary canine and first premolar. A setup model was used to preoperatively align the teeth in their transposed positions. The amount of postoperative reshaping was estimated for the occlusal surfaces of the teeth. However, the patient did not wish to have her teeth reduced by reshaping or to have composite materials for restorative camouflage. Because she strongly expected alignment of her teeth in the correct intra-arch position, her transposed teeth were corrected without extraction of the transposed teeth. Cone-beam computed tomography was used to obtain more detailed information about the transposition, and the direction of tooth movement was examined. Although the duration of the treatment was long, both the crowns and the roots of the transposed teeth were aligned correctly. Copyright © 2012 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  20. Linear, Constant-rounds Bit-decomposition

    DEFF Research Database (Denmark)

    Reistad, Tord; Toft, Tomas

    2010-01-01

    When performing secure multiparty computation, tasks may often be simple or difficult depending on the representation chosen. Hence, being able to switch representation efficiently may allow more efficient protocols. We present a new protocol for bit-decomposition: converting a ring element x ∈ ℤ M...

  1. Entropy of a bit-shift channel

    NARCIS (Netherlands)

    Baggen, Stan; Balakirsky, Vladimir; Denteneer, Dee; Egner, Sebastian; Hollmann, Henk; Tolhuizen, Ludo; Verbitskiy, Evgeny

    2006-01-01

    We consider a simple transformation (coding) of an iid source called a bit-shift channel. This simple transformation occurs naturally in magnetic or optical data storage. The resulting process is not Markov of any order. We discuss methods of computing the entropy of the transformed process, and

  2. Hey! A Black Widow Spider Bit Me!

    Science.gov (United States)

    ... as soon as you can because they can make you very sick. With an adult's help, wash the bite well with soap and water. Then apply an ice pack to the bite, and try to elevate the area and keep it still to help prevent the ... black widows, you'll want to make sure that's the kind of spider that bit ...

  3. Bit corruption correlation and autocorrelation in a stochastic binary nano-bit system

    Science.gov (United States)

    Sa-nguansin, Suchittra

    2014-10-01

    The corruption process of a binary nano-bit model resulting from an interaction with N stochastically-independent Brownian agents (BAs) is studied with the help of Monte-Carlo simulations and analytic continuum theory to investigate the data corruption process through the measurement of the spatial two-point correlation and the autocorrelation of bit corruption at the origin. By taking into account a more realistic correlation between bits, this work will contribute to the understanding of the soft error or the corruption of data stored in nano-scale devices.

  4. Exploring New Methods of Displaying Bit-Level Quality and Other Flags for MODIS Data

    Science.gov (United States)

    Khalsa, Siri Jodha Singh; Weaver, Ron

    2003-01-01

    The NASA Distributed Active Archive Center (DAAC) at the National Snow and Ice Data Center (NSIDC) archives and distributes snow and sea ice products derived from the MODerate resolution Imaging Spectroradiometer (MODIS) on board NASA's Terra and Aqua satellites. All MODIS standard products are in the Earth Observing System version of the Hierarchal Data Format (HDF-EOS). The MODIS science team has packed a wealth of information into each HDF-EOS file. In addition to the science data arrays containing the geophysical product, there are often pixel-level Quality Assurance arrays which are important for understanding and interpreting the science data. Currently, researchers are limited in their ability to access and decode information stored as individual bits in many of the MODIS science products. Commercial and public domain utilities give users access, in varying degrees, to the elements inside MODIS HDF-EOS files. However, when attempting to visualize the data, users are confronted with the fact that many of the elements actually represent eight different 1-bit arrays packed into a single byte array. This project addressed the need for researchers to access bit-level information inside MODIS data files. In an previous NASA-funded project (ESDIS Prototype ID 50.0) we developed a visualization tool tailored to polar gridded HDF-EOS data set. This tool,called the Polar researchers to access, geolocate, visualize, and subset data that originate from different sources and have different spatial resolutions but which are placed on a common polar grid. The bit-level visualization function developed under this project was added to PHDIS, resulting in a versatile tool that serves a variety of needs. We call this the EOS Imaging Tool.

  5. Generating and manipulating transgenic animals using transposable elements

    Directory of Open Access Journals (Sweden)

    Largaespada David A

    2003-11-01

    Full Text Available Abstract Transposable elements, or transposons, have played a significant role in the history of biological research. They have had a major influence on the structure of genomes during evolution, they can cause mutations, and their study led to the concept of so-called "selfish DNA". In addition, transposons have been manipulated as useful gene transfer vectors. While primarily restricted to use in invertebrates, prokaryotes, and plants, it is now clear that transposon technology and biology are just as relevant to the study of vertebrate species. Multiple transposons now have been shown to be active in vertebrates and they can be used for germline transgenesis, somatic cell transgenesis/gene therapy, and random germline insertional mutagenesis. The sophistication of these applications and the number of active elements are likely to increase over the next several years. This review covers the vertebrate-active retrotransposons and transposons that have been well studied and adapted for use as gene transfer agents. General considerations and predictions about the future utility of transposon technology are discussed.

  6. Differential detection of transposable elements between Saccharum species

    Directory of Open Access Journals (Sweden)

    Marislane Carvalho Paz de Souza

    2013-01-01

    Full Text Available Cultivars of sugarcane (Saccharum are hybrids between species S. officinarum (x = 10, 2n = 8x = 80 and S. spontaneum (x=8,2n=5-16x =40-128. These accessions have 100 to 130 chromosomes, 80-85% of which are derived from S. officinarum, 10-15% from S. spontaneum, and 5-10% are possible recombinants between the two genomes. The aim of this study was to analyze the repetition of DNA sequences in S. officinarum and S. spontaneum. For this purpose, genomic DNA from S. officinarum was digested with restriction enzymes and the fragments cloned. Sixty-eight fragments, approximately 500 bp, were cloned, sequenced and had their identity analyzed in NCBI, and in the rice, maize, and sorghum genome databases using BLAST. Twelve clones containing partial transposable elements, one single-copy control, one DNA repetitive clone control and two genome controls were analyzed by DNA hybridization on membrane, using genomic probes from S. officinarum and S. spontaneum. The hybridization experiment revealed that six TEs had a similar repetitive DNA pattern in the genomes of S. officinarum and S. spontaneum, while six TEs were more abundant in the genome of S. officinarum. We concluded that the species S. officinarum and S. spontaneum have differential accumulation LTR retrotransposon families, suggesting distinct insertion or modification patterns.

  7. Massive horizontal transfer of transposable elements in insects.

    Science.gov (United States)

    Peccoud, Jean; Loiseau, Vincent; Cordaux, Richard; Gilbert, Clément

    2017-05-02

    Horizontal transfer (HT) of genetic material is central to the architecture and evolution of prokaryote genomes. Within eukaryotes, the majority of HTs reported so far are transfers of transposable elements (TEs). These reports essentially come from studies focusing on specific lineages or types of TEs. Because of the lack of large-scale survey, the amount and impact of HT of TEs (HTT) in eukaryote evolution, as well as the trends and factors shaping these transfers, are poorly known. Here, we report a comprehensive analysis of HTT in 195 insect genomes, representing 123 genera and 13 of the 28 insect orders. We found that these insects were involved in at least 2,248 HTT events that essentially occurred during the last 10 My. We show that DNA transposons transfer horizontally more often than retrotransposons, and unveil phylogenetic relatedness and geographical proximity as major factors facilitating HTT in insects. Even though our study is restricted to a small fraction of insect biodiversity and to a recent evolutionary timeframe, the TEs we found to be horizontally transferred generated up to 24% (2.08% on average) of all nucleotides of insect genomes. Together, our results establish HTT as a major force shaping insect genome evolution.

  8. Transposable element dynamics among asymbiotic and ectomycorrhizal Amanita fungi.

    Science.gov (United States)

    Hess, Jaqueline; Skrede, Inger; Wolfe, Benjamin E; LaButti, Kurt; Ohm, Robin A; Grigoriev, Igor V; Pringle, Anne

    2014-06-12

    Transposable elements (TEs) are ubiquitous inhabitants of eukaryotic genomes and their proliferation and dispersal shape genome architectures and diversity. Nevertheless, TE dynamics are often explored for one species at a time and are rarely considered in ecological contexts. Recent work with plant pathogens suggests a link between symbiosis and TE abundance. The genomes of pathogenic fungi appear to house an increased abundance of TEs, and TEs are frequently associated with the genes involved in symbiosis. To investigate whether this pattern is general, and relevant to mutualistic plant-fungal symbioses, we sequenced the genomes of related asymbiotic (AS) and ectomycorrhizal (ECM) Amanita fungi. Using methods developed to interrogate both assembled and unassembled sequences, we characterized and quantified TEs across three AS and three ECM species, including the AS outgroup Volvariella volvacea. The ECM genomes are characterized by abundant numbers of TEs, an especially prominent feature of unassembled sequencing libraries. Increased TE activity in ECM species is also supported by phylogenetic analysis of the three most abundant TE superfamilies; phylogenies revealed many radiations within contemporary ECM species. However, the AS species Amanita thiersii also houses extensive amplifications of elements, highlighting the influence of additional evolutionary parameters on TE abundance. Our analyses provide further evidence for a link between symbiotic associations among plants and fungi, and increased TE activity, while highlighting the importance individual species' natural histories may have in shaping genome architecture. © The Author(s) 2014. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  9. Transposable-element associated small RNAs in Bombyx mori genome.

    Directory of Open Access Journals (Sweden)

    Yimei Cai

    Full Text Available Small RNAs are a group of regulatory RNA molecules that control gene expression at transcriptional or post-transcriptional levels among eukaryotes. The silkworm, Bombyx mori L., genome harbors abundant repetitive sequences derived from families of retrotransposons and transposons, which together constitute almost half of the genome space and provide ample resource for biogenesis of the three major small RNA families. We systematically discovered transposable-element (TE-associated small RNAs in B. mori genome based on a deep RNA-sequencing strategy and the effort yielded 182, 788 and 4,990 TE-associated small RNAs in the miRNA, siRNA and piRNA species, respectively. Our analysis suggested that the three small RNA species preferentially associate with different TEs to create sequence and functional diversity, and we also show evidence that a Bombyx non-LTR retrotransposon, bm1645, alone contributes to the generation of TE-associated small RNAs in a very significant way. The fact that bm1645-associated small RNAs partially overlap with each other implies a possibility that this element may be modulated by different mechanisms to generate different products with diverse functions. Taken together, these discoveries expand the small RNA pool in B. mori genome and lead to new knowledge on the diversity and functional significance of TE-associated small RNAs.

  10. Transposable element activity, genome regulation and human health.

    Science.gov (United States)

    Wang, Lu; Jordan, I King

    2018-03-02

    A convergence of novel genome analysis technologies is enabling population genomic studies of human transposable elements (TEs). Population surveys of human genome sequences have uncovered thousands of individual TE insertions that segregate as common genetic variants, i.e. TE polymorphisms. These recent TE insertions provide an important source of naturally occurring human genetic variation. Investigators are beginning to leverage population genomic data sets to execute genome-scale association studies for assessing the phenotypic impact of human TE polymorphisms. For example, the expression quantitative trait loci (eQTL) analytical paradigm has recently been used to uncover hundreds of associations between human TE insertion variants and gene expression levels. These include population-specific gene regulatory effects as well as coordinated changes to gene regulatory networks. In addition, analyses of linkage disequilibrium patterns with previously characterized genome-wide association study (GWAS) trait variants have uncovered TE insertion polymorphisms that are likely causal variants for a variety of common complex diseases. Gene regulatory mechanisms that underlie specific disease phenotypes have been proposed for a number of these trait associated TE polymorphisms. These new population genomic approaches hold great promise for understanding how ongoing TE activity contributes to functionally relevant genetic variation within and between human populations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Measures of extents of laterality for high-frequency ``transposed'' stimuli under conditions of binaural interference

    Science.gov (United States)

    Bernstein, Leslie R.; Trahiotis, Constantine

    2005-09-01

    Our purpose in this study was to determine whether across-frequency binaural interference would occur if ITD-based extents of laterality were measured using high-frequency transposed stimuli as targets. The results of an earlier study [L. R. Bernstein and C. Trahiotis, J. Acoust. Soc. Am. 116, 3062-3069 (2004)], which focused on threshold-ITDs, rather than extents of laterality, suggested that high-frequency transposed stimuli might be ``immune'' to binaural interference effects resulting from the addition of a spectrally remote, low-frequency interferer. In contrast to the earlier findings, the data from this study indicate that high-frequency transposed targets are susceptible to binaural interference. Nevertheless, high-frequency transposed targets, even when presented along with an interferer, yielded greater extents of ITD-based laterality than did high-frequency Gaussian noise targets presented in isolation. That is, the ``enhanced potency'' of ITDs conveyed by transposed stimuli persisted, even in the presence of a low-frequency interferer. Predictions made using an extension of the model of Heller and Trahiotis [L. M. Heller and C. Trahiotis, J. Acoust. Soc. Am. 99, 3632-3637 (1996)] accounted well for across-frequency binaural interference obtained with conventional Gaussian noise targets but, in all but one case, overpredicted the amounts of interference found with the transposed targets.

  12. Whole genome resequencing reveals natural target site preferences of transposable elements in Drosophila melanogaster.

    Directory of Open Access Journals (Sweden)

    Raquel S Linheiro

    Full Text Available Transposable elements are mobile DNA sequences that integrate into host genomes using diverse mechanisms with varying degrees of target site specificity. While the target site preferences of some engineered transposable elements are well studied, the natural target preferences of most transposable elements are poorly characterized. Using population genomic resequencing data from 166 strains of Drosophila melanogaster, we identified over 8,000 new insertion sites not present in the reference genome sequence that we used to decode the natural target preferences of 22 families of transposable element in this species. We found that terminal inverted repeat transposon and long terminal repeat retrotransposon families present clade-specific target site duplications and target site sequence motifs. Additionally, we found that the sequence motifs at transposable element target sites are always palindromes that extend beyond the target site duplication. Our results demonstrate the utility of population genomics data for high-throughput inference of transposable element targeting preferences in the wild and establish general rules for terminal inverted repeat transposon and long terminal repeat retrotransposon target site selection in eukaryotic genomes.

  13. Two research contributions in 64-bit computing: Testing and Applications

    OpenAIRE

    Chang, Victor

    2005-01-01

    Following the release of Windows 64-bit and Redhat Linux 64-bit operating systems (OS) in late April 2005, this is the one of the first 64-bit OS research project completed in a British university. The objective is to investigate (1) the increase/decrease in performance compared to 32-bit computing; (2) the techniques used to develop 64-bit applications; and (3) how 64-bit computing should be used in IT and research organizations to improve their work. This paper summarizes research discoveri...

  14. Watermarking Techniques Using Least Significant Bit Algorithm for Digital Image Security Standard Solution- Based Android

    Directory of Open Access Journals (Sweden)

    Ari Muzakir

    2017-05-01

    Full Text Available Ease of deployment of digital image through the internet has positive and negative sides, especially for owners of the original digital image. The positive side of the ease of rapid deployment is the owner of that image deploys digital image files to various sites in the world address. While the downside is that if there is no copyright that serves as protector of the image it will be very easily recognized ownership by other parties. Watermarking is one solution to protect the copyright and know the results of the digital image. With Digital Image Watermarking, copyright resulting digital image will be protected through the insertion of additional information such as owner information and the authenticity of the digital image. The least significant bit (LSB is one of the algorithm is simple and easy to understand. The results of the simulations carried out using android smartphone shows that the LSB watermarking technique is not able to be seen by naked human eye, meaning there is no significant difference in the image of the original files with images that have been inserted watermarking. The resulting image has dimensions of 640x480 with a bit depth of 32 bits. In addition, to determine the function of the ability of the device (smartphone in processing the image using this application used black box testing. 

  15. Transposable Elements: Powerful Contributors to Angiosperm Evolution and Diversity

    Science.gov (United States)

    Oliver, Keith R.; McComb, Jen A.; Greene, Wayne K.

    2013-01-01

    Transposable elements (TEs) are a dominant feature of most flowering plant genomes. Together with other accepted facilitators of evolution, accumulating data indicate that TEs can explain much about their rapid evolution and diversification. Genome size in angiosperms is highly correlated with TE content and the overwhelming bulk (>80%) of large genomes can be composed of TEs. Among retro-TEs, long terminal repeats (LTRs) are abundant, whereas DNA-TEs, which are often less abundant than retro-TEs, are more active. Much adaptive or evolutionary potential in angiosperms is due to the activity of TEs (active TE-Thrust), resulting in an extraordinary array of genetic changes, including gene modifications, duplications, altered expression patterns, and exaptation to create novel genes, with occasional gene disruption. TEs implicated in the earliest origins of the angiosperms include the exapted Mustang, Sleeper, and Fhy3/Far1 gene families. Passive TE-Thrust can create a high degree of adaptive or evolutionary potential by engendering ectopic recombination events resulting in deletions, duplications, and karyotypic changes. TE activity can also alter epigenetic patterning, including that governing endosperm development, thus promoting reproductive isolation. Continuing evolution of long-lived resprouter angiosperms, together with genetic variation in their multiple meristems, indicates that TEs can facilitate somatic evolution in addition to germ line evolution. Critical to their success, angiosperms have a high frequency of polyploidy and hybridization, with resultant increased TE activity and introgression, and beneficial gene duplication. Together with traditional explanations, the enhanced genomic plasticity facilitated by TE-Thrust, suggests a more complete and satisfactory explanation for Darwin’s “abominable mystery”: the spectacular success of the angiosperms. PMID:24065734

  16. Prediction of transposable element derived enhancers using chromatin modification profiles.

    Directory of Open Access Journals (Sweden)

    Ahsan Huda

    Full Text Available Experimentally characterized enhancer regions have previously been shown to display specific patterns of enrichment for several different histone modifications. We modelled these enhancer chromatin profiles in the human genome and used them to guide the search for novel enhancers derived from transposable element (TE sequences. To do this, a computational approach was taken to analyze the genome-wide histone modification landscape characterized by the ENCODE project in two human hematopoietic cell types, GM12878 and K562. We predicted the locations of 2,107 and 1,448 TE-derived enhancers in the GM12878 and K562 cell lines respectively. A vast majority of these putative enhancers are unique to each cell line; only 3.5% of the TE-derived enhancers are shared between the two. We evaluated the functional effect of TE-derived enhancers by associating them with the cell-type specific expression of nearby genes, and found that the number of TE-derived enhancers is strongly positively correlated with the expression of nearby genes in each cell line. Furthermore, genes that are differentially expressed between the two cell lines also possess a divergent number of TE-derived enhancers in their vicinity. As such, genes that are up-regulated in the GM12878 cell line and down-regulated in K562 have significantly more TE-derived enhancers in their vicinity in the GM12878 cell line and vice versa. These data indicate that human TE-derived sequences are likely to be involved in regulating cell-type specific gene expression on a broad scale and suggest that the enhancer activity of TE-derived sequences is mediated by epigenetic regulatory mechanisms.

  17. Single Bit Radar Systems for Digital Integration

    OpenAIRE

    Bjørndal, Øystein

    2017-01-01

    Small, low cost, radar systems have exciting applications in monitoring and imaging for the industrial, healthcare and Internet of Things (IoT) sectors. We here explore, and show the feasibility of, several single bit square wave radar architectures; that benefits from the continuous improvement in digital technologies for system-on-chip digital integration. By analysis, simulation and measurements we explore novel and harmonic-rich continuous wave (CW), stepped-frequency CW (SFCW) and freque...

  18. A Novel Least Significant Bit First Processing Parallel CRC Circuit

    OpenAIRE

    Xiujie Qu; Zhongkai Cao; Zhanjie Yang

    2013-01-01

    In HDLC serial communication protocol, CRC calculation can first process the most or least significant bit of data. Nowadays most CRC calculation is based on the most significant bit (MSB) first processing. An algorithm of the least significant bit (LSB) first processing parallel CRC is proposed in this paper. Based on the general expression of the least significant bit first processing serial CRC, using state equation method of linear system, we derive a recursive formula by the mathematical...

  19. Method to manufacture bit patterned magnetic recording media

    Science.gov (United States)

    Raeymaekers, Bart; Sinha, Dipen N

    2014-05-13

    A method to increase the storage density on magnetic recording media by physically separating the individual bits from each other with a non-magnetic medium (so-called bit patterned media). This allows the bits to be closely packed together without creating magnetic "cross-talk" between adjacent bits. In one embodiment, ferromagnetic particles are submerged in a resin solution, contained in a reservoir. The bottom of the reservoir is made of piezoelectric material.

  20. Development of an RSFQ 4-bit ALU

    International Nuclear Information System (INIS)

    Kim, J. Y.; Baek, S. H.; Kim, S. H.; Kang, K. R.; Jung, K. R.; Lim, H. Y.; Park, J. H.; Han, T. S.

    2005-01-01

    We have developed and tested an RSFQ 4-bit Arithmetic Logic Unit (ALU) based on half adder cells and de switches. ALU is a core element of a computer processor that performs arithmetic and logic operations on the operands in computer instruction words. The designed ALU had limited operation functions of OR, AND, XOR, and ADD. It had a pipeline structure. We have simulated the circuit by using Josephson circuit simulation tools in order to reduce the timing problem, and confirmed the correct operation of the designed ALU. We used simulation tools of XIC TM ,WRspice TM , and Julia. The fabricated 4-bit ALU circuit had a size of 3000 calum X 1500, and the chip size was 5 mm X 5 mm. The test speeds were 1000 kHz and 5 GHz. For high-speed test, we used an eye-diagram technique. Our 4-bit ALU operated correctly up to 5 GHz clock frequency. The chip was tested at the liquid-helium temperature.

  1. Study of the laws governing wear of cutter bits

    Energy Technology Data Exchange (ETDEWEB)

    Potrovka, S.

    1979-01-01

    A study was made of the laws governing the change in drilling of a bit in the process of ramming depending on the wear of the cutter bit. Experiments were conducted on the drilling stand ZIF-1200A by 3-cutter bits V-140T with cemented fittings and surfacing of the rear part of the external cutter bit crowns. Experimental data are presented from studying the laws governing the change in the current drilling of the bit and the corresponding wear depending on the total number of bit rotations during drilling of gray granite. Dependences are also indicated for drilling on the bit of the current mechanical drilling velocity and the mechanical drilling velocity during one rotation on the total number of bit rotations, as well as the mechanical drilling velocity on drilling per bit during drilling of gray granite. It was established that the efficient time for stay of the bit on the face both with minimum cost of 1 m of drilling, and with maximum per-trip velocity depends on the parameters of the drilling regime, the strength of the rocks, the depth of drilling and the standard indicators for the cost of rolling the equipment in 1 min, and the cost of the drill bit. Experimental data were obtained which make it possible to rapidly determine the efficient time for lifting the bit and to use for this purpose simple resources of computers.

  2. Patterns in the Distribution of Digital Games via BitTorrent

    DEFF Research Database (Denmark)

    Drachen, Anders; Veitch, Rob

    2013-01-01

    The distribution of illegal copies of computer games via digital networks forms the centre in one of the most heated debates in the international games environment, but there is minimal objective information available. Here the results of a large-scale, open-method analysis of the distribution...... of computer games via BitTorrent peer-to-peer file-sharing protocol is presented. 173 games were included, tracked over a period of three months from 2010 to 2011. A total of 12.6 million unique peers were identified across over 200 countries. Analysis indicates that the distribution of illegal copies...... of games follows distinct pattern, e.g., that a few game titles drive the traffic-The 10 most accessed games encompassed 42.7% of the number of peers tracked. The traffic is geographically localised-20 countries encompassed 76.7% of the total. Geographic patterns in the distribution of BitTorrent peers...

  3. Patterns in the distribution of digital games via BitTorrent

    DEFF Research Database (Denmark)

    Drachen, Anders; Veitch, Robert W. D.

    2013-01-01

    The distribution of illegal copies of computer games via digital networks forms the centre in one of the most heated debates in the international games environment, but there is minimal objective information available. Here the results of a large-scale, open-method analysis of the distribution...... of computer games via BitTorrent peer-to-peer file-sharing protocol is presented. 173 games were included, tracked over a period of three months from 2010 to 2011. A total of 12.6 million unique peers were identified across over 200 countries. Analysis indicates that the distribution of illegal copies...... of games follows distinct pattern, e.g., that a few game titles drive the traffic - the 10 most accessed games encompassed 42.7% of the number of peers tracked. The traffic is geographically localised - 20 countries encompassed 76.7% of the total. Geographic patterns in the distribution of BitTorrent peers...

  4. Enhancing interaural-delay-based extents of laterality at high frequencies by using ``transposed stimuli''

    Science.gov (United States)

    Bernstein, Leslie R.; Trahiotis, Constantine

    2003-06-01

    An acoustic pointing task was used to determine whether interaural temporal disparities (ITDs) conveyed by high-frequency ``transposed'' stimuli would produce larger extents of laterality than ITDs conveyed by bands of high-frequency Gaussian noise. The envelopes of transposed stimuli are designed to provide high-frequency channels with information similar to that conveyed by the waveforms of low-frequency stimuli. Lateralization was measured for low-frequency Gaussian noises, the same noises transposed to 4 kHz, and high-frequency Gaussian bands of noise centered at 4 kHz. Extents of laterality obtained with the transposed stimuli were greater than those obtained with bands of Gaussian noise centered at 4 kHz and, in some cases, were equivalent to those obtained with low-frequency stimuli. In a second experiment, the general effects on lateral position produced by imposed combinations of bandwidth, ITD, and interaural phase disparities (IPDs) on low-frequency stimuli remained when those stimuli were transposed to 4 kHz. Overall, the data were fairly well accounted for by a model that computes the cross-correlation subsequent to known stages of peripheral auditory processing augmented by low-pass filtering of the envelopes within the high-frequency channels of each ear.

  5. TRANSPOSABLE REGULARIZED COVARIANCE MODELS WITH AN APPLICATION TO MISSING DATA IMPUTATION.

    Science.gov (United States)

    Allen, Genevera I; Tibshirani, Robert

    2010-06-01

    Missing data estimation is an important challenge with high-dimensional data arranged in the form of a matrix. Typically this data matrix is transposable , meaning that either the rows, columns or both can be treated as features. To model transposable data, we present a modification of the matrix-variate normal, the mean-restricted matrix-variate normal , in which the rows and columns each have a separate mean vector and covariance matrix. By placing additive penalties on the inverse covariance matrices of the rows and columns, these so called transposable regularized covariance models allow for maximum likelihood estimation of the mean and non-singular covariance matrices. Using these models, we formulate EM-type algorithms for missing data imputation in both the multivariate and transposable frameworks. We present theoretical results exploiting the structure of our transposable models that allow these models and imputation methods to be applied to high-dimensional data. Simulations and results on microarray data and the Netflix data show that these imputation techniques often outperform existing methods and offer a greater degree of flexibility.

  6. Patterns of transposable element expression and insertion in cancer

    Directory of Open Access Journals (Sweden)

    Evan A Clayton

    2016-11-01

    Full Text Available Human transposable element (TE activity in somatic tissues causes mutations that can contribute to tumorigenesis. Indeed, TE insertion mutations have been implicated in the etiology of a number of different cancer types. Nevertheless, the full extent of somatic TE activity, along with its relationship to tumorigenesis, have yet to be fully explored. Recent developments in bioinformatics software make it possible to analyze TE expression levels and TE insertional activity directly from transcriptome (RNA-seq and whole genome (DNA-seq next-generation sequence data. We applied these new sequence analysis techniques to matched normal and primary tumor patient samples from the Cancer Genome Atlas (TCGA in order to analyze the patterns of TE expression and insertion for three cancer types: breast invasive carcinoma, head and neck squamous cell carcinoma, and lung adenocarcinoma. Our analysis focused on the three most abundant families of active human TEs: Alu, SVA and L1. We found evidence for high levels of somatic TE activity for these three families in normal and cancer samples across diverse tissue types. Abundant transcripts for all three TE families were detected in both normal and cancer tissues along with an average of ~80 unique TE insertions per individual patient/tissue. We observed an increase in L1 transcript expression and L1 insertional activity in primary tumor samples for all three cancer types. Tumor-specific TE insertions are enriched for private mutations, consistent with a potentially causal role in tumorigenesis. We used genome feature analysis to investigate two specific cases of putative cancer-causing TE mutations in further detail. An Alu insertion in an upstream enhancer of the CBL tumor suppressor gene is associated with down-regulation of the gene in a single breast cancer patient, and an L1 insertion in the first exon of the BAALC gene also disrupts its expression in head and neck squamous cell carcinoma. Our results are

  7. Combined evidence annotation of transposable elements in genome sequences.

    Directory of Open Access Journals (Sweden)

    Hadi Quesneville

    2005-07-01

    Full Text Available Transposable elements (TEs are mobile, repetitive sequences that make up significant fractions of metazoan genomes. Despite their near ubiquity and importance in genome and chromosome biology, most efforts to annotate TEs in genome sequences rely on the results of a single computational program, RepeatMasker. In contrast, recent advances in gene annotation indicate that high-quality gene models can be produced from combining multiple independent sources of computational evidence. To elevate the quality of TE annotations to a level comparable to that of gene models, we have developed a combined evidence-model TE annotation pipeline, analogous to systems used for gene annotation, by integrating results from multiple homology-based and de novo TE identification methods. As proof of principle, we have annotated "TE models" in Drosophila melanogaster Release 4 genomic sequences using the combined computational evidence derived from RepeatMasker, BLASTER, TBLASTX, all-by-all BLASTN, RECON, TE-HMM and the previous Release 3.1 annotation. Our system is designed for use with the Apollo genome annotation tool, allowing automatic results to be curated manually to produce reliable annotations. The euchromatic TE fraction of D. melanogaster is now estimated at 5.3% (cf. 3.86% in Release 3.1, and we found a substantially higher number of TEs (n = 6,013 than previously identified (n = 1,572. Most of the new TEs derive from small fragments of a few hundred nucleotides long and highly abundant families not previously annotated (e.g., INE-1. We also estimated that 518 TE copies (8.6% are inserted into at least one other TE, forming a nest of elements. The pipeline allows rapid and thorough annotation of even the most complex TE models, including highly deleted and/or nested elements such as those often found in heterochromatic sequences. Our pipeline can be easily adapted to other genome sequences, such as those of the D. melanogaster heterochromatin or other

  8. A novel bit-quad-based Euler number computing algorithm.

    Science.gov (United States)

    Yao, Bin; He, Lifeng; Kang, Shiying; Chao, Yuyan; Zhao, Xiao

    2015-01-01

    The Euler number of a binary image is an important topological property in computer vision and pattern recognition. This paper proposes a novel bit-quad-based Euler number computing algorithm. Based on graph theory and analysis on bit-quad patterns, our algorithm only needs to count two bit-quad patterns. Moreover, by use of the information obtained during processing the previous bit-quad, the average number of pixels to be checked for processing a bit-quad is only 1.75. Experimental results demonstrated that our method outperforms significantly conventional Euler number computing algorithms.

  9. High Bit-Depth Medical Image Compression With HEVC.

    Science.gov (United States)

    Parikh, Saurin S; Ruiz, Damian; Kalva, Hari; Fernandez-Escribano, Gerardo; Adzic, Velibor

    2018-03-01

    Efficient storing and retrieval of medical images has direct impact on reducing costs and improving access in cloud-based health care services. JPEG 2000 is currently the commonly used compression format for medical images shared using the DICOM standard. However, new formats such as high efficiency video coding (HEVC) can provide better compression efficiency compared to JPEG 2000. Furthermore, JPEG 2000 is not suitable for efficiently storing image series and 3-D imagery. Using HEVC, a single format can support all forms of medical images. This paper presents the use of HEVC for diagnostically acceptable medical image compression, focusing on compression efficiency compared to JPEG 2000. Diagnostically acceptable lossy compression and complexity of high bit-depth medical image compression are studied. Based on an established medically acceptable compression range for JPEG 2000, this paper establishes acceptable HEVC compression range for medical imaging applications. Experimental results show that using HEVC can increase the compression performance, compared to JPEG 2000, by over 54%. Along with this, a new method for reducing computational complexity of HEVC encoding for medical images is proposed. Results show that HEVC intra encoding complexity can be reduced by over 55% with negligible increase in file size.

  10. Eye movements when reading transposed text: the importance of word-beginning letters.

    Science.gov (United States)

    White, Sarah J; Johnson, Rebecca L; Liversedge, Simon P; Rayner, Keith

    2008-10-01

    Participants' eye movements were recorded as they read sentences with words containing transposed adjacent letters. Transpositions were either external (e.g., problme, rpoblem) or internal (e.g., porblem, probelm) and at either the beginning (e.g., rpoblem, porblem) or end (e.g., problme, probelm) of words. The results showed disruption for words with transposed letters compared to the normal baseline condition, and the greatest disruption was observed for word-initial transpositions. In Experiment 1, transpositions within low frequency words led to longer reading times than when letters were transposed within high frequency words. Experiment 2 demonstrated that the position of word-initial letters is most critical even when parafoveal preview of words to the right of fixation is unavailable. The findings have important implications for the roles of different letter positions in word recognition and the effects of parafoveal preview on word recognition processes.

  11. Entangled solitons and stochastic Q-bits

    International Nuclear Information System (INIS)

    Rybakov, Yu.P.; Kamalov, T.F.

    2007-01-01

    Stochastic realization of the wave function in quantum mechanics with the inclusion of soliton representation of extended particles is discussed. Two-solitons configurations are used for constructing entangled states in generalized quantum mechanics dealing with extended particles, endowed with nontrivial spin S. Entangled solitons construction being introduced in the nonlinear spinor field model, the Einstein-Podolsky-Rosen (EPR) correlation is calculated and shown to coincide with the quantum mechanical one for the 1/2-spin particles. The concept of stochastic q-bits is used for quantum computing modelling

  12. Investigation of PDC bit failure base on stick-slip vibration analysis of drilling string system plus drill bit

    Science.gov (United States)

    Huang, Zhiqiang; Xie, Dou; Xie, Bing; Zhang, Wenlin; Zhang, Fuxiao; He, Lei

    2018-03-01

    The undesired stick-slip vibration is the main source of PDC bit failure, such as tooth fracture and tooth loss. So, the study of PDC bit failure base on stick-slip vibration analysis is crucial to prolonging the service life of PDC bit and improving ROP (rate of penetration). For this purpose, a piecewise-smooth torsional model with 4-DOF (degree of freedom) of drilling string system plus PDC bit is proposed to simulate non-impact drilling. In this model, both the friction and cutting behaviors of PDC bit are innovatively introduced. The results reveal that PDC bit is easier to fail than other drilling tools due to the severer stick-slip vibration. Moreover, reducing WOB (weight on bit) and improving driving torque can effectively mitigate the stick-slip vibration of PDC bit. Therefore, PDC bit failure can be alleviated by optimizing drilling parameters. In addition, a new 4-DOF torsional model is established to simulate torsional impact drilling and the effect of torsional impact on PDC bit's stick-slip vibration is analyzed by use of an engineering example. It can be concluded that torsional impact can mitigate stick-slip vibration, prolonging the service life of PDC bit and improving drilling efficiency, which is consistent with the field experiment results.

  13. Identification of a mosaic transposable element of Paracoccus marcusii composed of insertion sequence ISPmar4 (ISAs1 family) and an IS1247a-driven transposable module (TMo).

    Science.gov (United States)

    Szuplewska, Magdalena; Bartosik, Dariusz

    2009-03-01

    A sacB-based trap plasmid was used to clone a mosaic transposable element (TE) in the carotenoid producer Paracoccus marcusii OS22. This element is composed of an insertion sequence (IS) ISPmar4 (ISAs1 family), which contains an inserted functional transposable module (TMo) generated by a copy of IS1247a (of the IS1380 family). Besides IS1247a sequences, the TMo also contains the 3'-end region of a putative alpha/beta hydrolase gene, whose expression might be activated from the P(2) promoter of IS1247a. The identification of this novel TE provides evidence that transposition of TMos may change an IS into a more complex element resembling noncomposite transposons.

  14. Applying transpose matrix on advanced encryption standard (AES) for database content

    Science.gov (United States)

    Manurung, E. B. P.; Sitompul, O. S.; Suherman

    2018-03-01

    Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) and has been adopted by the U.S. government and is now used worldwide. This paper reports the impact of transpose matrix integration to AES. Transpose matrix implementation on AES is aimed at first stage of chypertext modifications for text based database security so that the confidentiality improves. The matrix is also able to increase the avalanche effect of the cryptography algorithm 4% in average.

  15. New transposable elements identified as insertions in rice transposon Tnr1.

    Science.gov (United States)

    Han, C G; Frank, M J; Ohtsubo, H; Ohtsubo, E

    2000-04-01

    Tnr1 (235 bp long) is a transposable element in rice. Polymerase chain reactions (PCRs) done with a primer(s) that hybridizes to terminal inverted repeat sequences (TIRs) of Tnr1 detected new Tnr1 members with one or two insertions in rice genomes. Six identified insertion sequences (Tnr4, Tnr5, Tnr11, Tnr12, Tnr13 and RIRE9) did not have extensive homology to known transposable elements, rather they had structural features characteristic of transposable elements. Tnr4 (1767 bp long) had imperfect 64-bp TIRs and appeared to generate duplication of a 9-bp sequence at the target site. However, the TIR sequences were not homologous to those of known transposable elements, indicative that Tnr4 is a new transposable element. Tnr5 (209 bp long) had imperfect 46-bp TIRs and appeared to generate duplication of sequence TTA like that of some elements of the Tourist family. Tnr11 (811 bp long) had 73-bp TIRs with significant homology to those of Tnr1 and Stowaway and appeared to generate duplication of sequence TA, indicative that Tnr11 is a transposable element of the Tnr1/Stowaway family. Tnr12 (2426 bp long) carried perfect 9-bp TIRs, which began with 5'-CACTA- -3' from both ends and appeared to generate duplication of a 3-bp target sequence, indicative that Tnr12 is a transposable element of the En/Spm family. Tnr13 (347 bp long) had 31-bp TIRs and appeared to generate duplication of an 8-bp target sequence. Two sequences, one the transposon-like element Crackle, had partial homology in the Tnr13 ends. All five insertions appear to be defective elements derived from autonomous ones encoding the transposase gene. All had characteristic tandem repeat sequences which may be recognized by transposase. The sixth insertion sequence, named RIRE9 (3852 bp long), which begins with 5'-TG- -3' and ends with 5'- -CA-3', appeared to generate duplication of a 5-bp target sequence. These and other structural features indicate that this insertion is a solo LTR (long terminal repeat) of

  16. The biology and potential for genetic research of transposable elements in filamentous fungi

    Directory of Open Access Journals (Sweden)

    Léia Cecilia de Lima Fávaro

    2005-12-01

    Full Text Available Recently many transposable elements have been identified and characterized in filamentous fungi, especially in species of agricultural, biotechnological and medical interest. Similar to the elements found in other eukaryotes, fungal transposons can be classified as class I elements (retrotransposons that use RNA and reverse transcriptase and class II elements (DNA transposons that use DNA. The changes (transposition and recombination caused by transposons can supply wide-ranging genetic variation, especially for species that do not have a sexual phase. The application of transposable elements to gene isolation and population analysis is an important tool for molecular biology and studies of fungal evolution.

  17. Object tracking based on bit-planes

    Science.gov (United States)

    Li, Na; Zhao, Xiangmo; Liu, Ying; Li, Daxiang; Wu, Shiqian; Zhao, Feng

    2016-01-01

    Visual object tracking is one of the most important components in computer vision. The main challenge for robust tracking is to handle illumination change, appearance modification, occlusion, motion blur, and pose variation. But in surveillance videos, factors such as low resolution, high levels of noise, and uneven illumination further increase the difficulty of tracking. To tackle this problem, an object tracking algorithm based on bit-planes is proposed. First, intensity and local binary pattern features represented by bit-planes are used to build two appearance models, respectively. Second, in the neighborhood of the estimated object location, a region that is most similar to the models is detected as the tracked object in the current frame. In the last step, the appearance models are updated with new tracking results in order to deal with environmental and object changes. Experimental results on several challenging video sequences demonstrate the superior performance of our tracker compared with six state-of-the-art tracking algorithms. Additionally, our tracker is more robust to low resolution, uneven illumination, and noisy video sequences.

  18. Physical Roots of It from Bit

    Science.gov (United States)

    Berezin, Alexander A.

    2003-04-01

    Why there is Something rather than Nothing? From Pythagoras ("everything is number") to Wheeler ("it from bit") theme of ultimate origin stresses primordiality of Ideal Platonic World (IPW) of mathematics. Even popular "quantum tunnelling out of nothing" can specify "nothing" only as (essentially) IPW. IPW exists everywhere (but nowhere in particular) and logically precedes space, time, matter or any "physics" in any conceivable universe. This leads to propositional conjecture (axiom?) that (meta)physical "Platonic Pressure" of infinitude of numbers acts as engine for self-generation of physical universe directly out of mathematics: cosmogenesis is driven by the very fact of IPW inexhaustibility. While physics in other quantum branches of inflating universe (Megaverse)can be(arbitrary) different from ours, number theory (and rest of IPW)is not (it is unique, absolute, immutable and infinitely resourceful). Let (infinite) totality of microstates ("its") of entire Megaverse form countable set. Since countable sets are hierarchically inexhaustible (Cantor's "fractal branching"), each single "it" still has infinite tail of non-overlapping IPW-based "personal labels". Thus, each "bit" ("it") is infinitely and uniquely resourceful: possible venue of elimination ergodicity basis for eternal return cosmological argument. Physics (in any subuniverse) may be limited only by inherent impossibilities residing in IPW, e.g. insolvability of Continuum Problem may be IPW foundation of quantum indeterminicity.

  19. BitTorrent Sync: Network Investigation Methodology

    OpenAIRE

    Scanlon, Mark; Farina, Jason; Kechadi, M-Tahar

    2014-01-01

    The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files. Millions of these users turn to cloud based file synchronisation services, such as Dropbox, Microsoft Skydrive, Apple iCloud and Google Drive, to enable 'always-on' access to their most up-to-date data from any computer or mobile device with an Internet connection. The prevalence of recent art...

  20. Identification of miniature inverted-repeat transposable elements (MITEs) and biogenesis of their siRNAs in the Solanaceae: New functional implications for MITEs

    Science.gov (United States)

    Small RNAs regulate the genome by guiding transcriptional and post-transcriptional silencing machinery to specific target sequences, including genes and transposable elements (TEs). Although miniature inverted-repeat transposable elements (MITEs) are closely associated with euchromatic genes, the br...

  1. Orthographic Reading Deficits in Dyslexic Japanese Children: Examining the Transposed-Letter Effect in the Color-Word Stroop Paradigm.

    Science.gov (United States)

    Ogawa, Shino; Shibasaki, Masahiro; Isomura, Tomoko; Masataka, Nobuo

    2016-01-01

    In orthographic reading, the transposed-letter effect (TLE) is the perception of a transposed-letter position word such as "cholocate" as the correct word "chocolate." Although previous studies on dyslexic children using alphabetic languages have reported such orthographic reading deficits, the extent of orthographic reading impairment in dyslexic Japanese children has remained unknown. This study examined the TLE in dyslexic Japanese children using the color-word Stroop paradigm comprising congruent and incongruent Japanese hiragana words with correct and transposed-letter positions. We found that typically developed children exhibited Stroop effects in Japanese hiragana words with both correct and transposed-letter positions, thus indicating the presence of TLE. In contrast, dyslexic children indicated Stroop effects in correct letter positions in Japanese words but not in transposed, which indicated an absence of the TLE. These results suggest that dyslexic Japanese children, similar to dyslexic children using alphabetic languages, may also have a problem with orthographic reading.

  2. A digital divider with extension bits for position-sensitive detectors

    International Nuclear Information System (INIS)

    Koike, Masaki; Hasegawa, Ken-ichi

    1988-01-01

    Digitizing errors produced in a digital divider for position-sensitive detectors have been reduced by adding extension bits to data bits. A relation between the extension bits and the data bits to obtain perfect position uniformity is also given. A digital divider employing 10 bit ADCs and 6 bit extension circuits has been constructed. (orig.)

  3. A fixed/variable bit-rate data compression architecture

    Science.gov (United States)

    Zweigle, Gregary C.; Venbrux, Jack; Yeh, Pen-Shu

    1993-01-01

    A VLSI architecture for an adaptive data compression encoder capable of sustaining fixed or variable bit-rate output has been developed. There are three modes of operation: lossless with variable bit-rate, lossy with fixed bit-rate and lossy with variable bit-rate. For lossless encoding, the implementation is identical to the USES chip designed for Landsat 7. Obtaining a fixed bit-rate is achieved with a lossy DPCM algorithm using adaptive, nonuniform scalar quantization. In lossy mode, variable bit-rate coding uses the lossless sections of the encoder for post-DPCM entropy coding. The encoder shows excellent compression performance in comparison to other current data compression techniques. No external tables or memory are required for operation.

  4. Cross Institutional Cooperation on a Shared Bit Repository

    DEFF Research Database (Denmark)

    Zierau, Eld; Kejser, Ulla Bøgvad

    2013-01-01

    This paper explores how independent institutions, such as archives and libraries, can cooperate on managing a shared bit repository with bit preservation, in order to use their resources for preservation in a more cost-effective way. It uses the OAIS Reference Model to provide a framework...... for systematically analysing institutions technical and organisational requirements for a remote bit repository. Instead of viewing a bit repository simply as Archival Storage for the institutions repositories, we argue for viewing it as consisting of a subset of functions from all entities defined by the OAIS...... Reference Model. The work is motivated by and used in a current Danish feasibility study for establishing a national bit repository. The study revealed that depending on their missions and the collections they hold, the institutions have varying requirements e.g. for bit safety, accessibility...

  5. Logic Operators on Delta-Sigma Bit-Streams

    Directory of Open Access Journals (Sweden)

    Axel Klein

    2018-01-01

    Full Text Available The fundamental logic operations NOT, OR, AND, and XOR processing bit-streams of Δ Σ -modulators are discussed herein. The resulting bit-streams are evaluated on the basis of their mean values and their standard deviations. Mathematical expressions are presented for their mean values; i.e., the logic function XOR results in the negative multiplication of two bipolar bit-streams, and the logic function AND results in the multiplication of two unipolar bit-streams. As the results are valid for bit-streams with independent high-frequency components, the normed cross-product is utilized for evaluation of the independence of the high-frequency components. In order to achieve a high independence between the input bit-streams, representing the same value, the quantization noise is affected. Multiple strategies are examined and Δ Σ -modulators with different designs are chosen as the best-suited solution. The operations are evaluated on a testbench.

  6. Zaba: a novel miniature transposable element present in genomes of legume plants

    Czech Academy of Sciences Publication Activity Database

    Macas, Jiří; Neumann, Pavel; Požárková, Dana

    2003-01-01

    Roč. 269, - (2003), s. 624-631 ISSN 1617-4615 R&D Projects: GA ČR GA521/00/0655 Institutional research plan: CEZ:AV0Z5051902 Keywords : DNA * transposable elements * ZABA Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 2.240, year: 2003

  7. Development and testing of a Mudjet-augmented PDC bit.

    Energy Technology Data Exchange (ETDEWEB)

    Black, Alan (TerraTek, Inc.); Chahine, Georges (DynaFlow, Inc.); Raymond, David Wayne; Matthews, Oliver (Security DBS); Grossman, James W.; Bertagnolli, Ken (US Synthetic); Vail, Michael (US Synthetic)

    2006-01-01

    This report describes a project to develop technology to integrate passively pulsating, cavitating nozzles within Polycrystalline Diamond Compact (PDC) bits for use with conventional rig pressures to improve the rock-cutting process in geothermal formations. The hydraulic horsepower on a conventional drill rig is significantly greater than that delivered to the rock through bit rotation. This project seeks to leverage this hydraulic resource to extend PDC bits to geothermal drilling.

  8. Bit-commitment-based quantum coin flipping

    International Nuclear Information System (INIS)

    Nayak, Ashwin; Shor, Peter

    2003-01-01

    In this paper we focus on a special framework for quantum coin-flipping protocols, bit-commitment-based protocols, within which almost all known protocols fit. We show a lower bound of 1/16 for the bias in any such protocol. We also analyze a sequence of multiround protocols that tries to overcome the drawbacks of the previously proposed protocols in order to lower the bias. We show an intricate cheating strategy for this sequence, which leads to a bias of 1/4. This indicates that a bias of 1/4 might be optimal in such protocols, and also demonstrates that a more clever proof technique may be required to show this optimality

  9. Quantum bit commitment with cheat sensitive binding and approximate sealing

    Science.gov (United States)

    Li, Yan-Bing; Xu, Sheng-Wei; Huang, Wei; Wan, Zong-Jie

    2015-04-01

    This paper proposes a cheat-sensitive quantum bit commitment scheme based on single photons, in which Alice commits a bit to Bob. Here, Bob’s probability of success at cheating as obtains the committed bit before the opening phase becomes close to \\frac{1}{2} (just like performing a guess) as the number of single photons used is increased. And if Alice alters her committed bit after the commitment phase, her cheating will be detected with a probability that becomes close to 1 as the number of single photons used is increased. The scheme is easy to realize with present day technology.

  10. Improved Bit Rate Control for Real-Time MPEG Watermarking

    Directory of Open Access Journals (Sweden)

    Pranata Sugiri

    2004-01-01

    Full Text Available The alteration of compressed video bitstream due to embedding of digital watermark tends to produce unpredictable video bit rate variations which may in turn lead to video playback buffer overflow/underflow or transmission bandwidth violation problems. This paper presents a novel bit rate control technique for real-time MPEG watermarking applications. In our experiments, spread spectrum watermarks are embedded in the quantized DCT domain without requantization and motion reestimation to achieve fast watermarking. The proposed bit rate control scheme evaluates the combined bit lengths of a set of multiple watermarked VLC codewords, and successively replaces watermarked VLC codewords having the largest increase in bit length with their corresponding unmarked VLC codewords until a target bit length is achieved. The proposed method offers flexibility and scalability, which are neglected by similar works reported in the literature. Experimental results show that the proposed bit rate control scheme is effective in meeting the bit rate targets and capable of improving the watermark detection robustness for different video contents compressed at different bit rates.

  11. GEODOC: the GRID document file, record structure and data element description

    Energy Technology Data Exchange (ETDEWEB)

    Trippe, T.; White, V.; Henderson, F.; Phillips, S.

    1975-11-06

    The purpose of this report is to describe the information structure of the GEODOC file. GEODOC is a computer based file which contains the descriptive cataloging and indexing information for all documents processed by the National Geothermal Information Resource Group. This file (along with other GRID files) is managed by DBMS, the Berkeley Data Base Management System. Input for the system is prepared using the IRATE Text Editing System with its extended (12 bit) character set, or punched cards.

  12. Détection homodyne pour mémoires holographiques à stockage bit à bit

    Science.gov (United States)

    Maire, G.; Pauliat, G.; Roosen, G.

    2006-10-01

    Les mémoires holographiques à stockage bit à bit sont une alternative intéressante à l'approche holographique conventionnelle par pages de données du fait de leur architecture optique simplifiée. Nous proposons et validons ici une procédure de lecture adaptée à de telles mémoires et basée sur une détection homodyne de l'amplitude diffractée par les hologrammes. Ceci permet d'augmenter la quantité de signal utile détecté et s'avère donc prometteur pour accroître le taux de transfert de données de ces mémoires.

  13. The Deliverability of the BIT Programme at Lahti UAS in Training BIT Experts

    OpenAIRE

    Nghiem, Duc Long

    2014-01-01

    Information Technology has become a vital and indispensable part of business in every industry. In fact, IT is the primary factor that differentiates many businesses from their competitors. Organizations usually rely on IT for several strategic business solutions such as communication, information management, customer relationship management, and marketing. In the near future, the business labor force will anticipate a rising demand in BIT experts who possess both business expertise and IT sk...

  14. Multiple Memory Structure Bit Reversal Algorithm Based on Recursive Patterns of Bit Reversal Permutation

    Directory of Open Access Journals (Sweden)

    K. K. L. B. Adikaram

    2014-01-01

    Full Text Available With the increasing demand for online/inline data processing efficient Fourier analysis becomes more and more relevant. Due to the fact that the bit reversal process requires considerable processing time of the Fast Fourier Transform (FFT algorithm, it is vital to optimize the bit reversal algorithm (BRA. This paper is to introduce an efficient BRA with multiple memory structures. In 2009, Elster showed the relation between the first and the second halves of the bit reversal permutation (BRP and stated that it may cause serious impact on cache performance of the computer, if implemented. We found exceptions, especially when the said index mapping was implemented with multiple one-dimensional memory structures instead of multidimensional or one-dimensional memory structure. Also we found a new index mapping, even after the recursive splitting of BRP into equal sized slots. The four-array and the four-vector versions of BRA with new index mapping reported 34% and 16% improvement in performance in relation to similar versions of Linear BRA of Elster which uses single one-dimensional memory structure.

  15. Bit-Wise Arithmetic Coding For Compression Of Data

    Science.gov (United States)

    Kiely, Aaron

    1996-01-01

    Bit-wise arithmetic coding is data-compression scheme intended especially for use with uniformly quantized data from source with Gaussian, Laplacian, or similar probability distribution function. Code words of fixed length, and bits treated as being independent. Scheme serves as means of progressive transmission or of overcoming buffer-overflow or rate constraint limitations sometimes arising when data compression used.

  16. Support research for development of improved geothermal drill bits

    Energy Technology Data Exchange (ETDEWEB)

    Hendrickson, R.R.; Barker, L.M.; Green, S.J.; Winzenried, R.W.

    1977-06-01

    Progress in background research needed to develop drill bits for the geothermal environment is reported. Construction of a full-scale geothermal wellbore simulator and geothermal seal testing machine was completed. Simulated tests were conducted on full-scale bits. Screening tests on elastometric seals under geothermal conditions are reported. (JGB)

  17. Cross Institutional Cooperation on a Shared Bit Repository

    DEFF Research Database (Denmark)

    Zierau, Eld; Kejser, Ulla Bøgvad

    2010-01-01

    This paper explores how independent institutions, such as archives and libraries, can cooperate on managing a shared bit repository with bit preservation in order to use their resources for preservation n in a more cost-effective way. It uses the OAIS Reference Model to provide a framework...

  18. Circuit and interconnect design for high bit-rate applications

    NARCIS (Netherlands)

    Veenstra, H.

    2006-01-01

    This thesis presents circuit and interconnect design techniques and design flows that address the most difficult and ill-defined aspects of the design of ICs for high bit-rate applications. Bottlenecks in interconnect design, circuit design and on-chip signal distribution for high bit-rate

  19. APL portability in 16 bits microprocessors

    International Nuclear Information System (INIS)

    Cordova Costa, Felisa

    1981-01-01

    The present work deals with an automatic program translation method as a solution to the software portability problem. The source machine is a minicomputer of the SEMS MITRA range; the target machines are three 16 bits microprocessors: INTEL 8086, MOTOROLA 68000 and ZILOG Z-8000. The software to be translated is written in macro-assembly language (MAS) and consist of an operating system, an APL interpreter and some other software tools. The translation method uses a machine-free intermediate language describing the program in source language. This intermediate language consisting of a set of macro-instructions, is then assembled using a link library; this library defines the macro-instructions which create the target microprocessor object code. The whole translation operation work is carried out by the source machine which produces, after linkage editing, a table memory map (IME). Thereafter the load object code will be removed to target machine. Concerning optimization problems or inputs-outputs, some module can be written using the target machine assembly language and processed by a specific assembler in target machine or source machine, if the latter processes a cross-assembler; then the resulting binary codes are merged with the binary codes issued during the automatic translation phase. The method proposed here may be extended to any 16 bits computer, by a simple change of the macro-instruction library. This work allows an APL machine creation with microprocessors, preserving the original software and so maintaining its initial reliability. This work has led to a closer examination of hardware problems connected with the various target machines configurations. Difficulties met during this work mainly arise from different operations of the target machines specially indicators or flags setting, addressing modes and interruption mechanisms. This shows up the necessity to design new microprocessors either partially user's micro-programmable, or with some functions

  20. CAMAC based 4-channel 12-bit digitizer

    International Nuclear Information System (INIS)

    Srivastava, Amit K; Sharma, Atish; Raval, Tushar; Reddy, D Chenna

    2010-01-01

    With the development in Fusion research a large number of diagnostics are being used to understand the complex behaviour of plasma. During discharge, several diagnostics demand high sampling rate and high bit resolution to acquire data for rapid changes in plasma parameters. For the requirements of such fast diagnostics, a 4-channel simultaneous sampling, high-speed, 12-bit CAMAC digitizer has been designed and developed which has several important features for application in CAMAC based nuclear instrumentation. The module has independent ADC per channel for simultaneous sampling and digitization, and 512 Ksamples RAM per channel for on-board storage. The digitizer has been designed for event based acquisition and the acquisition window gives post-trigger as well as pre-trigger (software selectable) data that is useful for analysis. It is a transient digitizer and can be operated either in pre/post trigger mode or in burst mode. The record mode and the active memory size are selected through software commands to satisfy the current application. The module can be used to acquire data at high sampling rate for short time discharge e.g. 512 ms at 1MSPS. The module can also be used for long time discharge at low sampling rate e.g. 512 seconds at 1KSPS. This paper describes the design of digitizer module, development of VHDL code for hardware logic, Graphical User Interface (GUI) and important features of module from application point of view. The digitizer has CPLD based hardware logic, which provides flexibility in configuring the module for different sampling rates and different pre/post trigger samples through GUI. The digitizer can be operated with either internal (for testing/acquisition) or external (synchronized acquisition) clock and trigger. The digitizer has differential inputs with bipolar input range ±5V and it is being used with sampling rate of 1 MSamples Per Second (MSPS) per channel but it also supports higher sampling rate up to 3MSPS per channel. A

  1. A Novel Least Significant Bit First Processing Parallel CRC Circuit

    Directory of Open Access Journals (Sweden)

    Xiujie Qu

    2013-01-01

    Full Text Available In HDLC serial communication protocol, CRC calculation can first process the most or least significant bit of data. Nowadays most CRC calculation is based on the most significant bit (MSB first processing. An algorithm of the least significant bit (LSB first processing parallel CRC is proposed in this paper. Based on the general expression of the least significant bit first processing serial CRC, using state equation method of linear system, we derive a recursive formula by the mathematical deduction. The recursive formula is applicable to any number of bits processed in parallel and any series of generator polynomial. According to the formula, we present the parallel circuit of CRC calculation and implement it with VHDL on FPGA. The results verify the accuracy and effectiveness of this method.

  2. A Memristor as Multi-Bit Memory: Feasibility Analysis

    Directory of Open Access Journals (Sweden)

    O. Bass

    2015-06-01

    Full Text Available The use of emerging memristor materials for advanced electrical devices such as multi-valued logic is expected to outperform today's binary logic digital technologies. We show here an example for such non-binary device with the design of a multi-bit memory. While conventional memory cells can store only 1 bit, memristors-based multi-bit cells can store more information within single device thus increasing the information storage density. Such devices can potentially utilize the non-linear resistance of memristor materials for efficient information storage. We analyze the performance of such memory devices based on their expected variations in order to determine the viability of memristor-based multi-bit memory. A design of read/write scheme and a simple model for this cell, lay grounds for full integration of memristor multi-bit memory cell.

  3. Installation of MCNP on 64-bit parallel computers

    International Nuclear Information System (INIS)

    Meginnis, A.B.; Hendricks, J.S.; McKinney, G.W.

    1995-01-01

    The Monte Carlo radiation transport code MCNP has been successfully ported to two 64-bit workstations, the SGI and DEC Alpha. We found the biggest problem for installation on these machines to be Fortran and C mismatches in argument passing. Correction of these mismatches enabled, for the first time, dynamic memory allocation on 64-bit workstations. Although the 64-bit hardware is faster because 8-bytes are processed at a time rather than 4-bytes, we found no speed advantage in true 64-bit coding versus implicit double precision when porting an existing code to the 64-bit workstation architecture. We did find that PVM multiasking is very successful and represents a significant performance enhancement for scientific workstations

  4. A little bit of legal history

    CERN Multimedia

    2010-01-01

    On Monday 18 October, a little bit of legal history will be made when the first international tripartite agreement between CERN and its two Host States is signed. This agreement, which has been under negotiation since 2004, clarifies the working conditions of people employed by companies contracted to CERN. It will facilitate the management of service contracts both for CERN and its contractors.   Ever since 1965, when CERN first crossed the border into France, the rule of territoriality has applied. This means that anyone working for a company contracted to CERN whose job involves crossing the border is subject to the employment legislation of both states. The new agreement simplifies matters by making only one legislation apply per contract, that of the country in which most of the work is carried out. This is good for CERN, it’s good for the companies, and it’s good for their employees. It is something that all three parties to the agreement have wanted for some time, and I...

  5. Transposable elements in cancer as a by-product of stress-induced evolvability

    DEFF Research Database (Denmark)

    Mourier, Tobias; Nielsen, Lars P.; Hansen, Anders Johannes

    2014-01-01

    Transposable elements (TEs) are ubiquitous in eukaryotic genomes. Barbara McClintock's famous notion of TEs acting as controlling elements modifying the genetic response of an organism upon exposure to stressful environments has since been solidly supported in a series of model organisms. This re......Transposable elements (TEs) are ubiquitous in eukaryotic genomes. Barbara McClintock's famous notion of TEs acting as controlling elements modifying the genetic response of an organism upon exposure to stressful environments has since been solidly supported in a series of model organisms....... This requires the TE activity response to possess an element of specificity and be targeted toward certain parts of the genome. We propose that a similar TE response is present in human cells, and that this stress response may drive the onset of human cancers. As such, TE-driven cancers may be viewed...... as an evolutionary by-product of organisms' abilities to genetically adapt to environmental stress....

  6. Effect of combined digital imaging parameters on endodontic file measurements.

    Science.gov (United States)

    de Oliveira, Matheus Lima; Pinto, Geraldo Camilo de Souza; Ambrosano, Glaucia Maria Bovi; Tosoni, Guilherme Monteiro

    2012-10-01

    This study assessed the effect of the combination of a dedicated endodontic filter, spatial resolution, and contrast resolution on the determination of endodontic file lengths. Forty extracted single-rooted teeth were x-rayed with K-files (ISO size 10 and 15) in the root canals. Images were acquired using the VistaScan system (Dürr Dental, Beitigheim-Bissingen, Germany) under different combining parameters of spatial resolution (10 and 25 line pairs per millimeter [lp/mm]) and contrast resolution (8- and 16-bit depths). Subsequently, a dedicated endodontic filter was applied on the 16-bit images, creating 2 additional parameters. Six observers measured the length of the endodontic files in the root canals using the software that accompanies the system. The mean values of the actual file lengths and the measurements of the radiographic images were submitted to 1-way analysis of variance and the Tukey test at a level of significance of 5%. The intraobserver reproducibility was assessed by the intraclass correlation coefficient. All combined image parameters showed excellent intraobserver agreement with intraclass correlation coefficient means higher than 0.98. The imaging parameter of 25 lp/mm and 16 bit associated with the use of the endodontic filter did not differ significantly from the actual file lengths when both file sizes were analyzed together or separately (P > .05). When the size 15 file was evaluated separately, only 8-bit images differed significantly from the actual file lengths (P ≤ .05). The combination of an endodontic filter with high spatial resolution and high contrast resolution is recommended for the determination of file lengths when using storage phosphor plates. Copyright © 2012 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  7. Factors influencing progressive collapse of the transposed necrotic lesion after transtrochanteric anterior rotational osteotomy for osteonecrosis of the femoral head.

    Science.gov (United States)

    Kubo, Y; Motomura, G; Ikemura, S; Sonoda, K; Yamamoto, T; Nakashima, Y

    2017-04-01

    Transtrochanteric anterior rotational osteotomy (ARO) for osteonecrosis of the femoral head (ONFH) can preserve for a long-time collapsed femoral head. Progressive collapse of anteriorly-transposed necrotic lesion leads to secondary arthritic changes and clinical failure. Critical factors influencing collapse of the transposed necrotic lesion after ARO remain largely unknown. Therefore, we performed a retrospective study of ARO to determine: (1) if preoperative collapse influences collapse of the transposed necrotic area, (2) if any other factor may influence collapse of the transposed necrotic area. We hypothesized the degree of preoperative femoral head collapse influences progressive collapse of the transposed necrotic lesion after ARO. We reviewed 47 hips in 42 patients with ONFH treated with ARO between 2000 and 2005 with a mean follow-up of 11.4 years (10-14 years). The occurrence of progressive collapse of the transposed necrotic lesion after ARO was examined using lateral radiographs taken at least once every year after ARO. The following factors were statistically analyzed: age, sex, body mass index, Harris Hip Score (HHS), preoperative level of collapse, extent of the necrotic lesion and postoperative intact ratio (ratio of the transposed intact articular surface of the femoral head). Progressive collapse of the transposed necrotic lesion (progressive collapse group) was seen in 17 hips (36%) during a mean period of 1.8 years (0.5-3.7 years) after ARO, which has developed within 4 years in all cases. Preoperative level of collapse in the progressive collapse group (4.4±1.4mm) was significantly larger than that in the non-progressive collapse group (2.1±1.0mm), which was independently associated with progressive collapse of the transposed necrotic lesion in multivariate analysis (P<0.0001) with cut off point of 2.98mm. In univariate analysis, lower preoperative HHS, severe extent of the necrotic lesion and the lower postoperative intact ratio were

  8. P-MITE: a database for plant miniature inverted-repeat transposable elements

    OpenAIRE

    Chen, Jiongjiong; Hu, Qun; Zhang, Yu; Lu, Chen; Kuang, Hanhui

    2013-01-01

    Miniature inverted-repeat transposable elements (MITEs) are prevalent in eukaryotic species including plants. MITE families vary dramatically and usually cannot be identified based on homology. In this study, we de novo identified MITEs from 41 plant species, using computer programs MITE Digger, MITE-Hunter and/or Repetitive Sequence with Precise Boundaries (RSPB). MITEs were found in all, but one (Cyanidioschyzon merolae), species. Combined with the MITEs identified previously from the rice ...

  9. The sunflower (Helianthus annuus L.) genome reflects a recent history of biased accumulation of transposable elements.

    Science.gov (United States)

    Staton, S Evan; Bakken, Bradley H; Blackman, Benjamin K; Chapman, Mark A; Kane, Nolan C; Tang, Shunxue; Ungerer, Mark C; Knapp, Steven J; Rieseberg, Loren H; Burke, John M

    2012-10-01

    Aside from polyploidy, transposable elements are the major drivers of genome size increases in plants. Thus, understanding the diversity and evolutionary dynamics of transposable elements in sunflower (Helianthus annuus L.), especially given its large genome size (∼3.5 Gb) and the well-documented cases of amplification of certain transposons within the genus, is of considerable importance for understanding the evolutionary history of this emerging model species. By analyzing approximately 25% of the sunflower genome from random sequence reads and assembled bacterial artificial chromosome (BAC) clones, we show that it is composed of over 81% transposable elements, 77% of which are long terminal repeat (LTR) retrotransposons. Moreover, the LTR retrotransposon fraction in BAC clones harboring genes is disproportionately composed of chromodomain-containing Gypsy LTR retrotransposons ('chromoviruses'), and the majority of the intact chromoviruses contain tandem chromodomain duplications. We show that there is a bias in the efficacy of homologous recombination in removing LTR retrotransposon DNA, thereby providing insight into the mechanisms associated with transposable element (TE) composition in the sunflower genome. We also show that the vast majority of observed LTR retrotransposon insertions have likely occurred since the origin of this species, providing further evidence that biased LTR retrotransposon activity has played a major role in shaping the chromatin and DNA landscape of the sunflower genome. Although our findings on LTR retrotransposon age and structure could be influenced by the selection of the BAC clones analyzed, a global analysis of random sequence reads indicates that the evolutionary patterns described herein apply to the sunflower genome as a whole. © 2012 The Authors. The Plant Journal © 2012 Blackwell Publishing Ltd.

  10. Gene disruptions using P transposable elements: an integral component of the Drosophila genome project.

    OpenAIRE

    Spradling, A C; Stern, D M; Kiss, I; Roote, J; Laverty, T; Rubin, G M

    1995-01-01

    Biologists require genetic as well as molecular tools to decipher genomic information and ultimately to understand gene function. The Berkeley Drosophila Genome Project is addressing these needs with a massive gene disruption project that uses individual, genetically engineered P transposable elements to target open reading frames throughout the Drosophila genome. DNA flanking the insertions is sequenced, thereby placing an extensive series of genetic markers on the physical genomic map and a...

  11. The biology and potential for genetic research of transposable elements in filamentous fungi

    OpenAIRE

    Fávaro,Léia Cecilia de Lima; Araújo,Welington Luiz de; Azevedo,João Lúcio de; Paccola-Meirelles,Luzia Doretto

    2005-01-01

    Recently many transposable elements have been identified and characterized in filamentous fungi, especially in species of agricultural, biotechnological and medical interest. Similar to the elements found in other eukaryotes, fungal transposons can be classified as class I elements (retrotransposons) that use RNA and reverse transcriptase and class II elements (DNA transposons) that use DNA. The changes (transposition and recombination) caused by transposons can supply wide-ranging genetic va...

  12. Modern X86 assembly language programming 32-bit, 64-bit, SSE, and AVX

    CERN Document Server

    Kusswurm, Daniel

    2014-01-01

    Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86 assembly language programming and the computational capabilities of the x86 platform. Major topics of the book include the following: 32-bit core architecture, data types, internal registers, memory addressing modes, and the basic instruction setX87 core architecture, register stack, special

  13. Integer Representations towards Efficient Counting in the Bit Probe Model

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Greve, Mark; Pandey, Vineet

    2011-01-01

    Abstract We consider the problem of representing numbers in close to optimal space and supporting increment, decrement, addition and subtraction operations efficiently. We study the problem in the bit probe model and analyse the number of bits read and written to perform the operations, both...... in the worst-case and in the average-case. A counter is space-optimal if it represents any number in the range [0,...,2 n  − 1] using exactly n bits. We provide a space-optimal counter which supports increment and decrement operations by reading at most n − 1 bits and writing at most 3 bits in the worst......-case. To the best of our knowledge, this is the first such representation which supports these operations by always reading strictly less than n bits. For redundant counters where we only need to represent numbers in the range [0,...,L] for some integer L bits, we define the efficiency...

  14. Test results judgment method based on BIT faults

    Directory of Open Access Journals (Sweden)

    Wang Gang

    2015-12-01

    Full Text Available Built-in-test (BIT is responsible for equipment fault detection, so the test data correctness directly influences diagnosis results. Equipment suffers all kinds of environment stresses, such as temperature, vibration, and electromagnetic stress. As embedded testing facility, BIT also suffers from these stresses and the interferences/faults are caused, so that the test course is influenced, resulting in incredible results. Therefore it is necessary to monitor test data and judge test failures. Stress monitor and BIT self-diagnosis would redound to BIT reliability, but the existing anti-jamming researches are mainly safeguard design and signal process. This paper focuses on test results monitor and BIT equipment (BITE failure judge, and a series of improved approaches is proposed. Firstly the stress influences on components are illustrated and the effects on the diagnosis results are summarized. Secondly a composite BIT program is proposed with information integration, and a stress monitor program is given. Thirdly, based on the detailed analysis of system faults and forms of BIT results, the test sequence control method is proposed. It assists BITE failure judge and reduces error probability. Finally the validation cases prove that these approaches enhance credibility.

  15. The Economics of BitCoin Price Formation

    OpenAIRE

    Ciaian, Pavel; Rajcaniova, Miroslava; Kancs, d'Artis

    2014-01-01

    This is the first article that studies BitCoin price formation by considering both the traditional determinants of currency price, e.g., market forces of supply and demand, and digital currencies specific factors, e.g., BitCoin attractiveness for investors and users. The conceptual framework is based on the Barro (1979) model, from which we derive testable hypotheses. Using daily data for five years (2009–2015) and applying time-series analytical mechanisms, we find that market forces and Bit...

  16. Fitness Probability Distribution of Bit-Flip Mutation.

    Science.gov (United States)

    Chicano, Francisco; Sutton, Andrew M; Whitley, L Darrell; Alba, Enrique

    2015-01-01

    Bit-flip mutation is a common mutation operator for evolutionary algorithms applied to optimize functions over binary strings. In this paper, we develop results from the theory of landscapes and Krawtchouk polynomials to exactly compute the probability distribution of fitness values of a binary string undergoing uniform bit-flip mutation. We prove that this probability distribution can be expressed as a polynomial in p, the probability of flipping each bit. We analyze these polynomials and provide closed-form expressions for an easy linear problem (Onemax), and an NP-hard problem, MAX-SAT. We also discuss a connection of the results with runtime analysis.

  17. Different Mass Processing Services in a Bit Repository

    DEFF Research Database (Denmark)

    Jurik, Bolette; Zierau, Eld

    2011-01-01

    This paper investigates how a general bit repository mass processing service using different programming models and platforms can be specified. Such a service is needed in large data archives, especially libraries, where different ways of doing mass processing is needed for different digital...... library tasks. Different hardware platforms as basis for mass processing will usually already exist for libraries as part of a bit preservation solution for long term bit preservation. The investigation of a general mass processing service shows that different aspects of mass processing are too dependent...

  18. Bit Manipulation Accelerator for Communication Systems Digital Signal Processor

    Directory of Open Access Journals (Sweden)

    Jeong Sug H

    2005-01-01

    Full Text Available This paper proposes application-specific instructions and their bit manipulation unit (BMU, which efficiently support scrambling, convolutional encoding, puncturing, interleaving, and bit stream multiplexing. The proposed DSP employs the BMU supporting parallel shift and XOR (exclusive-OR operations and bit insertion/extraction operations on multiple data. The proposed architecture has been modeled by VHDL and synthesized using the SEC 0.18 m standard cell library and the gate count of the BMU is only about 1700 gates. Performance comparisons show that the number of clock cycles can be reduced about for scrambling, convolutional encoding, and interleaving compared with existing DSPs.

  19. Bit Error Rate Minimizing Channel Shortening Equalizers for Single Carrier Cyclic Prefixed Systems

    National Research Council Canada - National Science Library

    Martin, Richard K; Vanbleu, Koen; Ysebaert, Geert

    2007-01-01

    .... Previous work on channel shortening has largely been in the context of digital subscriber lines, a wireline system that allows bit allocation, thus it has focused on maximizing the bit rate for a given bit error rate (BER...

  20. 2015 Big Windy, Oregon 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These data are LiDAR orthorectified aerial photographs (8-bit GeoTIFF format) within the Oregon Lidar Consortium Big Windy project area. The imagery coverage is...

  1. 2014 Metro, Oregon 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These data are LiDAR orthorectified aerial photographs (8-bit GeoTIFF format) within the Oregon Lidar Consortium Portland project area. The imagery coverage is...

  2. Experimental bit commitment based on quantum communication and special relativity.

    Science.gov (United States)

    Lunghi, T; Kaniewski, J; Bussières, F; Houlmann, R; Tomamichel, M; Kent, A; Gisin, N; Wehner, S; Zbinden, H

    2013-11-01

    Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob split into several agents exchanging classical and quantum information at times and locations suitably chosen to satisfy specific relativistic constraints. Here we report on an implementation of a bit commitment protocol using quantum communication and special relativity. Our protocol is based on [A. Kent, Phys. Rev. Lett. 109, 130501 (2012)] and has the advantage that it is practically feasible with arbitrary large separations between the agents in order to maximize the commitment time. By positioning agents in Geneva and Singapore, we obtain a commitment time of 15 ms. A security analysis considering experimental imperfections and finite statistics is presented.

  3. Instrumented Bit for In-Situ Spectroscopy (IBISS), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose to build and critically test the Instrumented Bit for In-Situ Spectroscopy (IBISS), a novel system for in-situ, rapid analyses of planetary subsurface...

  4. 2012 Sandy River, Oregon Natural Color 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These data are LiDAR orthorectified aerial photographs (8-bit GeoTIFF format) within the Oregon Lidar Consortium Sandy River project area. The imagery coverage is...

  5. Pseudo-random bit generator based on Chebyshev map

    Science.gov (United States)

    Stoyanov, B. P.

    2013-10-01

    In this paper, we study a pseudo-random bit generator based on two Chebyshev polynomial maps. The novel derivative algorithm shows perfect statistical properties established by number of statistical tests.

  6. Fast physical random bit generation with chaotic semiconductor lasers

    Science.gov (United States)

    Uchida, Atsushi; Amano, Kazuya; Inoue, Masaki; Hirano, Kunihito; Naito, Sunao; Someya, Hiroyuki; Oowada, Isao; Kurashige, Takayuki; Shiki, Masaru; Yoshimori, Shigeru; Yoshimura, Kazuyuki; Davis, Peter

    2008-12-01

    Random number generators in digital information systems make use of physical entropy sources such as electronic and photonic noise to add unpredictability to deterministically generated pseudo-random sequences. However, there is a large gap between the generation rates achieved with existing physical sources and the high data rates of many computation and communication systems; this is a fundamental weakness of these systems. Here we show that good quality random bit sequences can be generated at very fast bit rates using physical chaos in semiconductor lasers. Streams of bits that pass standard statistical tests for randomness have been generated at rates of up to 1.7 Gbps by sampling the fluctuating optical output of two chaotic lasers. This rate is an order of magnitude faster than that of previously reported devices for physical random bit generators with verified randomness. This means that the performance of random number generators can be greatly improved by using chaotic laser devices as physical entropy sources.

  7. Content Progressive Coding of Limited Bits/pixel Images

    DEFF Research Database (Denmark)

    Jensen, Ole Riis; Forchhammer, Søren

    1999-01-01

    A new lossless context based method for content progressive coding of limited bits/pixel images is proposed. Progressive coding is achieved by separating the image into contelnt layers. Digital maps are compressed up to 3 times better than GIF.......A new lossless context based method for content progressive coding of limited bits/pixel images is proposed. Progressive coding is achieved by separating the image into contelnt layers. Digital maps are compressed up to 3 times better than GIF....

  8. 8-Bit Gray Scale Images of Fingerprint Image Groups

    Science.gov (United States)

    NIST 8-Bit Gray Scale Images of Fingerprint Image Groups (Web, free access)   The NIST database of fingerprint images contains 2000 8-bit gray scale fingerprint image pairs. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  9. Quantum states representing perfectly secure bits are always distillable

    International Nuclear Information System (INIS)

    Horodecki, Pawel; Augusiak, Remigiusz

    2006-01-01

    It is proven that recently introduced states with perfectly secure bits of cryptographic key (private states representing secure bit) [K. Horodecki et al., Phys. Rev. Lett. 94, 160502 (2005)] as well as its multipartite and higher dimension generalizations always represent distillable entanglement. The corresponding lower bounds on distillable entanglement are provided. We also present a simple alternative proof that for any bipartite quantum state entanglement cost is an upper bound on a distillable cryptographic key in a bipartite scenario

  10. VCSEL Scaling, Laser Integration on Silicon, and Bit Energy

    Science.gov (United States)

    2017-03-01

    Silicon Photonics: Figure 1 shows the electronic circuitry and comparison key to analyzing photonic bit energies for transceivers used in data centers...VCSEL Scaling, Laser Integration on Silicon , and Bit Energy D.G. Deppe,1,2 Ja. Leshin,1 and Je. Leshin1 1CREOL, College of Optics & Photonics...laser; (000.0000) General [For codes, see www.opticsinfobase.org/submit/ocis.] Keywords: VCSELs, Nanoscale lasers, optical interconnects, silicon

  11. Comparison and status of 32 bit backplane bus architectures

    International Nuclear Information System (INIS)

    Muller, K.D.

    1985-01-01

    With the introduction of 32 bit microprocessors several new 32 bit backplane bus architectures have been developed and are in the process for standardization. Among these are Future Bus (IEEE P896.1), VME-Bus (IEEE 1014), MULTIBUS II, Nu-Bus and Fastbus (IEEE 960). The paper describes and compares the main features of these bus architectures and mentions the status of national and international standardization efforts

  12. A Heuristic Optimal Discrete Bit Allocation Algorithm for Margin Maximization in DMT Systems

    Directory of Open Access Journals (Sweden)

    Dong Shi-Wei

    2007-01-01

    Full Text Available A heuristic optimal discrete bit allocation algorithm is proposed for solving the margin maximization problem in discrete multitone (DMT systems. Starting from an initial equal power assignment bit distribution, the proposed algorithm employs a multistaged bit rate allocation scheme to meet the target rate. If the total bit rate is far from the target rate, a multiple-bits loading procedure is used to obtain a bit allocation close to the target rate. When close to the target rate, a parallel bit-loading procedure is used to achieve the target rate and this is computationally more efficient than conventional greedy bit-loading algorithm. Finally, the target bit rate distribution is checked, if it is efficient, then it is also the optimal solution; else, optimal bit distribution can be obtained only by few bit swaps. Simulation results using the standard asymmetric digital subscriber line (ADSL test loops show that the proposed algorithm is efficient for practical DMT transmissions.

  13. A Heuristic Optimal Discrete Bit Allocation Algorithm for Margin Maximization in DMT Systems

    Science.gov (United States)

    Zhu, Li-Ping; Yao, Yan; Zhou, Shi-Dong; Dong, Shi-Wei

    2007-12-01

    A heuristic optimal discrete bit allocation algorithm is proposed for solving the margin maximization problem in discrete multitone (DMT) systems. Starting from an initial equal power assignment bit distribution, the proposed algorithm employs a multistaged bit rate allocation scheme to meet the target rate. If the total bit rate is far from the target rate, a multiple-bits loading procedure is used to obtain a bit allocation close to the target rate. When close to the target rate, a parallel bit-loading procedure is used to achieve the target rate and this is computationally more efficient than conventional greedy bit-loading algorithm. Finally, the target bit rate distribution is checked, if it is efficient, then it is also the optimal solution; else, optimal bit distribution can be obtained only by few bit swaps. Simulation results using the standard asymmetric digital subscriber line (ADSL) test loops show that the proposed algorithm is efficient for practical DMT transmissions.

  14. SpecBit, DecayBit and PrecisionBit: GAMBIT modules for computing mass spectra, particle decay rates and precision observables

    Science.gov (United States)

    Athron, Peter; Balázs, Csaba; Dal, Lars A.; Edsjö, Joakim; Farmer, Ben; Gonzalo, Tomás E.; Kvellestad, Anders; McKay, James; Putze, Antje; Rogan, Chris; Scott, Pat; Weniger, Christoph; White, Martin

    2018-01-01

    We present the GAMBIT modules SpecBit, DecayBit and PrecisionBit. Together they provide a new framework for linking publicly available spectrum generators, decay codes and other precision observable calculations in a physically and statistically consistent manner. This allows users to automatically run various combinations of existing codes as if they are a single package. The modular design allows software packages fulfilling the same role to be exchanged freely at runtime, with the results presented in a common format that can easily be passed to downstream dark matter, collider and flavour codes. These modules constitute an essential part of the broader GAMBIT framework, a major new software package for performing global fits. In this paper we present the observable calculations, data, and likelihood functions implemented in the three modules, as well as the conventions and assumptions used in interfacing them with external codes. We also present 3-BIT-HIT, a command-line utility for computing mass spectra, couplings, decays and precision observables in the MSSM, which shows how the three modules can easily be used independently of GAMBIT.

  15. DNA demethylases target promoter transposable elements to positively regulate stress responsive genes in Arabidopsis.

    Science.gov (United States)

    Le, Tuan-Ngoc; Schumann, Ulrike; Smith, Neil A; Tiwari, Sameer; Au, Phil Chi Khang; Zhu, Qian-Hao; Taylor, Jennifer M; Kazan, Kemal; Llewellyn, Danny J; Zhang, Ren; Dennis, Elizabeth S; Wang, Ming-Bo

    2014-09-17

    DNA demethylases regulate DNA methylation levels in eukaryotes. Arabidopsis encodes four DNA demethylases, DEMETER (DME), REPRESSOR OF SILENCING 1 (ROS1), DEMETER-LIKE 2 (DML2), and DML3. While DME is involved in maternal specific gene expression during seed development, the biological function of the remaining DNA demethylases remains unclear. We show that ROS1, DML2, and DML3 play a role in fungal disease resistance in Arabidopsis. A triple DNA demethylase mutant, rdd (ros1 dml2 dml3), shows increased susceptibility to the fungal pathogen Fusarium oxysporum. We identify 348 genes differentially expressed in rdd relative to wild type, and a significant proportion of these genes are downregulated in rdd and have functions in stress response, suggesting that DNA demethylases maintain or positively regulate the expression of stress response genes required for F. oxysporum resistance. The rdd-downregulated stress response genes are enriched for short transposable element sequences in their promoters. Many of these transposable elements and their surrounding sequences show localized DNA methylation changes in rdd, and a general reduction in CHH methylation, suggesting that RNA-directed DNA methylation (RdDM), responsible for CHH methylation, may participate in DNA demethylase-mediated regulation of stress response genes. Many of the rdd-downregulated stress response genes are downregulated in the RdDM mutants nrpd1 and nrpe1, and the RdDM mutants nrpe1 and ago4 show enhanced susceptibility to F. oxysporum infection. Our results suggest that a primary function of DNA demethylases in plants is to regulate the expression of stress response genes by targeting promoter transposable element sequences.

  16. Interspecies insertion polymorphism analysis reveals recent activity of transposable elements in extant coelacanths.

    Directory of Open Access Journals (Sweden)

    Magali Naville

    Full Text Available Coelacanths are lobe-finned fish represented by two extant species, Latimeria chalumnae in South Africa and Comoros and L. menadoensis in Indonesia. Due to their intermediate phylogenetic position between ray-finned fish and tetrapods in the vertebrate lineage, they are of great interest from an evolutionary point of view. In addition, extant specimens look similar to 300 million-year-old fossils; because of their apparent slowly evolving morphology, coelacanths have been often described as « living fossils ». As an underlying cause of such a morphological stasis, several authors have proposed a slow evolution of the coelacanth genome. Accordingly, sequencing of the L. chalumnae genome has revealed a globally low substitution rate for protein-coding regions compared to other vertebrates. However, genome and gene evolution can also be influenced by transposable elements, which form a major and dynamic part of vertebrate genomes through their ability to move, duplicate and recombine. In this work, we have searched for evidence of transposition activity in coelacanth genomes through the comparative analysis of orthologous genomic regions from both Latimeria species. Comparison of 5.7 Mb (0.2% of the L. chalumnae genome with orthologous Bacterial Artificial Chromosome clones from L. menadoensis allowed the identification of 27 species-specific transposable element insertions, with a strong relative contribution of CR1 non-LTR retrotransposons. Species-specific homologous recombination between the long terminal repeats of a new coelacanth endogenous retrovirus was also detected. Our analysis suggests that transposon activity is responsible for at least 0.6% of genome divergence between both Latimeria species. Taken together, this study demonstrates that coelacanth genomes are not evolutionary inert: they contain recently active transposable elements, which have significantly contributed to post-speciation genome divergence in Latimeria.

  17. Orthographic Reading Deficits in Dyslexic Japanese Children: Examining the Transposed-Letter Effect in the Color-Word Stroop Paradigm

    Science.gov (United States)

    Ogawa, Shino; Shibasaki, Masahiro; Isomura, Tomoko; Masataka, Nobuo

    2016-01-01

    In orthographic reading, the transposed-letter effect (TLE) is the perception of a transposed-letter position word such as “cholocate” as the correct word “chocolate.” Although previous studies on dyslexic children using alphabetic languages have reported such orthographic reading deficits, the extent of orthographic reading impairment in dyslexic Japanese children has remained unknown. This study examined the TLE in dyslexic Japanese children using the color-word Stroop paradigm comprising congruent and incongruent Japanese hiragana words with correct and transposed-letter positions. We found that typically developed children exhibited Stroop effects in Japanese hiragana words with both correct and transposed-letter positions, thus indicating the presence of TLE. In contrast, dyslexic children indicated Stroop effects in correct letter positions in Japanese words but not in transposed, which indicated an absence of the TLE. These results suggest that dyslexic Japanese children, similar to dyslexic children using alphabetic languages, may also have a problem with orthographic reading. PMID:27303331

  18. Germline transformation of Aedes fluviatilis (Diptera:Culicidae with the piggyBac transposable element

    Directory of Open Access Journals (Sweden)

    Flávia Guimarães Rodrigues

    2006-11-01

    Full Text Available The technique to generate transgenic mosquitoes requires adaptation for each target species because of aspects related to species biology, sensitivity to manipulation and rearing conditions. Here we tested different parameters on the microinjection procedure in order to obtain a transgenic Neotropical mosquito species. By using a transposon-based strategy we were able to successfully transform Aedes fluviatilis (Lutz, which can be used as an avian malaria model. These results demonstrate the usefulness of the piggyBac transposable element as a transformation vector for Neotropical mosquito species and opens up new research frontiers for South American mosquito vectors.

  19. Distribution and conservation of the transposable element gypsy in drosophilid species

    Directory of Open Access Journals (Sweden)

    Fabiana Herédia

    2007-01-01

    Full Text Available In an attempt to understand the dynamics of transposable elements (T'S in the genome of host species, we investigated the distribution, representativeness and conservation of DNA sequences homologous to the Drosophila melanogaster gypsy retrotransposon in 42 drosophilid species. Our results extended the knowledge about the wide distribution of gypsy in the genus Drosophila, including several Neotropical species not previously studied. The gypsy-like sequences showed high divergence compared to the D. melanogaster gypsy element. Furthermore, the conservation of the restriction sites between gypsy sequences from phylogenetically unrelated species pointed to a more complex evolutionary picture, which includes the possibility of the horizontal transfer events already described for this retrotransposon.

  20. Topologies for optical interconnection networks based on the optical transpose interconnection system.

    Science.gov (United States)

    Coudert, D; Ferreira, A; Muñoz, X

    2000-06-10

    Many results exist in the literature describing technological and theoretical advances in optical network topologies and design. However, an essential effort has yet to be made in linking those results together. We propose a step in this direction by giving optical layouts for several graph-theoretical topologies studied in the literature, using the optical transpose interconnection system (OTIS) architecture. These topologies include the family of partitioned optical passive star (POPS) and stack-Kautz networks as well as a generalization of the Kautz and the de Bruijn digraphs.

  1. Hobo-like transposable elements as non-drosophilid gene vectors

    International Nuclear Information System (INIS)

    O'Brochta, D.A.; Warren, W.D.; Saville, K.J.; Whyard, S.; Mende, H.A.; Pinkerton, A.C.; Coates, C.J.; Atkinson, P.W.

    1998-01-01

    Using genetic and physical methods we discovered short-inverted repeat type transposable elements in non-drosophilid insects including, Bactorcera tryoni, Musca domestica, Musca vetustissima and Lucilia cuprina. These elements are related to hobo, Ac and Tam3. The Hermes element from M domestica is 2749 bp in length and has terminal inverted repeats and a transposase coding region very similar to those in hobo. Hermes is functional in M Domestic and can act as a gene vector in this species. When Hermes is introduced into D. melanogaster it is hyperactive, relative to existing vector systems used in this species. Hermes will be useful as a gene vector. (author)

  2. Relating drilling parameters at the bit-rock interface: theoretical and field studies

    Energy Technology Data Exchange (ETDEWEB)

    Sinkala, T. (Luleaa University of Technology, Luleaa (Sweden). Division of Mining Equipment Engineering)

    1991-01-01

    An explicit expression relating drilling parameters at the bit-rock contact is derived. The expression estimates the minimum torque, related to bit-rock contact only, required to maintain constant bit rotation. Theoretical results from the developed bit-rock contact relation agree very satisfactorily with those obtained from field tests and other previous experience. 15 refs., 8 figs., 2 tabs.

  3. Test plan for core sampling drill bit temperature monitor

    International Nuclear Information System (INIS)

    Francis, P.M.

    1994-01-01

    At WHC, one of the functions of the Tank Waste Remediation System division is sampling waste tanks to characterize their contents. The push-mode core sampling truck is currently used to take samples of liquid and sludge. Sampling of tanks containing hard salt cake is to be performed with the rotary-mode core sampling system, consisting of the core sample truck, mobile exhauster unit, and ancillary subsystems. When drilling through the salt cake material, friction and heat can be generated in the drill bit. Based upon tank safety reviews, it has been determined that the drill bit temperature must not exceed 180 C, due to the potential reactivity of tank contents at this temperature. Consequently, a drill bit temperature limit of 150 C was established for operation of the core sample truck to have an adequate margin of safety. Unpredictable factors, such as localized heating, cause this buffer to be so great. The most desirable safeguard against exceeding this threshold is bit temperature monitoring . This document describes the recommended plan for testing the prototype of a drill bit temperature monitor developed for core sampling by Sandia National Labs. The device will be tested at their facilities. This test plan documents the tests that Westinghouse Hanford Company considers necessary for effective testing of the system

  4. DSC and universal bit-level combining for HARQ systems

    Directory of Open Access Journals (Sweden)

    Lv Tiejun

    2011-01-01

    Full Text Available Abstract This paper proposes a Dempster -Shafer theory based combining scheme for single-input single-output (SISO systems with hybrid automatic retransmission request (HARQ, referred to as DSC, in which two methods for soft information calculations are developed for equiprobable (EP and non-equiprobable (NEP sources, respectively. One is based on the distance from the received signal to the decision candidate set consisting of adjacent constellation points when the source bits are equiprobable, and the corresponding DSC is regarded as DSC-D. The other is based on the posterior probability of the transmitted signals when the priori probability for the NEP source bits is available, and the corresponding DSC is regarded as DSC-APP. For the diverse EP and NEP source cases, both DSCD and DSC-APP are superior to maximal ratio combining, the so-called optimal combining scheme for SISO systems. Moreover, the robustness of the proposed DSC is illustrated by the simulations performed in Rayleigh channel and AWGN channel, respectively. The results show that the proposed DSC is insensitive to and especially applicable to the fading channels. In addition, a DS detection-aided bit-level DS combining scheme is proposed for multiple-input multiple-output--HARQ systems. The bit-level DS combining is deduced to be a universal scheme, and the traditional log-likelihood-ratio combining is a special case when the likelihood probability is used as bit-level soft information.

  5. Very low bit rate video coding of moving targets

    Science.gov (United States)

    Garcia, Jose A.; Rodriguez-Sanchez, Rosa; Fdez-Valdivia, Joaquin; Martinez-Baena, Javier

    2006-03-01

    We propose a video coding scheme to improve moving-target detection at very low bit rate, based on two key features: energy-based quantizer formation, and optimized interquantizer and intraquantizer prioritization. Rational Embedded Wavelet Video Coding (REVIC) is a fully implemented software video codec of low complexity and without motion compensated filtering to provide additional simplicity, adaptivity, and error resilience. It is shown to be quite effective in video coding of moving targets (e.g., military vehicles) at very low bit rates, while retaining the attributes of complete embeddedness for progressive transmission and scalability by fidelity and resolution. The proposed coding technique improves the explanatory power of decoded sequences (to achieve maximum target detection versus bit-rate performance) for a video compression system. The explanatory power of compressed sequences is important in surveillance applications, where trained video analysts may utilize decoded sequences to support decision processes in strategic, operational, and tactical tasks.

  6. BitCube: A Bottom-Up Cubing Engineering

    Science.gov (United States)

    Ferro, Alfredo; Giugno, Rosalba; Puglisi, Piera Laura; Pulvirenti, Alfredo

    Enhancing on line analytical processing through efficient cube computation plays a key role in Data Warehouse management. Hashing, grouping and mining techniques are commonly used to improve cube pre-computation. BitCube, a fast cubing method which uses bitmaps as inverted indexes for grouping, is presented. It horizontally partitions data according to the values of one dimension and for each resulting fragment it performs grouping following bottom-up criteria. BitCube allows also partial materialization based on iceberg conditions to treat large datasets for which a full cube pre-computation is too expensive. Space requirement of bitmaps is optimized by applying an adaption of the WAH compression technique. Experimental analysis, on both synthetic and real datasets, shows that BitCube outperforms previous algorithms for full cube computation and results comparable on iceberg cubing.

  7. Security bound of cheat sensitive quantum bit commitment.

    Science.gov (United States)

    He, Guang Ping

    2015-03-23

    Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.

  8. Security bound of cheat sensitive quantum bit commitment

    Science.gov (United States)

    He, Guang Ping

    2015-03-01

    Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.

  9. Low Bit Rate Motion Video Coder/Decoder For Teleconferencing

    Science.gov (United States)

    Koga, T.; Niwa, K.; Iijima, Y.; Iinuma, K.

    1987-07-01

    This paper describes motion video compression transmission for teleconferencing at a subprimary rate, i.e., at 384 kbits/s, including audio signal through the integrated services digital network (ISDN) HO channel. A subprimary rate video coder/decoder (codec), NETEC-XV, is available commercially that can operate at any bit rate (in multiples of 64 kbits/s) from 384 to 2048 kbits/s. In this paper, new algorithms are described that have been very useful in lowering the bit rate to 384 kbits/s. These algorithms are (1) separation of moving and still parts, followed by encoding of the two parts using different sets of parameters, and (2) scene change detection and its application to encoding parameter control. According to a brief subjective evaluation, the codec provides good picture quality even at a transmission bit rate of 384 kbits/s.

  10. Intrinsic Characteristics of Neighboring DNA Modulate Transposable Element Activity in Drosophila melanogaster

    Science.gov (United States)

    Esnault, Caroline; Palavesam, Azhahianambi; Pilitt, Kristina; O'Brochta, David A.

    2011-01-01

    Identifying factors influencing transposable element activity is essential for understanding how these elements impact genomes and their evolution as well as for fully exploiting them as functional genomics tools and gene-therapy vectors. Using a genetics-based approach, the influence of genomic position on piggyBac mobility in Drosophila melanogaster was assessed while controlling for element structure, genetic background, and transposase concentration. The mobility of piggyBac elements varied over more than two orders of magnitude solely as a result of their locations within the genome. The influence of genomic position on element activities was independent of factors resulting in position-dependent transgene expression (“position effects”). Elements could be relocated to new genomic locations without altering their activity if ≥500 bp of genomic DNA originally flanking the element was also relocated. Local intrinsic factors within the neighboring DNA that determined the activity of piggyBac elements were portable not only within the genome but also when elements were moved to plasmids. The predicted bendability of the first 50 bp flanking the 5′ and 3′ termini of piggyBac elements could account for 60% of the variance in position-dependent activity observed among elements. These results are significant because positional influences on transposable element activities will impact patterns of accumulation of elements within genomes. Manipulating and controlling the local sequence context of piggyBac elements could be a powerful, novel way of optimizing gene vector activity. PMID:20944016

  11. The role of transposable elements in health and diseases of the central nervous system.

    Science.gov (United States)

    Reilly, Matthew T; Faulkner, Geoffrey J; Dubnau, Joshua; Ponomarev, Igor; Gage, Fred H

    2013-11-06

    First discovered in maize by Barbara McClintock in the 1940s, transposable elements (TEs) are DNA sequences that in some cases have the ability to move along chromosomes or "transpose" in the genome. This revolutionary finding was initially met with resistance by the scientific community and viewed by some as heretical. A large body of knowledge has accumulated over the last 60 years on the biology of TEs. Indeed, it is now known that TEs can generate genomic instability and reconfigure gene expression networks both in the germline and somatic cells. This review highlights recent findings on the role of TEs in health and diseases of the CNS, which were presented at the 2013 Society for Neuroscience meeting. The work of the speakers in this symposium shows that TEs are expressed and active in the brain, challenging the dogma that neuronal genomes are static and revealing that they are susceptible to somatic genomic alterations. These new findings on TE expression and function in the CNS have major implications for understanding the neuroplasticity of the brain, which could hypothetically have a role in shaping individual behavior and contribute to vulnerability to disease.

  12. An efficient tensor transpose algorithm for multicore CPU, Intel Xeon Phi, and NVidia Tesla GPU

    Science.gov (United States)

    Lyakh, Dmitry I.

    2015-04-01

    An efficient parallel tensor transpose algorithm is suggested for shared-memory computing units, namely, multicore CPU, Intel Xeon Phi, and NVidia GPU. The algorithm operates on dense tensors (multidimensional arrays) and is based on the optimization of cache utilization on x86 CPU and the use of shared memory on NVidia GPU. From the applied side, the ultimate goal is to minimize the overhead encountered in the transformation of tensor contractions into matrix multiplications in computer implementations of advanced methods of quantum many-body theory (e.g., in electronic structure theory and nuclear physics). A particular accent is made on higher-dimensional tensors that typically appear in the so-called multireference correlated methods of electronic structure theory. Depending on tensor dimensionality, the presented optimized algorithms can achieve an order of magnitude speedup on x86 CPUs and 2-3 times speedup on NVidia Tesla K20X GPU with respect to the naïve scattering algorithm (no memory access optimization). The tensor transpose routines developed in this work have been incorporated into a general-purpose tensor algebra library (TAL-SH).

  13. ncRNAclassifier: a tool for detection and classification of transposable element sequences in RNA hairpins

    Directory of Open Access Journals (Sweden)

    Tempel Sébastien

    2012-09-01

    Full Text Available Abstract Background Inverted repeat genes encode precursor RNAs characterized by hairpin structures. These RNA hairpins are then metabolized by biosynthetic pathways to produce functional small RNAs. In eukaryotic genomes, short non-autonomous transposable elements can have similar size and hairpin structures as non-coding precursor RNAs. This resemblance leads to problems annotating small RNAs. Results We mapped all microRNA precursors from miRBASE to several genomes and studied the repetition and dispersion of the corresponding loci. We then searched for repetitive elements overlapping these loci. We developed an automatic method called ncRNAclassifier to classify pre-ncRNAs according to their relationship with transposable elements (TEs. We showed that there is a correlation between the number of scattered occurrences of ncRNA precursor candidates and the presence of TEs. We applied ncRNAclassifier on six chordate genomes and report our findings. Among the 1,426 human and 721 mouse pre-miRNAs of miRBase, we identified 235 and 68 mis-annotated pre-miRNAs respectively corresponding completely to TEs. Conclusions We provide a tool enabling the identification of repetitive elements in precursor ncRNA sequences. ncRNAclassifier is available at http://EvryRNA.ibisc.univ-evry.fr.

  14. Multidisciplinary Treatment of Severe Upper Incisor Root Resorption Secondary to Transposed Canine.

    Science.gov (United States)

    Korkmaz, Yasemin Nur; Yagci, Filiz

    2017-02-01

    Tooth transposition is a rare dental anomaly that could lead to undesirable side effects on other teeth. This case report aims to describe the multidisciplinary treatment of a patient with a severely resorbed permanent maxillary central incisor due to transposition with the permanent canine. A girl aged 13 years and 7 months with a chief complaint of a pink spot on her maxillary left incisor with a slightly erupted tooth above it was referred to our clinic. Her left maxillary canine was transposed to her left central incisor site. The left canine was impacted and had caused severe resorption of the left central incisor root. Her maxillary left canine was substituted for the central incisor after the compulsory extraction of her left central incisor. The canine was prosthetically restored after orthodontic treatment. The results were stable 1 year after treatment had been completed. Orthodontic treatment in coordination with other dental specialties like prosthodontics, periodontology and oral and maxillofacial surgery can provide functional and esthetic outcome in cases of severely transposed canines. This is a rare case of transposition that shows the significant root resorption on the maxillary central incisor due to the ectopic eruption of the canine. Canine substitution for the central incisor was chosen as a treatment plan instead of placing an implant. An esthetic smile and a functional occlusion were established at the end of the treatment. (J Esthet Restor Dent 29:5-12, 2017). © 2016 Wiley Periodicals, Inc.

  15. The application of the high throughput sequencing technology in the transposable elements.

    Science.gov (United States)

    Liu, Zhen; Xu, Jian-hong

    2015-09-01

    High throughput sequencing technology has dramatically improved the efficiency of DNA sequencing, and decreased the costs to a great extent. Meanwhile, this technology usually has advantages of better specificity, higher sensitivity and accuracy. Therefore, it has been applied to the research on genetic variations, transcriptomics and epigenomics. Recently, this technology has been widely employed in the studies of transposable elements and has achieved fruitful results. In this review, we summarize the application of high throughput sequencing technology in the fields of transposable elements, including the estimation of transposon content, preference of target sites and distribution, insertion polymorphism and population frequency, identification of rare copies, transposon horizontal transfers as well as transposon tagging. We also briefly introduce the major common sequencing strategies and algorithms, their advantages and disadvantages, and the corresponding solutions. Finally, we envision the developing trends of high throughput sequencing technology, especially the third generation sequencing technology, and its application in transposon studies in the future, hopefully providing a comprehensive understanding and reference for related scientific researchers.

  16. The Cryptographic Security of the Sum of Bits

    Science.gov (United States)

    1984-06-01

    Shamir, "On the Cryptographic Security of Single RSA bits," 15th STOC, lg83, pp.421-430. 3. L. Blum , M. Blum , and M. Shub , "A Simple Secure Pseudo...our paper we consider the sum of bits predicate and show that it is secure in the same sense. Blum , Blum , and Shub3 have designed a pseudo-random...Combining these two facts we obtain the following: Fact 3: E(x)=E(x2-1 mod N) if and only if E(r)+ 1 = E(r+ k). If x and y are non-negative integers, let C

  17. Foldable Instrumented Bits for Ultrasonic/Sonic Penetrators

    Science.gov (United States)

    Bar-Cohen, Yoseph; Badescu, Mircea; Iskenderian, Theodore; Sherrit, Stewart; Bao, Xiaoqi; Linderman, Randel

    2010-01-01

    Long tool bits are undergoing development that can be stowed compactly until used as rock- or ground-penetrating probes actuated by ultrasonic/sonic mechanisms. These bits are designed to be folded or rolled into compact form for transport to exploration sites, where they are to be connected to their ultrasonic/ sonic actuation mechanisms and unfolded or unrolled to their full lengths for penetrating ground or rock to relatively large depths. These bits can be designed to acquire rock or soil samples and/or to be equipped with sensors for measuring properties of rock or soil in situ. These bits can also be designed to be withdrawn from the ground, restowed, and transported for reuse at different exploration sites. Apparatuses based on the concept of a probe actuated by an ultrasonic/sonic mechanism have been described in numerous prior NASA Tech Briefs articles, the most recent and relevant being "Ultrasonic/ Sonic Impacting Penetrators" (NPO-41666) NASA Tech Briefs, Vol. 32, No. 4 (April 2008), page 58. All of those apparatuses are variations on the basic theme of the earliest ones, denoted ultrasonic/sonic drill corers (USDCs). To recapitulate: An apparatus of this type includes a lightweight, low-power, piezoelectrically driven actuator in which ultrasonic and sonic vibrations are generated and coupled to a tool bit. The combination of ultrasonic and sonic vibrations gives rise to a hammering action (and a resulting chiseling action at the tip of the tool bit) that is more effective for drilling than is the microhammering action of ultrasonic vibrations alone. The hammering and chiseling actions are so effective that the size of the axial force needed to make the tool bit advance into soil, rock, or another material of interest is much smaller than in ordinary twist drilling, ordinary hammering, or ordinary steady pushing. Examples of properties that could be measured by use of an instrumented tool bit include electrical conductivity, permittivity, magnetic

  18. Transistor device for multi-bit non-volatile storage

    International Nuclear Information System (INIS)

    Tan, S.G.; Jalil, M.B.A.; Kumar, Vimal; Liew, Thomas; Teo, K.L.; Chong, T.C.

    2006-01-01

    We propose a transistor model that incorporates multiple storage elements within a single transistor device. This device is thus smaller in size compared to the magnetoresistive random access memory (MRAM) with the same number of storage bits. The device model can function in both the current as well as voltage detection mode. Simulations were carried out at higher temperature, taking into consideration the spread of electron density above the Fermi level. We found that linear detection of conductance variation with the stored binary value can be achieved for a 3-bit storage device up to a temperature of 350 K

  19. How to deal with malleability of BitCoin transactions

    OpenAIRE

    Andrychowicz, Marcin; Dziembowski, Stefan; Malinowski, Daniel; Mazurek, Łukasz

    2013-01-01

    BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction's hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a "refund" transaction to withdraw a deposit in a case of the protocol interruption. In this short note, we show a gener...

  20. How to Convert a Flavor of Quantum Bit Commitment

    DEFF Research Database (Denmark)

    Crepeau, Claude; Legare, Frédéric; Salvail, Louis

    2001-01-01

    In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing QBC scheme. For a security parameter n, the construction of the statistically concealing scheme requires O(n2......) executions of the statistically binding scheme. As a consequence, statistically concealing but computationally binding quantum bit commitments can be based upon any family of quantum one-way functions. Such a construction is not known to exist in the classical world....

  1. Modeling of Bit Error Rate in Cascaded 2R Regenerators

    DEFF Research Database (Denmark)

    Öhman, Filip; Mørk, Jesper

    2006-01-01

    This paper presents a simple and efficient model for estimating the bit error rate in a cascade of optical 2R-regenerators. The model includes the influences of of amplifier noise, finite extinction ratio and nonlinear reshaping. The interplay between the different signal impairments and the rege......This paper presents a simple and efficient model for estimating the bit error rate in a cascade of optical 2R-regenerators. The model includes the influences of of amplifier noise, finite extinction ratio and nonlinear reshaping. The interplay between the different signal impairments...

  2. Development of a jet-assisted polycrystalline diamond drill bit

    Energy Technology Data Exchange (ETDEWEB)

    Pixton, D.S.; Hall, D.R.; Summers, D.A.; Gertsch, R.E.

    1997-12-31

    A preliminary investigation has been conducted to evaluate the technical feasibility and potential economic benefits of a new type of drill bit. This bit transmits both rotary and percussive drilling forces to the rock face, and augments this cutting action with high-pressure mud jets. Both the percussive drilling forces and the mud jets are generated down-hole by a mud-actuated hammer. Initial laboratory studies show that rate of penetration increases on the order of a factor of two over unaugmented rotary and/or percussive drilling rates are possible with jet-assistance.

  3. Hanford coring bit temperature monitor development testing results report

    International Nuclear Information System (INIS)

    Rey, D.

    1995-05-01

    Instrumentation which directly monitors the temperature of a coring bit used to retrieve core samples of high level nuclear waste stored in tanks at Hanford was developed at Sandia National Laboratories. Monitoring the temperature of the coring bit is desired to enhance the safety of the coring operations. A unique application of mature technologies was used to accomplish the measurement. This report documents the results of development testing performed at Sandia to assure the instrumentation will withstand the severe environments present in the waste tanks

  4. Cloning the entanglement of a pair of quantum bits

    International Nuclear Information System (INIS)

    Lamoureux, Louis-Philippe; Navez, Patrick; Cerf, Nicolas J.; Fiurasek, Jaromir

    2004-01-01

    It is shown that any quantum operation that perfectly clones the entanglement of all maximally entangled qubit pairs cannot preserve separability. This 'entanglement no-cloning' principle naturally suggests that some approximate cloning of entanglement is nevertheless allowed by quantum mechanics. We investigate a separability-preserving optimal cloning machine that duplicates all maximally entangled states of two qubits, resulting in 0.285 bits of entanglement per clone, while a local cloning machine only yields 0.060 bits of entanglement per clone

  5. Architecture of 32 bit CISC (Complex Instruction Set Computer) microprocessors

    International Nuclear Information System (INIS)

    Jove, T.M.; Ayguade, E.; Valero, M.

    1988-01-01

    In this paper we describe the main topics about the architecture of the best known 32-bit CISC microprocessors; i80386, MC68000 family, NS32000 series and Z80000. We focus on the high level languages support, operating system design facilities, memory management, techniques to speed up the overall performance and program debugging facilities. (Author)

  6. Parity Bit Replenishment for JPEG 2000-Based Video Streaming

    Directory of Open Access Journals (Sweden)

    François-Olivier Devaux

    2009-01-01

    Full Text Available This paper envisions coding with side information to design a highly scalable video codec. To achieve fine-grained scalability in terms of resolution, quality, and spatial access as well as temporal access to individual frames, the JPEG 2000 coding algorithm has been considered as the reference algorithm to encode INTRA information, and coding with side information has been envisioned to refresh the blocks that change between two consecutive images of a video sequence. One advantage of coding with side information compared to conventional closed-loop hybrid video coding schemes lies in the fact that parity bits are designed to correct stochastic errors and not to encode deterministic prediction errors. This enables the codec to support some desynchronization between the encoder and the decoder, which is particularly helpful to adapt on the fly pre-encoded content to fluctuating network resources and/or user preferences in terms of regions of interest. Regarding the coding scheme itself, to preserve both quality scalability and compliance to the JPEG 2000 wavelet representation, a particular attention has been devoted to the definition of a practical coding framework able to exploit not only the temporal but also spatial correlation among wavelet subbands coefficients, while computing the parity bits on subsets of wavelet bit-planes. Simulations have shown that compared to pure INTRA-based conditional replenishment solutions, the addition of the parity bits option decreases the transmission cost in terms of bandwidth, while preserving access flexibility.

  7. Some observations on the Bit-Search Generator

    OpenAIRE

    Mitchell, Chris J.

    2005-01-01

    In this short note an alternative definition of the Bit-Search Generator (BSG) is provided. This leads to a discussion of both the security of the BSG and ways in which it might be modified to either improve its rate or increase its security.

  8. KEAMANAN CITRA DENGAN WATERMARKING MENGGUNAKAN PENGEMBANGAN ALGORITMA LEAST SIGNIFICANT BIT

    Directory of Open Access Journals (Sweden)

    Kurniawan Kurniawan

    2015-01-01

    Full Text Available Image security is a process to save digital. One method of securing image digital is watermarking using Least Significant Bit algorithm. Main concept of image security using LSB algorithm is to replace bit value of image at specific location so that created pattern. The pattern result of replacing the bit value of image is called by watermark. Giving watermark at image digital using LSB algorithm has simple concept so that the information which is embedded will lost easily when attacked such as noise attack or compression. So need modification like development of LSB algorithm. This is done to decrease distortion of watermark information against those attacks. In this research is divided by 6 process which are color extraction of cover image, busy area search, watermark embed, count the accuracy of watermark embed, watermark extraction, and count the accuracy of watermark extraction. Color extraction of cover image is process to get blue color component from cover image. Watermark information will embed at busy area by search the area which has the greatest number of unsure from cover image. Then watermark image is embedded into cover image so that produce watermarked image using some development of LSB algorithm and search the accuracy by count the Peak Signal to Noise Ratio value. Before the watermarked image is extracted, need to test by giving noise and doing compression into jpg format. The accuracy of extraction result is searched by count the Bit Error Rate value.

  9. Different Mass Processing Services in a Bit Repository

    DEFF Research Database (Denmark)

    Jurik, Bolette; Zierau, Eld

    2011-01-01

    This paper investigates how a general bit repository mass processing service using different programming models and platforms can be specified. Such a service is needed in large data archives, especially libraries, where different ways of doing mass processing is needed for different digital...

  10. Steganography forensics method for detecting least significant bit replacement attack

    Science.gov (United States)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  11. An efficient parallel pseudorandom bit generator based on an ...

    Indian Academy of Sciences (India)

    complicated floating-point computation and multiplication computation transform into simple shift bit operations are ..... Based on the asymmetric CML combining some simple digital algebraic operations, a new PRBG was ... are identical, they are perturbed by the transformation x0(i) = x0(1) + 10000 × i, i = 2, 3, ..., N. 622.

  12. "Material interactions": from atoms & bits to entangled practices

    DEFF Research Database (Denmark)

    Vallgårda, Anna

    and intellectually stimulating panel moderated by Prof. Mikael Wiberg consisting of a number of scholars with a well-developed view on digital materialities to fuel a discussion on material interactions - from atoms & bits to entangled practices. These scholars include: Prof. Hiroshi Ishii, Prof. Paul Dourish...

  13. Quantum measurement and entanglement of spin quantum bits in diamond

    NARCIS (Netherlands)

    Pfaff, W.

    2013-01-01

    This thesis presents a set of experiments that explore the possible realisation of a macroscopic quantum network based on solid-state quantum bits. Such a quantum network would allow for studying quantum mechanics on large scales (meters, or even kilometers), and can open new possibilities for

  14. Designing the optimal bit: balancing energetic cost, speed and reliability.

    Science.gov (United States)

    Deshpande, Abhishek; Gopalkrishnan, Manoj; Ouldridge, Thomas E; Jones, Nick S

    2017-08-01

    We consider the challenge of operating a reliable bit that can be rapidly erased. We find that both erasing and reliability times are non-monotonic in the underlying friction, leading to a trade-off between erasing speed and bit reliability. Fast erasure is possible at the expense of low reliability at moderate friction, and high reliability comes at the expense of slow erasure in the underdamped and overdamped limits. Within a given class of bit parameters and control strategies, we define 'optimal' designs of bits that meet the desired reliability and erasing time requirements with the lowest operational work cost. We find that optimal designs always saturate the bound on the erasing time requirement, but can exceed the required reliability time if critically damped. The non-trivial geometry of the reliability and erasing time scales allows us to exclude large regions of parameter space as suboptimal. We find that optimal designs are either critically damped or close to critical damping under the erasing procedure.

  15. Radiation hardened COTS-based 32-bit microprocessor

    International Nuclear Information System (INIS)

    Haddad, N.; Brown, R.; Cronauer, T.; Phan, H.

    1999-01-01

    A high performance radiation hardened 32-bit RISC microprocessor based upon a commercial single chip CPU has been developed. This paper presents the features of radiation hardened microprocessor, the methods used to radiation harden this device, the results of radiation testing, and shows that the RAD6000 is well-suited for the vast majority of space applications. (authors)

  16. Abundance, distribution and potential impact of transposable elements in the genome of Mycosphaerella fijiensis

    Directory of Open Access Journals (Sweden)

    Santana Mateus F

    2012-12-01

    Full Text Available Abstract Background Mycosphaerella fijiensis is a ascomycete that causes Black Sigatoka in bananas. Recently, the M. fijiensis genome was sequenced. Repetitive sequences are ubiquitous components of fungal genomes. In most genomic analyses, repetitive sequences are associated with transposable elements (TEs. TEs are dispersed repetitive DNA sequences found in a host genome. These elements have the ability to move from one location to another within the genome, and their insertion can cause a wide spectrum of mutations in their hosts. Some of the deleterious effects of TEs may be due to ectopic recombination among TEs of the same family. In addition, some transposons are physically linked to genes and can control their expression. To prevent possible damage caused by the presence of TEs in the genome, some fungi possess TE-silencing mechanisms, such as RIP (Repeat Induced Point mutation. In this study, the abundance, distribution and potential impact of TEs in the genome of M. fijiensis were investigated. Results A total of 613 LTR-Gypsy and 27 LTR-Copia complete elements of the class I were detected. Among the class II elements, a total of 28 Mariner, five Mutator and one Harbinger complete elements were identified. The results of this study indicate that transposons were and are important ectopic recombination sites. A distribution analysis of a transposable element from each class of the M. fijiensis isolates revealed variable hybridization profiles, indicating the activity of these elements. Several genes encoding proteins involved in important metabolic pathways and with potential correlation to pathogenicity systems were identified upstream and downstream of transposable elements. A comparison of the sequences from different transposon groups suggested the action of the RIP silencing mechanism in the genome of this microorganism. Conclusions The analysis of TEs in M. fijiensis suggests that TEs play an important role in the evolution of

  17. Abundance, distribution and potential impact of transposable elements in the genome of Mycosphaerella fijiensis.

    Science.gov (United States)

    Santana, Mateus F; Silva, José C F; Batista, Aline D; Ribeiro, Lílian E; da Silva, Gilvan F; de Araújo, Elza F; de Queiroz, Marisa V

    2012-12-22

    Mycosphaerella fijiensis is a ascomycete that causes Black Sigatoka in bananas. Recently, the M. fijiensis genome was sequenced. Repetitive sequences are ubiquitous components of fungal genomes. In most genomic analyses, repetitive sequences are associated with transposable elements (TEs). TEs are dispersed repetitive DNA sequences found in a host genome. These elements have the ability to move from one location to another within the genome, and their insertion can cause a wide spectrum of mutations in their hosts. Some of the deleterious effects of TEs may be due to ectopic recombination among TEs of the same family. In addition, some transposons are physically linked to genes and can control their expression. To prevent possible damage caused by the presence of TEs in the genome, some fungi possess TE-silencing mechanisms, such as RIP (Repeat Induced Point mutation). In this study, the abundance, distribution and potential impact of TEs in the genome of M. fijiensis were investigated. A total of 613 LTR-Gypsy and 27 LTR-Copia complete elements of the class I were detected. Among the class II elements, a total of 28 Mariner, five Mutator and one Harbinger complete elements were identified. The results of this study indicate that transposons were and are important ectopic recombination sites. A distribution analysis of a transposable element from each class of the M. fijiensis isolates revealed variable hybridization profiles, indicating the activity of these elements. Several genes encoding proteins involved in important metabolic pathways and with potential correlation to pathogenicity systems were identified upstream and downstream of transposable elements. A comparison of the sequences from different transposon groups suggested the action of the RIP silencing mechanism in the genome of this microorganism. The analysis of TEs in M. fijiensis suggests that TEs play an important role in the evolution of this organism because the activity of these elements, as well

  18. Analysis of bit-rock interaction during stick-slip vibrations using PDC cutting force model

    Energy Technology Data Exchange (ETDEWEB)

    Patil, P.A.; Teodoriu, C. [Technische Univ. Clausthal, Clausthal-Zellerfeld (Germany). ITE

    2013-08-01

    Drillstring vibration is one of the limiting factors maximizing the drilling performance and also causes premature failure of drillstring components. Polycrystalline diamond compact (PDC) bit enhances the overall drilling performance giving the best rate of penetrations with less cost per foot but the PDC bits are more susceptible to the stick slip phenomena which results in high fluctuations of bit rotational speed. Based on the torsional drillstring model developed using Matlab/Simulink for analyzing the parametric influence on stick-slip vibrations due to drilling parameters and drillstring properties, the study of relations between weight on bit, torque on bit, bit speed, rate of penetration and friction coefficient have been analyzed. While drilling with the PDC bits, the bit-rock interaction has been characterized by cutting forces and the frictional forces. The torque on bit and the weight on bit have both the cutting component and the frictional component when resolved in horizontal and vertical direction. The paper considers that the bit is undergoing stick-slip vibrations while analyzing the bit-rock interaction of the PDC bit. The Matlab/Simulink bit-rock interaction model has been developed which gives the average cutting torque, T{sub c}, and friction torque, T{sub f}, values on cutters as well as corresponding average weight transferred by the cutting face, W{sub c}, and the wear flat face, W{sub f}, of the cutters value due to friction.

  19. A gene family derived from transposable elements during early angiosperm evolution has reproductive fitness benefits in Arabidopsis thaliana.

    Science.gov (United States)

    Joly-Lopez, Zoé; Forczek, Ewa; Hoen, Douglas R; Juretic, Nikoleta; Bureau, Thomas E

    2012-09-01

    The benefits of ever-growing numbers of sequenced eukaryotic genomes will not be fully realized until we learn to decipher vast stretches of noncoding DNA, largely composed of transposable elements. Transposable elements persist through self-replication, but some genes once encoded by transposable elements have, through a process called molecular domestication, evolved new functions that increase fitness. Although they have conferred numerous adaptations, the number of such domesticated transposable element genes remains unknown, so their evolutionary and functional impact cannot be fully assessed. Systematic searches that exploit genomic signatures of natural selection have been employed to identify potential domesticated genes, but their predictions have yet to be experimentally verified. To this end, we investigated a family of domesticated genes called MUSTANG (MUG), identified in a previous bioinformatic search of plant genomes. We show that MUG genes are functional. Mutants of Arabidopsis thaliana MUG genes yield phenotypes with severely reduced plant fitness through decreased plant size, delayed flowering, abnormal development of floral organs, and markedly reduced fertility. MUG genes are present in all flowering plants, but not in any non-flowering plant lineages, such as gymnosperms, suggesting that the molecular domestication of MUG may have been an integral part of early angiosperm evolution. This study shows that systematic searches can be successful at identifying functional genetic elements in noncoding regions and demonstrates how to combine systematic searches with reverse genetics in a fruitful way to decipher eukaryotic genomes.

  20. The expansion of heterochromatin blocks in rye reflects the co-amplification of tandem repeats and adjacent transposable elements

    Czech Academy of Sciences Publication Activity Database

    Evtushenko, E.V.; Levitsky, V.G.; Elisafenko, E.A.; Gunbin, K.V.; Belousov, A.I.; Šafář, Jan; Doležel, Jaroslav; Vershinin, A.V.

    2016-01-01

    Roč. 17, MAY 4 (2016), s. 337 ISSN 1471-2164 R&D Projects: GA MŠk(CZ) LO1204 Institutional support: RVO:61389030 Keywords : Tandem repeats * Transposable elements * Subtelomeric heterochromatin Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.729, year: 2016

  1. A gene family derived from transposable elements during early angiosperm evolution has reproductive fitness benefits in Arabidopsis thaliana.

    Directory of Open Access Journals (Sweden)

    Zoé Joly-Lopez

    2012-09-01

    Full Text Available The benefits of ever-growing numbers of sequenced eukaryotic genomes will not be fully realized until we learn to decipher vast stretches of noncoding DNA, largely composed of transposable elements. Transposable elements persist through self-replication, but some genes once encoded by transposable elements have, through a process called molecular domestication, evolved new functions that increase fitness. Although they have conferred numerous adaptations, the number of such domesticated transposable element genes remains unknown, so their evolutionary and functional impact cannot be fully assessed. Systematic searches that exploit genomic signatures of natural selection have been employed to identify potential domesticated genes, but their predictions have yet to be experimentally verified. To this end, we investigated a family of domesticated genes called MUSTANG (MUG, identified in a previous bioinformatic search of plant genomes. We show that MUG genes are functional. Mutants of Arabidopsis thaliana MUG genes yield phenotypes with severely reduced plant fitness through decreased plant size, delayed flowering, abnormal development of floral organs, and markedly reduced fertility. MUG genes are present in all flowering plants, but not in any non-flowering plant lineages, such as gymnosperms, suggesting that the molecular domestication of MUG may have been an integral part of early angiosperm evolution. This study shows that systematic searches can be successful at identifying functional genetic elements in noncoding regions and demonstrates how to combine systematic searches with reverse genetics in a fruitful way to decipher eukaryotic genomes.

  2. Transposable elements become active and mobile in the genomes of aging mammalian somatic tissues.

    Science.gov (United States)

    De Cecco, Marco; Criscione, Steven W; Peterson, Abigail L; Neretti, Nicola; Sedivy, John M; Kreiling, Jill A

    2013-12-01

    Transposable elements (TEs) were discovered by Barbara McClintock in maize and have since been found to be ubiquitous in all living organisms. Transposition is mutagenic and organisms have evolved mechanisms to repress the activity of their endogenous TEs. Transposition in somatic cells is very low, but recent evidence suggests that it may be derepressed in some cases, such as cancer development. We have found that during normal aging several families of retrotransposable elements (RTEs) start being transcribed in mouse tissues. In advanced age the expression culminates in active transposition. These processes are counteracted by calorie restriction (CR), an intervention that slows down aging. Retrotransposition is also activated in age-associated, naturally occurring cancers in the mouse. We suggest that somatic retrotransposition is a hitherto unappreciated aging process. Mobilization of RTEs is likely to be an important contributor to the progressive dysfunction of aging cells.

  3. Ulysses transposable element of Drosophila shows high structural similarities to functional domains of retroviruses.

    Science.gov (United States)

    Evgen'ev, M B; Corces, V G; Lankenau, D H

    1992-06-05

    We have determined the DNA structure of the Ulysses transposable element of Drosophila virilis and found that this transposon is 10,653 bp and is flanked by two unusually large direct repeats 2136 bp long. Ulysses shows the characteristic organization of LTR-containing retrotransposons, with matrix and capsid protein domains encoded in the first open reading frame. In addition, Ulysses contains protease, reverse transcriptase, RNase H and integrase domains encoded in the second open reading frame. Ulysses lacks a third open reading frame present in some retrotransposons that could encode an env-like protein. A dendrogram analysis based on multiple alignments of the protease, reverse transcriptase, RNase H, integrase and tRNA primer binding site of all known Drosophila LTR-containing retrotransposon sequences establishes a phylogenetic relationship of Ulysses to other retrotransposons and suggests that Ulysses belongs to a new family of this type of elements.

  4. The contributions of transposable elements to the structure, function, and evolution of plant genomes.

    Science.gov (United States)

    Bennetzen, Jeffrey L; Wang, Hao

    2014-01-01

    Transposable elements (TEs) are the key players in generating genomic novelty by a combination of the chromosome rearrangements they cause and the genes that come under their regulatory sway. Genome size, gene content, gene order, centromere function, and numerous other aspects of nuclear biology are driven by TE activity. Although the origins and attitudes of TEs have the hallmarks of selfish DNA, there are numerous cases where TE components have been co-opted by the host to create new genes or modify gene regulation. In particular, epigenetic regulation has been transformed from a process to silence invading TEs and viruses into a key strategy for regulating plant genes. Most, perhaps all, of this epigenetic regulation is derived from TE insertions near genes or TE-encoded factors that act in trans. Enormous pools of genome data and new technologies for reverse genetics will lead to a powerful new era of TE analysis in plants.

  5. A Gaijin-like miniature inverted repeat transposable element is mobilized in rice during cell differentiation

    Directory of Open Access Journals (Sweden)

    Dong Hai-Tao

    2012-04-01

    Full Text Available Abstract Background Miniature inverted repeat transposable element (MITE is one type of transposable element (TE, which is largely found in eukaryotic genomes and involved in a wide variety of biological events. However, only few MITEs were proved to be currently active and their physiological function remains largely unknown. Results We found that the amplicon discrepancy of a gene locus LOC_Os01g0420 in different rice cultivar genomes was resulted from the existence of a member of Gaijin-like MITEs (mGing. This result indicated that mGing transposition was occurred at this gene locus. By using a modified transposon display (TD analysis, the active transpositions of mGing were detected in rice Jiahua No. 1 genome under three conditions: in seedlings germinated from the seeds received a high dose γ-ray irradiation, in plantlets regenerated from anther-derived calli and from scutellum-derived calli, and were confirmed by PCR validation and sequencing. Sequence analysis revealed that single nucleotide polymorphisms (SNPs or short additional DNA sequences at transposition sites post mGing transposition. It suggested that sequence modification was possibly taken place during mGing transposition. Furthermore, cell re-differentiation experiment showed that active transpositions of both mGing and mPing (another well studied MITE were identified only in regenerated plantlets. Conclusions It is for the first time that mGing active transposition was demonstrated under γ-ray irradiation or in cell re-differentiation process in rice. This newly identified active MITE will provide a foundation for further analysis of the roles of MITEs in biological process.

  6. Scatter: a novel family of miniature inverted-repeat transposable elements in the fungus Botrytis cinerea.

    Science.gov (United States)

    Deng, Hongyuan; Shu, Dan; Luo, Di; Gong, Tao; Sun, Fenghui; Tan, Hong

    2013-10-01

    Miniature inverted-repeat transposable elements (MITEs) are short non-autonomous DNA transposons that play an important role in genome structure and function. Here, we described a novel family of MITEs, named Scatter, identified from the genomes of three strains of the fungus Botrytis cinerea (T4, B05.10, and TBC-A). Intact Scatter elements are typically an average of 247 bp, and contain 41 bp terminal inverted repeats (TIRs) and 2-bp "TA" target site duplications (TSDs). Based a search against the transposable elements database and GenBank, Scatter is a novel and potentially species-specific family of MITEs. Moderate heterogeneity in sequence and size of individual Scatter copies suggests that Scatter elements were not recently proliferated. Most integrated sites were conserved across all three strains tested and elements inserted at equivalent sites shared high identity at the nucleotide level. This conservation, in combination with the presence of a similar copy number (22-24), in B. cinerea strains tested suggests that Scatter may be a relic of an ancient transposition developed prior to the strain divergence of B. cinerea. Two unique insertion instances were observed, indicating that some copies of Scatter may have remained active following strain divergence of B. cinerea. Because only a few subtle insertion differences among B. cinerea strains were observed, Scatter may play only a minor role in the genetic diversity in B. cinerea species. Most Scatter elements appear to be inserted in potential regulatory regions of adjacent coding regions, highlighting their role in transcriptional regulation. The origin of Scatter remains to be addressed. Scatter is the first well-characterized family of MITEs in B. cinerea. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  8. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  9. Low Bit Rate Video Coding | Mishra | Nigerian Journal of Technology

    African Journals Online (AJOL)

    Nigerian Journal of Technology. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 32, No 3 (2013) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected should ...

  10. Identifiable Data Files - Denominator File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Denominator File combines Medicare beneficiary entitlement status information from administrative enrollment records with third-party payer information and GHP...

  11. Optical Switching and Bit Rates of 40 Gbit/s and above

    DEFF Research Database (Denmark)

    Ackaert, A.; Demester, P.; O'Mahony, M.

    2003-01-01

    Optical switching in WDM networks introduces additional aspects to the choice of single channel bit rates compared to WDM transmission systems. The mutual impact of optical switching and bit rates of 40 Gbps and above is discussed....

  12. Small digital recording head has parallel bit channels, minimizes cross talk

    Science.gov (United States)

    Eller, E. E.; Laue, E. G.

    1964-01-01

    A small digital recording head consists of closely spaced parallel wires, imbedded in a ferrite block to concentrate the magnetic flux. Parallel-recorded information bits are converted into serial bits on moving magnetic tape and cross talk is suppressed.

  13. Efficient biased random bit generation for parallel processing

    Energy Technology Data Exchange (ETDEWEB)

    Slone, Dale M. [Univ. of California, Davis, CA (United States)

    1994-09-28

    A lattice gas automaton was implemented on a massively parallel machine (the BBN TC2000) and a vector supercomputer (the CRAY C90). The automaton models Burgers equation ρt + ρρx = vρxx in 1 dimension. The lattice gas evolves by advecting and colliding pseudo-particles on a 1-dimensional, periodic grid. The specific rules for colliding particles are stochastic in nature and require the generation of many billions of random numbers to create the random bits necessary for the lattice gas. The goal of the thesis was to speed up the process of generating the random bits and thereby lessen the computational bottleneck of the automaton.

  14. Modular trigger processing The GCT muon and quiet bit system

    CERN Document Server

    Stettler, Matthew; Hansen, Magnus; Iles, Gregory; Jones, John; PH-EP

    2007-01-01

    The CMS Global Calorimeter Trigger system's HCAL Muon and Quiet bit reformatting function is being implemented with a novel processing architecture. This architecture utilizes micro TCA, a modern modular communications standard based on high speed serial links, to implement a processing matrix. This matrix is configurable in both logical functionality and data flow, allowing far greater flexibility than current trigger processing systems. In addition, the modular nature of this architecture allows flexibility in scale unmatched by traditional approaches. The Muon and Quiet bit system consists of two major components, a custom micro TCA backplane and processing module. These components are based on Xilinx Virtex5 and Mindspeed crosspoint switch devices, bringing together state of the art FPGA based processing and Telcom switching technologies.

  15. Wear Detection of Drill Bit by Image-based Technique

    Science.gov (United States)

    Sukeri, Maziyah; Zulhilmi Paiz Ismadi, Mohd; Rahim Othman, Abdul; Kamaruddin, Shahrul

    2018-03-01

    Image processing for computer vision function plays an essential aspect in the manufacturing industries for the tool condition monitoring. This study proposes a dependable direct measurement method to measure the tool wear using image-based analysis. Segmentation and thresholding technique were used as the means to filter and convert the colour image to binary datasets. Then, the edge detection method was applied to characterize the edge of the drill bit. By using cross-correlation method, the edges of original and worn drill bits were correlated to each other. Cross-correlation graphs were able to detect the difference of the worn edge despite small difference between the graphs. Future development will focus on quantifying the worn profile as well as enhancing the sensitivity of the technique.

  16. Comodulation masking release in bit-rate reduction systems

    DEFF Research Database (Denmark)

    Vestergaard, Martin David; Rasmussen, Karsten Bo; Poulsen, Torben

    1999-01-01

    It has been suggested that the level dependence of the upper masking slope be utilized in perceptual models in bit-rate reduction systems. However, comodulation masking release (CMR) phenomena lead to a reduction of the masking effect when a masker and a probe signal are amplitude modulated...... with the same frequency. In bit-rate reduction systems the masker would be the audio signal and the probe signal would represent the quantization noise. Masking curves have been determined for sinusoids and 1-Bark-wide noise maskers in order to investigate the risk of CMR, when quantizing depths are fixed...... in accordance with psycho-acoustical principles. Masker frequencies of 500 Hz, 1 kHz, and 2 kHz have been investigated, and the masking of pure tone probes has been determined in the first four 1/3 octaves above the masker. Modulation frequencies between 6 and 20 Hz were used with a modulation depth of 0...

  17. Comodulation masking release in bit-rate reduction systems

    DEFF Research Database (Denmark)

    Vestergaard, Martin D.; Rasmussen, Karsten Bo; Poulsen, Torben

    1999-01-01

    It has been suggested that the level dependence of the upper masking slopebe utilised in perceptual models in bit-rate reduction systems. However,comodulation masking release (CMR) phenomena lead to a reduction of themasking effect when a masker and a probe signal are amplitude modulated withthe...... same frequency. In bit-rate reduction systems the masker would be theaudio signal and the probe signal would represent the quantization noise.Masking curves have been determined for sinusoids and 1-Bark-wide noisemaskers in order to investigate the risk of CMR, when quantizing depths arefixed...... in accordance with psycho-acoustical principles. Masker frequencies of500Hz, 1kHz and 2kHz have been investigated, and the masking of pure toneprobes has been determined in the first four 1/3 octaves above the masker.Modulation frequencies between 6Hz and 20Hz were used with a modulationdepth of 0.75. CMR of up...

  18. The design method of diamond bit in hardest formation

    International Nuclear Information System (INIS)

    Tian Long

    2010-01-01

    In the case of diamond bit drill* 1, * 2 of formation drillability that is the hardest formation,Fine, soft matrix, the low concentration of diamond dril should be chosen by Traditional design theory .Here describes a basic design with this completely different method. Proved through practice, Good performance of this drill, the drilling in extremely hard when the only limitation is high and life expectancy has increased a lot, have a good ground for such adaptability. (authors)

  19. Feasibility Study of 8-Bit Microcontroller Applications for Ethernet

    OpenAIRE

    Lech Gulbinovič

    2011-01-01

    Feasibility study of 8-bit microcontroller applications for Ethernet is presented. Designed device is based on ATmega32 microcontroller and 10 Mbps Ethernet controller ENC28J60. Device is simulated as mass queuing theoretical model with ticket booking counter. Practical explorations are accomplished and characteristics are determined. Practical results are compared to theoretical ones. Program code and device packet processing speed optimization are discussed. Microcontroller packet processin...

  20. Capped bit patterned media for high density magnetic recording

    Science.gov (United States)

    Li, Shaojing; Livshitz, Boris; Bertram, H. Neal; Inomata, Akihiro; Fullerton, Eric E.; Lomakin, Vitaliy

    2009-04-01

    A capped composite patterned medium design is described which comprises an array of hard elements exchange coupled to a continuous cap layer. The role of the cap layer is to lower the write field of the individual hard element and introduce ferromagnetic exchange interactions between hard elements to compensate the magnetostatic interactions. Modeling results show significant reduction in the reversal field distributions caused by the magnetization states in the array which is important to prevent bit errors and increase achievable recording densities.

  1. SOLAR TRACKER CERDAS DAN MURAH BERBASIS MIKROKONTROLER 8 BIT ATMega8535

    OpenAIRE

    I Wayan Sutaya; Ketut Udy Ariawan

    2016-01-01

    prototipe produk solar tracker cerdas berbasis mikrokontroler AVR 8 bit. Solar tracker ini memasukkan filter digital IIR (Infinite Impulse Response) pada bagian program. Memprogram filter ini membutuhkan perkalian 32 bit sedangkan prosesor yang tersedia pada mikrokontroler yang dipakai adalah 8 bit. Proses perkalian ini hanya bisa dilakukan pada mikrokontroler 8 bit dengan menggunakan bahasa assembly yang merupakan bahasa level hardware. Solar tracker cerdas yang menggunakan mikrokontroler 8 ...

  2. High performance 14-bit pipelined redundant signed digit ADC

    Science.gov (United States)

    Narula, Swina; Pandey, Sujata

    2016-03-01

    A novel architecture of a pipelined redundant-signed-digit analog to digital converter (RSD-ADC) is presented featuring a high signal to noise ratio (SNR), spurious free dynamic range (SFDR) and signal to noise plus distortion (SNDR) with efficient background correction logic. The proposed ADC architecture shows high accuracy with a high speed circuit and efficient utilization of the hardware. This paper demonstrates the functionality of the digital correction logic of 14-bit pipelined ADC at each 1.5 bit/stage. This prototype of ADC architecture accounts for capacitor mismatch, comparator offset and finite Op-Amp gain error in the MDAC (residue amplification circuit) stages. With the proposed architecture of ADC, SNDR obtained is 85.89 dB, SNR is 85.9 dB and SFDR obtained is 102.8 dB at the sample rate of 100 MHz. This novel architecture of digital correction logic is transparent to the overall system, which is demonstrated by using 14-bit pipelined ADC. After a latency of 14 clocks, digital output will be available at every clock pulse. To describe the circuit behavior of the ADC, VHDL and MATLAB programs are used. The proposed architecture is also capable of reducing the digital hardware. Silicon area is also the complexity of the design.

  3. A short introduction to bit-string physics

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1997-06-01

    This paper starts with a personal memoir of how some significant ideas arose and events took place during the period from 1972, when the author first encountered Ted Bastin, to 1979, when the author proposed the foundation of ANPA. He then discusses program universe, the fine structure paper and its rejection, the quantitative results up to ANPA 17 and take a new look at the handy-dandy formula. Following the historical material is a first pass at establishing new foundations for bit-string physics. An abstract model for a laboratory notebook and a historical record are developed, culminating in the bit-string representation. The author set up a tic-toc laboratory with two synchronized clocks and shows how this can be used to analyze arbitrary incoming data. This allows him to discuss (briefly) finite and discrete Lorentz transformations, commutation relations, and scattering theory. Earlier work on conservation laws in 3- and 4-events and the free space Dirac and Maxwell equations is cited. The paper concludes with a discussion of the quantum gravity problem from his point of view and speculations about how a bit-string theory of strong, electromagnetic, weak and gravitational unification could take shape

  4. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Directory of Open Access Journals (Sweden)

    C. Chen

    2009-01-01

    Full Text Available Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP approach and a greedy search (GS approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  5. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Science.gov (United States)

    Chen, C.; Veldhuis, R. N. J.; Kevenaar, T. A. M.; Akkermans, A. H. M.

    2009-12-01

    Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA) principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP) approach and a greedy search (GS) approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  6. Digital Signal Processing For Low Bit Rate TV Image Codecs

    Science.gov (United States)

    Rao, K. R.

    1987-06-01

    In view of the 56 KBPS digital switched network services and the ISDN, low bit rate codecs for providing real time full motion color video are under various stages of development. Some companies have already brought the codecs into the market. They are being used by industry and some Federal Agencies for video teleconferencing. In general, these codecs have various features such as multiplexing audio and data, high resolution graphics, encryption, error detection and correction, self diagnostics, freezeframe, split video, text overlay etc. To transmit the original color video on a 56 KBPS network requires bit rate reduction of the order of 1400:1. Such a large scale bandwidth compression can be realized only by implementing a number of sophisticated,digital signal processing techniques. This paper provides an overview of such techniques and outlines the newer concepts that are being investigated. Before resorting to the data compression techniques, various preprocessing operations such as noise filtering, composite-component transformation and horizontal and vertical blanking interval removal are to be implemented. Invariably spatio-temporal subsampling is achieved by appropriate filtering. Transform and/or prediction coupled with motion estimation and strengthened by adaptive features are some of the tools in the arsenal of the data reduction methods. Other essential blocks in the system are quantizer, bit allocation, buffer, multiplexer, channel coding etc.

  7. High performance 14-bit pipelined redundant signed digit ADC

    International Nuclear Information System (INIS)

    Narula, Swina; Pandey, Sujata

    2016-01-01

    A novel architecture of a pipelined redundant-signed-digit analog to digital converter (RSD-ADC) is presented featuring a high signal to noise ratio (SNR), spurious free dynamic range (SFDR) and signal to noise plus distortion (SNDR) with efficient background correction logic. The proposed ADC architecture shows high accuracy with a high speed circuit and efficient utilization of the hardware. This paper demonstrates the functionality of the digital correction logic of 14-bit pipelined ADC at each 1.5 bit/stage. This prototype of ADC architecture accounts for capacitor mismatch, comparator offset and finite Op-Amp gain error in the MDAC (residue amplification circuit) stages. With the proposed architecture of ADC, SNDR obtained is 85.89 dB, SNR is 85.9 dB and SFDR obtained is 102.8 dB at the sample rate of 100 MHz. This novel architecture of digital correction logic is transparent to the overall system, which is demonstrated by using 14-bit pipelined ADC. After a latency of 14 clocks, digital output will be available at every clock pulse. To describe the circuit behavior of the ADC, VHDL and MATLAB programs are used. The proposed architecture is also capable of reducing the digital hardware. Silicon area is also the complexity of the design. (paper)

  8. Surgical drill system and surgical drill bit to be used therein

    NARCIS (Netherlands)

    Margallo Balbas, E.; Wieringa, P.A.; French, P.J.; Lee, R.A.; Breedveld, P.

    2007-01-01

    Surgical drill system comprising a mechanical drill bit and means for imaging the vicinity of the drill bit tip, said means comprising: at least one optical fiber having a distal end and a proximal end, said distal end being located adjacent said drill bit tip, an optical processing unit, said

  9. 65,000 shades of grey: use of digital image files in light microscopy.

    Science.gov (United States)

    Shaw, Sidney L; Hinchcliffe, Edward H

    2013-01-01

    Computers dominate image capture and analysis in modern light microscopy. The output of an imaging experiment is a binary coded file, called an image file, which contains the spatial, temporal and intensity information present in the sample. Understanding what comprises an image file, and how these files are generated is necessary in order to optimize the use of the digital light microscope. In this chapter, we discuss image file formats, and the various components of these files, such as bit-depth, sampling rate, color theory, and compression, from the perspective of the non-computer scientist. We also discuss the problem of proprietary file formats, and how these often are incompatible with certain types of imaging software. We present several solutions to this issue. Finally, we present the use of digital movie formats, compression routines, and provide some real world examples for optimizing the generation of digital movies. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. ``The Legal Bit's in Russian'': Making Sense of Downloaded Music

    Science.gov (United States)

    Kibby, Marjorie D.

    Peer-to-peer sharing of music files grew in the face of consumer dissatisfaction with the compact disc and the absence of any real alternative. Many users were more or less “forced” to turn to illegal file sharing to access single tracks, back catalogues, and niche genres. Recently the almost simultaneous arrival of broadband internet and the iPod has seen music downloading become a respectable activity and a multi-billion dollar industry.

  11. Miniature Transposable Sequences Are Frequently Mobilized in the Bacterial Plant Pathogen Pseudomonas syringae pv. phaseolicola

    Science.gov (United States)

    Bardaji, Leire; Añorga, Maite; Jackson, Robert W.; Martínez-Bilbao, Alejandro; Yanguas-Casás, Natalia; Murillo, Jesús

    2011-01-01

    Mobile genetic elements are widespread in Pseudomonas syringae, and often associate with virulence genes. Genome reannotation of the model bean pathogen P. syringae pv. phaseolicola 1448A identified seventeen types of insertion sequences and two miniature inverted-repeat transposable elements (MITEs) with a biased distribution, representing 2.8% of the chromosome, 25.8% of the 132-kb virulence plasmid and 2.7% of the 52-kb plasmid. Employing an entrapment vector containing sacB, we estimated that transposition frequency oscillated between 2.6×10−5 and 1.1×10−6, depending on the clone, although it was stable for each clone after consecutive transfers in culture media. Transposition frequency was similar for bacteria grown in rich or minimal media, and from cells recovered from compatible and incompatible plant hosts, indicating that growth conditions do not influence transposition in strain 1448A. Most of the entrapped insertions contained a full-length IS801 element, with the remaining insertions corresponding to sequences smaller than any transposable element identified in strain 1448A, and collectively identified as miniature sequences. From these, fragments of 229, 360 and 679-nt of the right end of IS801 ended in a consensus tetranucleotide and likely resulted from one-ended transposition of IS801. An average 0.7% of the insertions analyzed consisted of IS801 carrying a fragment of variable size from gene PSPPH_0008/PSPPH_0017, showing that IS801 can mobilize DNA in vivo. Retrospective analysis of complete plasmids and genomes of P. syringae suggests, however, that most fragments of IS801 are likely the result of reorganizations rather than one-ended transpositions, and that this element might preferentially contribute to genome flexibility by generating homologous regions of recombination. A further miniature sequence previously found to affect host range specificity and virulence, designated MITEPsy1 (100-nt), represented an average 2.4% of the total

  12. De novo origin of VCY2 from autosome to Y-transposed amplicon.

    Directory of Open Access Journals (Sweden)

    Peng-Rong Cao

    Full Text Available The formation of new genes is a primary driving force of evolution in all organisms. The de novo evolution of new genes from non-protein-coding genomic regions is emerging as an important additional mechanism for novel gene creation. Y chromosomes underlie sex determination in mammals and contain genes that are required for male-specific functions. In this study, a search was undertaken for Y chromosome de novo genes derived from non-protein-coding sequences. The Y chromosome orphan gene variable charge, Y-linked (VCY2, is an autosome-derived gene that has sequence similarity to large autosomal fragments but lacks an autosomal protein-coding homolog. VCY2 locates in the amplicon containing long DNA fragments that were transposed from autosomes to the Y chromosome before the ape-monkey split. We confirmed that VCY2 cannot be encoded by autosomes due to the presence of multiple disablers that disrupt the open reading frame, such as the absence of start or stop codons and the presence of premature stop codons. Similar observations have been made for homologs in the autosomes of the chimpanzee, gorilla, rhesus macaque, baboon and out-group marmoset, which suggests that there was a non-protein-coding ancestral VCY2 that was common to apes and monkeys that predated the transposition event. Furthermore, while protein-coding orthologs are absent, a putative non-protein-coding VCY2 with conserved disablers was identified in the rhesus macaque Y chromosome male-specific region. This finding implies that VCY2 might have not acquired its protein-coding ability before the ape-monkey split. VCY2 encodes a testis-specific expressed protein and is involved in the pathologic process of male infertility, and the acquisition of this gene might improve male fertility. This is the first evidence that de novo genes can be generated from transposed autosomal non-protein-coding segments, and this evidence provides novel insights into the evolutionary history of the Y

  13. The digital agenda of virtual currencies: Can BitCoin become a global currency?

    OpenAIRE

    CIAIAN PAVEL; RAJCANIOVA MIROSLAVA; KANCS D'ARTIS

    2015-01-01

    This paper identifies and analyzes BitCoin features which may facilitate BitCoin to become a global currency, as well as characteristics which may impede the use of BitCoin as a medium of exchange, a unit of account and a store of value, and compares BitCoin with standard currencies with respect to the main functions of money. Among all analyzed BitCoin features, the extreme price volatility stands out most clearly compared to standard currencies. In order to understand the reasons for such e...

  14. Annual Report: Support Research for Development of Improved Geothermal Drill Bits

    Energy Technology Data Exchange (ETDEWEB)

    Hendrickson, R.R.; Winzenried, R.W.; Jones, A.H.; Green, S.J.

    1978-07-01

    The work reported herein is a continuation of the program initiated under DOE contract E(10-1)-1546* entitled "Program to Design and Experimentally Test an Improved Geothermal Bit"; the program is now DOE Contract EG-76-C-1546*. The objective of the program has been to accelerate the commercial availability of a tolling cutter drill bit for geothermal applications. Data and experimental tests needed to develop a bit suited to the harsh thermal, abrasive, and chemical environment of the more problematic geothermal wells, including those drilled with air, have been obtained. Efforts were directed at the improvement of both the sealed (lubricated) and unsealed types of bits. The unsealed bit effort included determination of the rationale for materials selection, the selection of steels for the bit body, cutters, and bearings, the selection of tungsten carbide alloys for the friction bearing, and preliminary investigation of optimized tungsten carbide drilling inserts. Bits build** with the new materials were tested under stimulated wellbore conditions. The sealed bit effort provided for the evaluation of candidate high temperature seals and lubricants, utilizing two specially developed test apparatus which simulate the conditions found in a sealed bit operating in a geothermal wellbore. Phase I of the program was devoted largely to (1) the study of the geothermal environment and the failure mechanisms of existing geothermal drill bits, (2) the design and construction of separate facilities for testing both drill-bit seals and full-scale drill bits under simulated geothermal drilling conditions, and (3) fabrication of the MK-I research drill bits from high-temperature steels, and testing in the geothermal drill-bit test facility. The work accomplished in Phase I is reported in References 1 through 9. In Phase II, the first generation experimental bits were tested in the geothermal drill-bit test facility. Test results indicated that hardness retention at temperature

  15. Universality and clustering in 1 + 1 dimensional superstring-bit models

    International Nuclear Information System (INIS)

    Bergman, O.; Thorn, C.B.

    1996-01-01

    We construct a 1+1 dimensional superstring-bit model for D=3 Type IIB superstring. This low dimension model escapes the problem encountered in higher dimension models: (1) It possesses full Galilean supersymmetry; (2) For noninteracting Polymers of bits, the exactly soluble linear superpotential describing bit interactions is in a large universality class of superpotentials which includes ones bounded at spatial infinity; (3) The latter are used to construct a superstring-bit model with the clustering properties needed to define an S-matrix for closed polymers of superstring-bits

  16. Transduplication resulted in the incorporation of two protein-coding sequences into the Turmoil-1 transposable element of C. elegans

    Directory of Open Access Journals (Sweden)

    Pupko Tal

    2008-10-01

    Full Text Available Abstract Transposable elements may acquire unrelated gene fragments into their sequences in a process called transduplication. Transduplication of protein-coding genes is common in plants, but is unknown of in animals. Here, we report that the Turmoil-1 transposable element in C. elegans has incorporated two protein-coding sequences into its inverted terminal repeat (ITR sequences. The ITRs of Turmoil-1 contain a conserved RNA recognition motif (RRM that originated from the rsp-2 gene and a fragment from the protein-coding region of the cpg-3 gene. We further report that an open reading frame specific to C. elegans may have been created as a result of a Turmoil-1 insertion. Mutations at the 5' splice site of this open reading frame may have reactivated the transduplicated RRM motif. Reviewers This article was reviewed by Dan Graur and William Martin. For the full reviews, please go to the Reviewers' Reports section.

  17. Heat Generation During Bone Drilling: A Comparison Between Industrial and Orthopaedic Drill Bits.

    Science.gov (United States)

    Hein, Christopher; Inceoglu, Serkan; Juma, David; Zuckerman, Lee

    2017-02-01

    Cortical bone drilling for preparation of screw placement is common in multiple surgical fields. The heat generated while drilling may reach thresholds high enough to cause osteonecrosis. This can compromise implant stability. Orthopaedic drill bits are several orders more expensive than their similarly sized, publicly available industrial counterparts. We hypothesize that an industrial bit will generate less heat during drilling, and the bits will not generate more heat after multiple cortical passes. We compared 4 4.0 mm orthopaedic and 1 3.97 mm industrial drill bits. Three types of each bit were drilled into porcine femoral cortices 20 times. The temperature of the bone was measured with thermocouple transducers. The heat generated during the first 5 drill cycles for each bit was compared to the last 5 cycles. These data were analyzed with analysis of covariance. The industrial drill bit generated the smallest mean increase in temperature (2.8 ± 0.29°C) P industrial bit generated less heat during drilling than its orthopaedic counterparts. The bits maintained their performance after 20 drill cycles. Consideration should be given by manufacturers to design differences that may contribute to a more efficient cutting bit. Further investigation into the reuse of these drill bits may be warranted, as our data suggest their efficiency is maintained after multiple uses.

  18. The genome of the THE I human transposable repetitive elements is composed of a basic motif homologous to an ancestral immunoglobulin gene sequence.

    OpenAIRE

    Hakim, I; Amariglio, N; Grossman, Z; Simoni-Brok, F; Ohno, S; Rechavi, G

    1994-01-01

    Amplification of rearranged human immunoglobulin heavy-chain genes using the polymerase chain reaction resulted unexpectedly in the amplification of human transposable repetitive element genomes. These were identified as members of the THE I (transposon-like human element I) transposable element family. Analysis of the THE I sequences revealed the presence of several copies of the ancestral building block described > 10 years ago by Ohno and coworkers as the primordial immunoglobulin sequence...

  19. A preliminary study on the containment building integrity following BIT removal for nuclear power plant

    International Nuclear Information System (INIS)

    Jo, Jong Young; Song, Dong Soo; Byun, Choong Sub

    2008-01-01

    Boron Injection Tank(BIT) is a component of the Safety Injection System, which its sole function is to provide concentrated boric acid to the reactor coolant in order to mitigate the consequences of postulated main steamline break accidents. Although BIT plays an important role in mitigating the accident, high concentration of 20,000ppm causes valve leakage, clog of precipitation and continuous heat tracing have to be provided. For the removal of BIT, benchmarking analysis is performed between COPATTA code used in final safety analysis report and CONTEMPT code to be used this study. CONTEMPT is well compatible with COPATTA. The sensitivity study for integrity is performed for the three cases of full double ended rupture at 102% power with diesel generator failure, 3.4m 3 and 2400ppm BIT, 3.4m 3 and 0ppm BIT and no volume of BIT. The results show that the deactivation of BIT is plausible for success

  20. Satellite DNA and Transposable Elements in Seabuckthorn (Hippophae rhamnoides), a Dioecious Plant with Small Y and Large X Chromosomes.

    Science.gov (United States)

    Puterova, Janka; Razumova, Olga; Martinek, Tomas; Alexandrov, Oleg; Divashuk, Mikhail; Kubat, Zdenek; Hobza, Roman; Karlov, Gennady; Kejnovsky, Eduard

    2017-01-01

    Seabuckthorn (Hippophae rhamnoides) is a dioecious shrub commonly used in the pharmaceutical, cosmetic, and environmental industry as a source of oil, minerals and vitamins. In this study, we analyzed the transposable elements and satellites in its genome. We carried out Illumina DNA sequencing and reconstructed the main repetitive DNA sequences. For data analysis, we developed a new bioinformatics approach for advanced satellite DNA analysis and showed that about 25% of the genome consists of satellite DNA and about 24% is formed of transposable elements, dominated by Ty3/Gypsy and Ty1/Copia LTR retrotransposons. FISH mapping revealed X chromosome-accumulated, Y chromosome-specific or both sex chromosomes-accumulated satellites but most satellites were found on autosomes. Transposable elements were located mostly in the subtelomeres of all chromosomes. The 5S rDNA and 45S rDNA were localized on one autosomal locus each. Although we demonstrated the small size of the Y chromosome of the seabuckthorn and accumulated satellite DNA there, we were unable to estimate the age and extent of the Y chromosome degeneration. Analysis of dioecious relatives such as Shepherdia would shed more light on the evolution of these sex chromosomes. © The Author(s) 2017. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  1. Analysis of transposable elements in the genome of Asparagus officinalis from high coverage sequence data.

    Science.gov (United States)

    Li, Shu-Fen; Gao, Wu-Jun; Zhao, Xin-Peng; Dong, Tian-Yu; Deng, Chuan-Liang; Lu, Long-Dou

    2014-01-01

    Asparagus officinalis is an economically and nutritionally important vegetable crop that is widely cultivated and is used as a model dioecious species to study plant sex determination and sex chromosome evolution. To improve our understanding of its genome composition, especially with respect to transposable elements (TEs), which make up the majority of the genome, we performed Illumina HiSeq2000 sequencing of both male and female asparagus genomes followed by bioinformatics analysis. We generated 17 Gb of sequence (12×coverage) and assembled them into 163,406 scaffolds with a total cumulated length of 400 Mbp, which represent about 30% of asparagus genome. Overall, TEs masked about 53% of the A. officinalis assembly. Majority of the identified TEs belonged to LTR retrotransposons, which constitute about 28% of genomic DNA, with Ty1/copia elements being more diverse and accumulated to higher copy numbers than Ty3/gypsy. Compared with LTR retrotransposons, non-LTR retrotransposons and DNA transposons were relatively rare. In addition, comparison of the abundance of the TE groups between male and female genomes showed that the overall TE composition was highly similar, with only slight differences in the abundance of several TE groups, which is consistent with the relatively recent origin of asparagus sex chromosomes. This study greatly improves our knowledge of the repetitive sequence construction of asparagus, which facilitates the identification of TEs responsible for the early evolution of plant sex chromosomes and is helpful for further studies on this dioecious plant.

  2. Convergent adaptive evolution in marginal environments: unloading transposable elements as a common strategy among mangrove genomes.

    Science.gov (United States)

    Lyu, Haomin; He, Ziwen; Wu, Chung-I; Shi, Suhua

    2018-01-01

    Several clades of mangrove trees independently invade the interface between land and sea at the margin of woody plant distribution. As phenotypic convergence among mangroves is common, the possibility of convergent adaptation in their genomes is quite intriguing. To study this molecular convergence, we sequenced multiple mangrove genomes. In this study, we focused on the evolution of transposable elements (TEs) in relation to the genome size evolution. TEs, generally considered genomic parasites, are the most common components of woody plant genomes. Analyzing the long terminal repeat-retrotransposon (LTR-RT) type of TE, we estimated their death rates by counting solo-LTRs and truncated elements. We found that all lineages of mangroves massively and convergently reduce TE loads in comparison to their nonmangrove relatives; as a consequence, genome size reduction happens independently in all six mangrove lineages; TE load reduction in mangroves can be attributed to the paucity of young elements; the rarity of young LTR-RTs is a consequence of fewer births rather than access death. In conclusion, mangrove genomes employ a convergent strategy of TE load reduction by suppressing element origination in their independent adaptation to a new environment. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  3. Spatio-temporal requirements for transposable element piRNA-mediated silencing during Drosophila oogenesis.

    Science.gov (United States)

    Dufourt, Jérémy; Dennis, Cynthia; Boivin, Antoine; Gueguen, Nathalie; Théron, Emmanuelle; Goriaux, Coline; Pouchin, Pierre; Ronsseray, Stéphane; Brasset, Emilie; Vaury, Chantal

    2014-02-01

    During Drosophila oogenesis, transposable element (TE) repression involves the Piwi-interacting RNA (piRNA) pathway which ensures genome integrity for the next generation. We developed a transgenic model to study repression of the Idefix retrotransposon in the germline. Using a candidate gene KD-approach, we identified differences in the spatio-temporal requirements of the piRNA pathway components for piRNA-mediated silencing. Some of them (Aub, Vasa, Spn-E) are necessary in very early stages of oogenesis within the germarium and appear to be less important for efficient TE silencing thereafter. Others (Piwi, Ago3, Mael) are required at all stages of oogenesis. Moreover, during early oogenesis, in the dividing cysts within the germarium, Idefix anti-sense transgenes escape host control, and this is associated with very low piwi expression. Silencing of P-element-based transgenes is also strongly weakened in these cysts. This region, termed the 'Piwiless pocket' or Pilp, may ensure that new TE insertions occur and are transmitted to the next generation, thereby contributing to genome dynamics. In contrast, piRNA-mediated silencing is strong in germline stem cells in which TE mobilization is tightly repressed ensuring the continued production of viable germline cysts.

  4. SimulaTE: simulating complex landscapes of transposable elements of populations.

    Science.gov (United States)

    Kofler, Robert

    2018-04-15

    Estimating the abundance of transposable elements (TEs) in populations (or tissues) promises to answer many open research questions. However, progress is hampered by the lack of concordance between different approaches for TE identification and thus potentially unreliable results. To address this problem, we developed SimulaTE a tool that generates TE landscapes for populations using a newly developed domain specific language (DSL). The simple syntax of our DSL allows for easily building even complex TE landscapes that have, for example, nested, truncated and highly diverged TE insertions. Reads may be simulated for the populations using different sequencing technologies (PacBio, Illumina paired-ends) and strategies (sequencing individuals and pooled populations). The comparison between the expected (i.e. simulated) and the observed results will guide researchers in finding the most suitable approach for a particular research question. SimulaTE is implemented in Python and available at https://sourceforge.net/projects/simulates/. Manual https://sourceforge.net/p/simulates/wiki/Home/#manual; Test data and tutorials https://sourceforge.net/p/simulates/wiki/Home/#walkthrough; Validation https://sourceforge.net/p/simulates/wiki/Home/#validation. robert.kofler@vetmeduni.ac.at.

  5. Evolution of hypervirulence by a MRSA clone through acquisition of a transposable element.

    Science.gov (United States)

    Benson, Meredith A; Ohneck, Elizabeth A; Ryan, Chanelle; Alonzo, Francis; Smith, Hannah; Narechania, Apurva; Kolokotronis, Sergios-Orestis; Satola, Sarah W; Uhlemann, Anne-Catrin; Sebra, Robert; Deikus, Gintaras; Shopsin, Bo; Planet, Paul J; Torres, Victor J

    2014-08-01

    Staphylococcus aureus has evolved as a pathogen that causes a range of diseases in humans. There are two dominant modes of evolution thought to explain most of the virulence differences between strains. First, virulence genes may be acquired from other organisms. Second, mutations may cause changes in the regulation and expression of genes. Here we describe an evolutionary event in which transposition of an IS element has a direct impact on virulence gene regulation resulting in hypervirulence. Whole-genome analysis of a methicillin-resistant S. aureus (MRSA) strain USA500 revealed acquisition of a transposable element (IS256) that is absent from close relatives of this strain. Of the multiple copies of IS256 found in the USA500 genome, one was inserted in the promoter sequence of repressor of toxins (Rot), a master transcriptional regulator responsible for the expression of virulence factors in S. aureus. We show that insertion into the rot promoter by IS256 results in the derepression of cytotoxin expression and increased virulence. Taken together, this work provides new insight into evolutionary strategies by which S. aureus is able to modify its virulence properties and demonstrates a novel mechanism by which horizontal gene transfer directly impacts virulence through altering toxin regulation. © 2014 John Wiley & Sons Ltd.

  6. Ancient transposable elements transformed the uterine regulatory landscape and transcriptome during the evolution of mammalian pregnancy.

    Science.gov (United States)

    Lynch, Vincent J; Nnamani, Mauris C; Kapusta, Aurélie; Brayer, Kathryn; Plaza, Silvia L; Mazur, Erik C; Emera, Deena; Sheikh, Shehzad Z; Grützner, Frank; Bauersachs, Stefan; Graf, Alexander; Young, Steven L; Lieb, Jason D; DeMayo, Francesco J; Feschotte, Cédric; Wagner, Günter P

    2015-02-03

    A major challenge in biology is determining how evolutionarily novel characters originate; however, mechanistic explanations for the origin of new characters are almost completely unknown. The evolution of pregnancy is an excellent system in which to study the origin of novelties because mammals preserve stages in the transition from egg laying to live birth. To determine the molecular bases of this transition, we characterized the pregnant/gravid uterine transcriptome from tetrapods to trace the evolutionary history of uterine gene expression. We show that thousands of genes evolved endometrial expression during the origins of mammalian pregnancy, including genes that mediate maternal-fetal communication and immunotolerance. Furthermore, thousands of cis-regulatory elements that mediate decidualization and cell-type identity in decidualized stromal cells are derived from ancient mammalian transposable elements (TEs). Our results indicate that one of the defining mammalian novelties evolved from DNA sequences derived from ancient mammalian TEs co-opted into hormone-responsive regulatory elements distributed throughout the genome. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  7. Origin and characteristics of Pseudomonas aeruginosa PAO1 clones surviving after the induction of transposable prophages

    Energy Technology Data Exchange (ETDEWEB)

    Krylov, V.N.; Solov`era, T.I.; Burkal`tseva, M.V. [State Research Institute of Genetics and Selection of Industrial Microorganisms, Moscow (Russian Federation)] [and others

    1995-08-01

    Various mutations cancelling the lethal effect of phage lytic development and simultaneous phenotypic modifications were found in rare clones surviving after incubation at 42{degrees}C of Pseudomonas aeruginosa (D3112 cts15), lysogenic for thermoinducible mutant cts15 of the transposable prophage (TP) D3112. All mutations arose prior to thermal induction. Temperature induction of other bacteriophages (nontransposable) did not lead to selection of bacterial morphological mutants. Therefore, it was concluded that mutagenesis occurred upon the partial (reversible) TP derepression accompanied by coupled replication-transposition of TP, the latter being the direct cause of the mutator effect. Isolation of the P. aeruginosa PAO1 mutant R10 (this mutant is resistant to infection with TP at 42{degrees}C) allowed the proper selection and examination of numerous survivors. Comparison of their types derived from lysogens with different prophage location indicated that the number of secondary sites where TP integration is possible without the loss of cell viability is limited. Several transposition events occurred in the history of some survivors (during a repeated or single derepression event). Type D clones, which produce small colonies, are of special interest, because mechanisms underlying the survival of such clones are extremely diverse, and their phenotypes indicate the possibility of stable chromosomal rearrangements in the genome of P. aeruginosa. 16 refs., 2 figs., 2 tabs.

  8. The role of transposable elements in the evolution of non-mammalian vertebrates and invertebrates

    Science.gov (United States)

    2010-01-01

    Background Transposable elements (TEs) have played an important role in the diversification and enrichment of mammalian transcriptomes through various mechanisms such as exonization and intronization (the birth of new exons/introns from previously intronic/exonic sequences, respectively), and insertion into first and last exons. However, no extensive analysis has compared the effects of TEs on the transcriptomes of mammals, non-mammalian vertebrates and invertebrates. Results We analyzed the influence of TEs on the transcriptomes of five species, three invertebrates and two non-mammalian vertebrates. Compared to previously analyzed mammals, there were lower levels of TE introduction into introns, significantly lower numbers of exonizations originating from TEs and a lower percentage of TE insertion within the first and last exons. Although the transcriptomes of vertebrates exhibit significant levels of exonization of TEs, only anecdotal cases were found in invertebrates. In vertebrates, as in mammals, the exonized TEs are mostly alternatively spliced, indicating that selective pressure maintains the original mRNA product generated from such genes. Conclusions Exonization of TEs is widespread in mammals, less so in non-mammalian vertebrates, and very low in invertebrates. We assume that the exonization process depends on the length of introns. Vertebrates, unlike invertebrates, are characterized by long introns and short internal exons. Our results suggest that there is a direct link between the length of introns and exonization of TEs and that this process became more prevalent following the appearance of mammals. PMID:20525173

  9. Two new miniature inverted-repeat transposable elements in the genome of the clam Donax trunculus.

    Science.gov (United States)

    Šatović, Eva; Plohl, Miroslav

    2017-10-01

    Repetitive sequences are important components of eukaryotic genomes that drive their evolution. Among them are different types of mobile elements that share the ability to spread throughout the genome and form interspersed repeats. To broaden the generally scarce knowledge on bivalves at the genome level, in the clam Donax trunculus we described two new non-autonomous DNA transposons, miniature inverted-repeat transposable elements (MITEs), named DTC M1 and DTC M2. Like other MITEs, they are characterized by their small size, their A + T richness, and the presence of terminal inverted repeats (TIRs). DTC M1 and DTC M2 are 261 and 286 bp long, respectively, and in addition to TIRs, both of them contain a long imperfect palindrome sequence in their central parts. These elements are present in complete and truncated versions within the genome of the clam D. trunculus. The two new MITEs share only structural similarity, but lack any nucleotide sequence similarity to each other. In a search for related elements in databases, blast search revealed within the Crassostrea gigas genome a larger element sharing sequence similarity only to DTC M1 in its TIR sequences. The lack of sequence similarity with any previously published mobile elements indicates that DTC M1 and DTC M2 elements may be unique to D. trunculus.

  10. Ancient Transposable Elements Transformed the Uterine Regulatory Landscape and Transcriptome during the Evolution of Mammalian Pregnancy

    Directory of Open Access Journals (Sweden)

    Vincent J. Lynch

    2015-02-01

    Full Text Available A major challenge in biology is determining how evolutionarily novel characters originate; however, mechanistic explanations for the origin of new characters are almost completely unknown. The evolution of pregnancy is an excellent system in which to study the origin of novelties because mammals preserve stages in the transition from egg laying to live birth. To determine the molecular bases of this transition, we characterized the pregnant/gravid uterine transcriptome from tetrapods to trace the evolutionary history of uterine gene expression. We show that thousands of genes evolved endometrial expression during the origins of mammalian pregnancy, including genes that mediate maternal-fetal communication and immunotolerance. Furthermore, thousands of cis-regulatory elements that mediate decidualization and cell-type identity in decidualized stromal cells are derived from ancient mammalian transposable elements (TEs. Our results indicate that one of the defining mammalian novelties evolved from DNA sequences derived from ancient mammalian TEs co-opted into hormone-responsive regulatory elements distributed throughout the genome.

  11. Transposable elements and two other molecular markers as typing tools for the genus Paracoccidioides.

    Science.gov (United States)

    Alves, Fernanda Lourenço; Ribeiro, Mariceli Araújo; Hahn, Rosane Christine; de Melo Teixeira, Marcus; de Camargo, Zoilo Pires; Cisalpino, Patrícia Silva; Marini, Marjorie Mendes

    2015-02-01

    Studies comparing Paracoccidioides brasiliensis and Paracoccidioides lutzii have shown that these fungi have significant genomic differences that may have implications in the clinical manifestation, diagnosis, and treatment of paracoccidioidomycosis caused by them. Thus, molecular typing methods are required that can distinguish between various species of Paracoccidioides. The aim of this study was to explore the potential use as molecular markers of the transposable elements Trem A-H recently identified and characterized in the genus Paracoccidioides as a means of differentiating the species. We take advantage of the abundance and distribution of these transposons in the Paracoccidioides genomes to develop a simple and highly reproducible polymerase chain reaction (PCR)-based technique. Furthermore we compare the performance of this test with two other molecular markers already in use to identify these fungi. © The Author 2014. Published by Oxford University Press on behalf of The International Society for Human and Animal Mycology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  12. Genome-Wide Estimates of Transposable Element Insertion and Deletion Rates in Drosophila Melanogaster

    Science.gov (United States)

    Adrion, Jeffrey R.; Song, Michael J.; Schrider, Daniel R.; Hahn, Matthew W.

    2017-01-01

    Abstract Knowing the rate at which transposable elements (TEs) insert and delete is critical for understanding their role in genome evolution. We estimated spontaneous rates of insertion and deletion for all known, active TE superfamilies present in a set of Drosophila melanogaster mutation-accumulation (MA) lines using whole genome sequence data. Our results demonstrate that TE insertions far outpace TE deletions in D. melanogaster. We found a significant effect of background genotype on TE activity, with higher rates of insertions in one MA line. We also found significant rate heterogeneity between the chromosomes, with both insertion and deletion rates elevated on the X relative to the autosomes. Further, we identified significant associations between TE activity and chromatin state, and tested for associations between TE activity and other features of the local genomic environment such as TE content, exon content, GC content, and recombination rate. Our results provide the most detailed assessment of TE mobility in any organism to date, and provide a useful benchmark for both addressing theoretical predictions of TE dynamics and for exploring large-scale patterns of TE movement in D. melanogaster and other species. PMID:28338986

  13. A simplified formalism of the algebra of partially transposed permutation operators with applications

    Science.gov (United States)

    Mozrzymas, Marek; Studziński, Michał; Horodecki, Michał

    2018-03-01

    Herein we continue the study of the representation theory of the algebra of permutation operators acting on the n -fold tensor product space, partially transposed on the last subsystem. We develop the concept of partially reduced irreducible representations, which allows us to significantly simplify previously proved theorems and, most importantly, derive new results for irreducible representations of the mentioned algebra. In our analysis we are able to reduce the complexity of the central expressions by getting rid of sums over all permutations from the symmetric group, obtaining equations which are much more handy in practical applications. We also find relatively simple matrix representations for the generators of the underlying algebra. The obtained simplifications and developments are applied to derive the characteristics of a deterministic port-based teleportation scheme written purely in terms of irreducible representations of the studied algebra. We solve an eigenproblem for the generators of the algebra, which is the first step towards a hybrid port-based teleportation scheme and gives us new proofs of the asymptotic behaviour of teleportation fidelity. We also show a connection between the density operator characterising port-based teleportation and a particular matrix composed of an irreducible representation of the symmetric group, which encodes properties of the investigated algebra.

  14. P-MITE: a database for plant miniature inverted-repeat transposable elements.

    Science.gov (United States)

    Chen, Jiongjiong; Hu, Qun; Zhang, Yu; Lu, Chen; Kuang, Hanhui

    2014-01-01

    Miniature inverted-repeat transposable elements (MITEs) are prevalent in eukaryotic species including plants. MITE families vary dramatically and usually cannot be identified based on homology. In this study, we de novo identified MITEs from 41 plant species, using computer programs MITE Digger, MITE-Hunter and/or Repetitive Sequence with Precise Boundaries (RSPB). MITEs were found in all, but one (Cyanidioschyzon merolae), species. Combined with the MITEs identified previously from the rice genome, >2.3 million sequences from 3527 MITE families were obtained from 41 plant species. In general, higher plants contain more MITEs than lower plants, with a few exceptions such as papaya, with only 538 elements. The largest number of MITEs is found in apple, with 237 302 MITE sequences. The number of MITE sequences in a genome is significantly correlated with genome size. A series of databases (plant MITE databases, P-MITE), available online at http://pmite.hzau.edu.cn/django/mite/, was constructed to host all MITE sequences from the 41 plant genomes. The databases are available for sequence similarity searches (BLASTN), and MITE sequences can be downloaded by family or by genome. The databases can be used to study the origin and amplification of MITEs, MITE-derived small RNAs and roles of MITEs on gene and genome evolution.

  15. Genome-wide identification of genes regulated in trans by transposable element small interfering RNAs

    Science.gov (United States)

    McCue, Andrea D; Nuthikattu, Saivageethi; Slotkin, R Keith

    2013-01-01

    Transposable elements (TEs) are known to influence the regulation of neighboring genes through a variety of mechanisms. Additionally, it was recently discovered that TEs can regulate non-neighboring genes through the trans-acting nature of small interfering RNAs (siRNAs). When the epigenetic repression of TEs is lost, TEs become transcriptionally active, and the host cell acts to repress mutagenic transposition by degrading TE mRNAs into siRNAs. In this study, we have performed a genome-wide analysis in the model plant Arabidopsis thaliana and found that TE siRNA-based regulation of genic mRNAs is more pervasive than the two formerly characterized proof-of-principle examples. We identified 27 candidate genic mRNAs that do not contain a TE fragment but are regulated through partial complementarity by the accumulation of TE siRNAs and are therefore influenced by TE epigenetic activation. We have experimentally confirmed several gene targets and demonstrated that they respond to the accumulation of specific 21 nucleotide TE siRNAs that are incorporated into the Arabidopsis Argonaute1 protein. Additionally, we found that one TE siRNA specifically targets and inhibits the formation of a host protein that acts to repress TE activity, suggesting that TEs harbor and potentially evolutionarily select short sequences to act as suppressors of host TE repression. PMID:23863322

  16. Power analysis data set for 4-Bit MOCLA adder.

    Science.gov (United States)

    Nehru, K

    2018-02-01

    In order to reduce the silicon area of the chip and optimize the power of arithmetic circuits, this paper proposes a low power carry look-ahead BCD (Binary Coded Decimal) adder which uses a four bit MOCLA (Multiplexer and Or gate based Carry Look Ahead Adder) that forms the basic building block. This proposed MOCLA style uses a 2 input MUX, OR gate and GDI (Gate Diffusion Input) based full adder and PG units and it is used for achieving low power in BCD adder circuits.

  17. "Material interactions": from atoms & bits to entangled practices

    DEFF Research Database (Denmark)

    Vallgårda, Anna

    This panel addresses some of the core aspects of the theme "It's the experience", for the CHI2012 conference by focusing on the materials that constitute the foundation for interaction with computers. We take a series of questions as a joint point of departure to consider the nature and character...... and intellectually stimulating panel moderated by Prof. Mikael Wiberg consisting of a number of scholars with a well-developed view on digital materialities to fuel a discussion on material interactions - from atoms & bits to entangled practices. These scholars include: Prof. Hiroshi Ishii, Prof. Paul Dourish...

  18. Extending Landauer's bound from bit erasure to arbitrary computation

    Science.gov (United States)

    Wolpert, David

    The minimal thermodynamic work required to erase a bit, known as Landauer's bound, has been extensively investigated both theoretically and experimentally. However, when viewed as a computation that maps inputs to outputs, bit erasure has a very special property: the output does not depend on the input. Existing analyses of thermodynamics of bit erasure implicitly exploit this property, and thus cannot be directly extended to analyze the computation of arbitrary input-output maps. Here we show how to extend these earlier analyses of bit erasure to analyze the thermodynamics of arbitrary computations. Doing this establishes a formal connection between the thermodynamics of computers and much of theoretical computer science. We use this extension to analyze the thermodynamics of the canonical ``general purpose computer'' considered in computer science theory: a universal Turing machine (UTM). We consider a UTM which maps input programs to output strings, where inputs are drawn from an ensemble of random binary sequences, and prove: i) The minimal work needed by a UTM to run some particular input program X and produce output Y is the Kolmogorov complexity of Y minus the log of the ``algorithmic probability'' of Y. This minimal amount of thermodynamic work has a finite upper bound, which is independent of the output Y, depending only on the details of the UTM. ii) The expected work needed by a UTM to compute some given output Y is infinite. As a corollary, the overall expected work to run a UTM is infinite. iii) The expected work needed by an arbitrary Turing machine T (not necessarily universal) to compute some given output Y can either be infinite or finite, depending on Y and the details of T. To derive these results we must combine ideas from nonequilibrium statistical physics with fundamental results from computer science, such as Levin's coding theorem and other theorems about universal computation. I would like to ackowledge the Santa Fe Institute, Grant No

  19. Digital sound: Subjective tests on low bit-rate codecs

    Science.gov (United States)

    Gilchrist, N. H. C.

    At the beginning of 1990, BBC Research Department tested four experimental high-quality low bit-rate audio codecs which were under development as part of the Eureka 147 Digital Audio Broadcasting project. The work involved preliminary listening tests to identify critical test material, followed by formal subjective tests to determine audio quality and error performance. The listeners could detect some loss of audio quality with all of the codecs using the most critical material. There were also indications that one of the codecs did not always reproduce the phantom sound sources in their correct position.

  20. Power analysis data set for 4-Bit MOCLA adder

    Directory of Open Access Journals (Sweden)

    K. Nehru

    2018-02-01

    Full Text Available In order to reduce the silicon area of the chip and optimize the power of arithmetic circuits, this paper proposes a low power carry look-ahead BCD (Binary Coded Decimal adder which uses a four bit MOCLA (Multiplexer and Or gate based Carry Look Ahead Adder that forms the basic building block. This proposed MOCLA style uses a 2 input MUX, OR gate and GDI (Gate Diffusion Input based full adder and PG units and it is used for achieving low power in BCD adder circuits.

  1. Download this PDF file

    African Journals Online (AJOL)

    Dr Obe

    Key words: mmf, permeance, transposed auxiliary winding, flux distribution, flux density. List of Principal Symbols m0 – Instantaneous value of the magnetizing mmf. M0 – Peak amplitude of the instantaneous magnetizing mmf. X - Angular distance measured from the references axis, which is taken as the center line of the ...

  2. Device-independent bit commitment based on the CHSH inequality

    International Nuclear Information System (INIS)

    Aharon, N; Massar, S; Pironio, S; Silman, J

    2016-01-01

    Bit commitment and coin flipping occupy a unique place in the device-independent landscape, as the only device-independent protocols thus far suggested for these tasks are reliant on tripartite GHZ correlations. Indeed, we know of no other bipartite tasks, which admit a device-independent formulation, but which are not known to be implementable using only bipartite nonlocality. Another interesting feature of these protocols is that the pseudo-telepathic nature of GHZ correlations—in contrast to the generally statistical character of nonlocal correlations, such as those arising in the violation of the CHSH inequality—is essential to their formulation and analysis. In this work, we present a device-independent bit commitment protocol based on CHSH testing, which achieves the same security as the optimal GHZ-based protocol, albeit at the price of fixing the time at which Alice reveals her commitment. The protocol is analyzed in the most general settings, where the devices are used repeatedly and may have long-term quantum memory. We also recast the protocol in a post-quantum setting where both honest and dishonest parties are restricted only by the impossibility of signaling, and find that overall the supra-quantum structure allows for greater security. (paper)

  3. Guaranteed energy-efficient bit reset in finite time.

    Science.gov (United States)

    Browne, Cormac; Garner, Andrew J P; Dahlsten, Oscar C O; Vedral, Vlatko

    2014-09-05

    Landauer's principle states that it costs at least kBTln2 of work to reset one bit in the presence of a heat bath at temperature T. The bound of kBTln2 is achieved in the unphysical infinite-time limit. Here we ask what is possible if one is restricted to finite-time protocols. We prove analytically that it is possible to reset a bit with a work cost close to kBTln2 in a finite time. We construct an explicit protocol that achieves this, which involves thermalizing and changing the system's Hamiltonian so as to avoid quantum coherences. Using concepts and techniques pertaining to single-shot statistical mechanics, we furthermore prove that the heat dissipated is exponentially close to the minimal amount possible not just on average, but guaranteed with high confidence in every run. Moreover, we exploit the protocol to design a quantum heat engine that works near the Carnot efficiency in finite time.

  4. Reexamination of quantum bit commitment: The possible and the impossible

    International Nuclear Information System (INIS)

    D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Schlingemann, Dirk; Werner, Reinhard F.

    2007-01-01

    Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed 'honest' strategy, so that 'anonymous state protocols', which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory

  5. Giga-bit optical data transmission module for Beam Instrumentation

    CERN Document Server

    Roedne, L T; Cenkeramaddi, L R; Jiao, L

    Particle accelerators require electronic instrumentation for diagnostic, assessment and monitoring during operation of the transferring and circulating beams. A sensor located near the beam provides an electrical signal related to the observable quantity of interest. The front-end electronics provides analog-to-digital conversion of the quantity being observed and the generated data are to be transferred to the external digital back-end for data processing, and to display to the operators and logging. This research project investigates the feasibility of radiation-tolerant giga-bit data transmission over optic fibre for beam instrumentation applications, starting from the assessment of the state of the art technology, identification of challenges and proposal of a system level solution, which should be validated with a PCB design in an experimental setup. Radiation tolerance of 10 kGy (Si) Total Ionizing Dose (TID) over 10 years of operation, Bit Error Rate (BER) 10-6 or better. The findings and results of th...

  6. Learning may need only a few bits of synaptic precision

    Science.gov (United States)

    Baldassi, Carlo; Gerace, Federica; Lucibello, Carlo; Saglietti, Luca; Zecchina, Riccardo

    2016-05-01

    Learning in neural networks poses peculiar challenges when using discretized rather then continuous synaptic states. The choice of discrete synapses is motivated by biological reasoning and experiments, and possibly by hardware implementation considerations as well. In this paper we extend a previous large deviations analysis which unveiled the existence of peculiar dense regions in the space of synaptic states which accounts for the possibility of learning efficiently in networks with binary synapses. We extend the analysis to synapses with multiple states and generally more plausible biological features. The results clearly indicate that the overall qualitative picture is unchanged with respect to the binary case, and very robust to variation of the details of the model. We also provide quantitative results which suggest that the advantages of increasing the synaptic precision (i.e., the number of internal synaptic states) rapidly vanish after the first few bits, and therefore that, for practical applications, only few bits may be needed for near-optimal performance, consistent with recent biological findings. Finally, we demonstrate how the theoretical analysis can be exploited to design efficient algorithmic search strategies.

  7. Reexamination of quantum bit commitment: The possible and the impossible

    Science.gov (United States)

    D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Schlingemann, Dirk; Werner, Reinhard F.

    2007-09-01

    Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed “honest” strategy, so that “anonymous state protocols,” which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver’s laboratory.

  8. Improved Iris Recognition through Fusion of Hamming Distance and Fragile Bit Distance.

    Science.gov (United States)

    Hollingsworth, Karen P; Bowyer, Kevin W; Flynn, Patrick J

    2011-12-01

    The most common iris biometric algorithm represents the texture of an iris using a binary iris code. Not all bits in an iris code are equally consistent. A bit is deemed fragile if its value changes across iris codes created from different images of the same iris. Previous research has shown that iris recognition performance can be improved by masking these fragile bits. Rather than ignoring fragile bits completely, we consider what beneficial information can be obtained from the fragile bits. We find that the locations of fragile bits tend to be consistent across different iris codes of the same eye. We present a metric, called the fragile bit distance, which quantitatively measures the coincidence of the fragile bit patterns in two iris codes. We find that score fusion of fragile bit distance and Hamming distance works better for recognition than Hamming distance alone. To our knowledge, this is the first and only work to use the coincidence of fragile bit locations to improve the accuracy of matches.

  9. Energy-Efficient Hybrid Spintronic-Straintronic Nonvolatile Reconfigurable Equality Bit Comparator

    Science.gov (United States)

    Biswas, Ayan K.; Atulasimha, Jayasimha; Bandyopadhyay, Supriyo

    We propose and analyze a “spintronic/straintronic” reconfigurable equality bit comparator implemented with a nanowire spin valve whose two contacts are two-phase multiferroic nanomagnets and possess bistable magnetization. A reference bit is “written” into a stable magnetization state of one contact and an input bit in that of the other with electrically generated strain. The spin-valve’s resistance is lowered (raised) if the bits match (do not match). Multiple comparators can be interfaced in parallel with a magneto-tunneling junction to determine if an N-bit input stream matches an N-bit reference stream bit by bit. The system is robust against thermal noise at room temperature and a 16-bit comparator can operate at ˜743MHz while dissipating ˜28fJ per cycle. This implementation is more energy-efficient than CMOS-based implementations and the reference bits can be stored in the comparator itself without the need for refresh cycles or the need to fetch them from a remote memory for comparison. That improves reliability, speed and security.

  10. Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2016-03-01

    Full Text Available Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential. One method is the algorithm Blowfish Cryptography which is a symmetric key using the algorithm to perform encryption and decryption. Applications that are built can perform file encryption-shaped images, videos, and documents. These applications can be running on a mobile phone that has a minimal operating system Android version 2.3. The software used to build these applications is Eclipse. The results of this research indicate that applications built capable of performing encryption and decryption. The results file encryption makes files into another unknown meaning. By using the keys numbered 72 bits or 9 character takes 1,49x108 years to break it with the speed it’s computation is 106 key/sec.

  11. International Congress on Transposable Elements (ICTE) 2012 in Saint Malo and the sea of TE stories

    Science.gov (United States)

    2012-01-01

    An international conference on Transposable Elements (TEs) was held 21–24 April 2012 in Saint Malo, France. Organized by the French Transposition Community (GDR Elements Génétiques Mobiles et Génomes, CNRS) and the French Society of Genetics (SFG), the conference’s goal was to bring together researchers from around the world who study transposition in diverse organisms using multiple experimental approaches. The meeting drew more than 217 attendees and most contributed through poster presentations (117), invited talks and short talks selected from poster abstracts (48 in total). The talks were organized into four scientific sessions, focused on: impact of TEs on genomes, control of transposition, evolution of TEs and mechanisms of transposition. Here, we present highlights from the talks given during the platform sessions. The conference was sponsored by Alliance pour les sciences de la vie et de la santé (Aviesan), Centre national de la recherche scientifique (CNRS), Institut national de la santé et de la recherche médicale (INSERM), Institut de recherche pour le développement (IRD), Institut national de la recherche agronomique (INRA), Université de Perpignan, Université de Rennes 1, Région Bretagne and Mobile DNA. Chair of the organization committee Jean-Marc Deragon Organizers Abdelkader Ainouche, Mireille Bétermier, Mick Chandler, Richard Cordaux, Gaël Cristofari, Jean-Marc Deragon, Pascale Lesage, Didier Mazel, Olivier Panaud, Hadi Quesneville, Chantal Vaury, Cristina Vieira and Clémentine Vitte PMID:23110759

  12. Silencing of Transposable Elements by piRNAs in Drosophila: An Evolutionary Perspective.

    Science.gov (United States)

    Luo, Shiqi; Lu, Jian

    2017-06-01

    Transposable elements (TEs) are DNA sequences that can move within the genome. TEs have greatly shaped the genomes, transcriptomes, and proteomes of the host organisms through a variety of mechanisms. However, TEs generally disrupt genes and destabilize the host genomes, which substantially reduce fitness of the host organisms. Understanding the genomic distribution and evolutionary dynamics of TEs will greatly deepen our understanding of the TE-mediated biological processes. Most TE insertions are highly polymorphic in Drosophila melanogaster, providing us a good system to investigate the evolution of TEs at the population level. Decades of theoretical and experimental studies have well established "transposition-selection" population genetics model, which assumes that the equilibrium between TE replication and purifying selection determines the copy number of TEs in the genome. In the last decade, P-element-induced wimpy testis (PIWI)-interacting RNAs (piRNAs) were demonstrated to be master repressors of TE activities in Drosophila. The discovery of piRNAs revolutionized our understanding of TE repression, because it reveals that the host organisms have evolved an adaptive mechanism to defend against TE invasion. Tremendous progress has been made to understand the molecular mechanisms by which piRNAs repress active TEs, although many details in this process remain to be further explored. The interaction between piRNAs and TEs well explains the molecular mechanisms underlying hybrid dysgenesis for the I-R and P-M systems in Drosophila, which have puzzled evolutionary biologists for decades. The piRNA repression pathway provides us an unparalleled system to study the co-evolutionary process between parasites and host organisms. Copyright © 2017 Beijing Institute of Genomics, Chinese Academy of Sciences and Genetics Society of China. Production and hosting by Elsevier B.V. All rights reserved.

  13. Annotation and sequence diversity of transposable elements in common bean (Phaseolus vulgaris

    Directory of Open Access Journals (Sweden)

    Scott eJackson

    2014-07-01

    Full Text Available Common bean (Phaseolus vulgaris is an important legume crop grown and consumed worldwide. With the availability of the common bean genome sequence, the next challenge is to annotate the genome and characterize functional DNA elements. Transposable elements (TEs are the most abundant component of plant genomes and can dramatically affect genome evolution and genetic variation. Thus, it is pivotal to identify TEs in the common bean genome. In this study, we performed a genome-wide transposon annotation in common bean using a combination of homology and sequence structure-based methods. We developed a 2.12-Mb transposon database which includes 791 representative transposon sequences and is available upon request or from www.phytozome.org. Of note, nearly all transposons in the database are previously unrecognized TEs. More than 5,000 transposon-related expressed sequence tags (ESTs were detected which indicates that some transposons may be transcriptionally active. Two Ty1-copia retrotransposon families were found to encode the envelope-like protein which has rarely been identified in plant genomes. Also, we identified an extra open reading frame (ORF termed ORF2 from 15 Ty3-gypsy families that was located between the ORF encoding the retrotransposase and the 3’LTR. The ORF2 was in opposite transcriptional orientation to retrotransposase. Sequence homology searches and phylogenetic analysis suggested that the ORF2 may have an ancient origin, but its function is not clear. This transposon data provides a useful resource for understanding the genome organization and evolution and may be used to identify active TEs for developing transposon-tagging system in common bean and other related genomes.

  14. Malazy, a degenerate, species-specific transposable element in Cercospora zeae-maydis.

    Science.gov (United States)

    Shim, Won-Bo; Dunkle, Larry D

    2005-01-01

    Two fungal pathogens, Cercospora zeae-maydis Groups I and II, cause gray leaf spot of maize. During the sequencing of a cosmid library from C. zeae-maydis Group I, we discovered a sequence with high similarity to Maggy, a transposable element from Magnaporthe grisea. The element from C. zeae-maydis, named Malazy, contained 194-base-pair terminal repeats and sequences with high similarity to reverse transcriptase and integrase, components of the POL gene in the gypsy-like retrotransposons in fungi. Sequences with similarity to other POL gene components, protease and ribonuclease, were not detected in Malazy. A single copy of the element was detected by PCR and Southern analyses in all six North American isolates of C. zeae-maydis Group I but was not detected in the four isolates of C. zeae-maydis Group II from three continents or in phylogenetically related species. Fragments of the core domains of reverse transcriptase and integrase contained a high frequency of stop codons that were conserved in all six isolates of Group I. Additional C:G to T:A transitions in occasional isolates usually were silent mutations, while two resulted in isolate-specific stop codons. The absence of Malazy from related species suggests that it was acquired after the divergence of C. zeae-maydis Groups I and II. The high frequency of stop codons and the presence of a single copy of the element suggest that it was inactivated soon after it was acquired. Because the element is inactive and because reading frames for other genes were not found in sequences flanking the element, Malazy does not appear to be the cause of differences leading to speciation or genetic diversity between C. zeae-maydis Groups I and II.

  15. Modeling Interactions between Transposable Elements and the Plant Epigenetic Response: A Surprising Reliance on Element Retention.

    Science.gov (United States)

    Roessler, Kyria; Bousios, Alexandros; Meca, Esteban; Gaut, Brandon S

    2018-03-01

    Transposable elements (TEs) compose the majority of angiosperm DNA. Plants counteract TE activity by silencing them epigenetically. One form of epigenetic silencing requires 21-22 nt small interfering RNAs that act to degrade TE mRNA and may also trigger DNA methylation. DNA methylation is reinforced by a second mechanism, the RNA-dependent DNA methylation (RdDM) pathway. RdDM relies on 24 nt small interfering RNAs and ultimately establishes TEs in a quiescent state. These host factors interact at a systems level, but there have been no system level analyses of their interactions. Here, we define a deterministic model that represents the propagation of active TEs, aspects of the host response and the accumulation of silenced TEs. We describe general properties of the model and also fit it to biological data in order to explore two questions. The first is why two overlapping pathways are maintained, given that both are likely energetically expensive. Under our model, RdDM silenced TEs effectively even when the initiation of silencing was weak. This relationship implies that only a small amount of RNAi is needed to initiate TE silencing, but reinforcement by RdDM is necessary to efficiently counter TE propagation. Second, we investigated the reliance of the host response on rates of TE deletion. The model predicted that low levels of deletion lead to few active TEs, suggesting that silencing is most efficient when methylated TEs are retained in the genome, thereby providing one explanation for the large size of plant genomes.

  16. Transcriptional activity, chromosomal distribution and expression effects of transposable elements in Coffea genomes.

    Directory of Open Access Journals (Sweden)

    Fabrício R Lopes

    Full Text Available Plant genomes are massively invaded by transposable elements (TEs, many of which are located near host genes and can thus impact gene expression. In flowering plants, TE expression can be activated (de-repressed under certain stressful conditions, both biotic and abiotic, as well as by genome stress caused by hybridization. In this study, we examined the effects of these stress agents on TE expression in two diploid species of coffee, Coffea canephora and C. eugenioides, and their allotetraploid hybrid C. arabica. We also explored the relationship of TE repression mechanisms to host gene regulation via the effects of exonized TE sequences. Similar to what has been seen for other plants, overall TE expression levels are low in Coffea plant cultivars, consistent with the existence of effective TE repression mechanisms. TE expression patterns are highly dynamic across the species and conditions assayed here are unrelated to their classification at the level of TE class or family. In contrast to previous results, cell culture conditions per se do not lead to the de-repression of TE expression in C. arabica. Results obtained here indicate that differing plant drought stress levels relate strongly to TE repression mechanisms. TEs tend to be expressed at significantly higher levels in non-irrigated samples for the drought tolerant cultivars but in drought sensitive cultivars the opposite pattern was shown with irrigated samples showing significantly higher TE expression. Thus, TE genome repression mechanisms may be finely tuned to the ideal growth and/or regulatory conditions of the specific plant cultivars in which they are active. Analysis of TE expression levels in cell culture conditions underscored the importance of nonsense-mediated mRNA decay (NMD pathways in the repression of Coffea TEs. These same NMD mechanisms can also regulate plant host gene expression via the repression of genes that bear exonized TE sequences.

  17. Transcriptional activity, chromosomal distribution and expression effects of transposable elements in Coffea genomes.

    Science.gov (United States)

    Lopes, Fabrício R; Jjingo, Daudi; da Silva, Carlos R M; Andrade, Alan C; Marraccini, Pierre; Teixeira, João B; Carazzolle, Marcelo F; Pereira, Gonçalo A G; Pereira, Luiz Filipe P; Vanzela, André L L; Wang, Lu; Jordan, I King; Carareto, Claudia M A

    2013-01-01

    Plant genomes are massively invaded by transposable elements (TEs), many of which are located near host genes and can thus impact gene expression. In flowering plants, TE expression can be activated (de-repressed) under certain stressful conditions, both biotic and abiotic, as well as by genome stress caused by hybridization. In this study, we examined the effects of these stress agents on TE expression in two diploid species of coffee, Coffea canephora and C. eugenioides, and their allotetraploid hybrid C. arabica. We also explored the relationship of TE repression mechanisms to host gene regulation via the effects of exonized TE sequences. Similar to what has been seen for other plants, overall TE expression levels are low in Coffea plant cultivars, consistent with the existence of effective TE repression mechanisms. TE expression patterns are highly dynamic across the species and conditions assayed here are unrelated to their classification at the level of TE class or family. In contrast to previous results, cell culture conditions per se do not lead to the de-repression of TE expression in C. arabica. Results obtained here indicate that differing plant drought stress levels relate strongly to TE repression mechanisms. TEs tend to be expressed at significantly higher levels in non-irrigated samples for the drought tolerant cultivars but in drought sensitive cultivars the opposite pattern was shown with irrigated samples showing significantly higher TE expression. Thus, TE genome repression mechanisms may be finely tuned to the ideal growth and/or regulatory conditions of the specific plant cultivars in which they are active. Analysis of TE expression levels in cell culture conditions underscored the importance of nonsense-mediated mRNA decay (NMD) pathways in the repression of Coffea TEs. These same NMD mechanisms can also regulate plant host gene expression via the repression of genes that bear exonized TE sequences.

  18. Families of transposable elements, population structure and the origin of species.

    Science.gov (United States)

    Jurka, Jerzy; Bao, Weidong; Kojima, Kenji K

    2011-09-19

    Eukaryotic genomes harbor diverse families of repetitive DNA derived from transposable elements (TEs) that are able to replicate and insert into genomic DNA. The biological role of TEs remains unclear, although they have profound mutagenic impact on eukaryotic genomes and the origin of repetitive families often correlates with speciation events. We present a new hypothesis to explain the observed correlations based on classical concepts of population genetics. The main thesis presented in this paper is that the TE-derived repetitive families originate primarily by genetic drift in small populations derived mostly by subdivisions of large populations into subpopulations. We outline the potential impact of the emerging repetitive families on genetic diversification of different subpopulations, and discuss implications of such diversification for the origin of new species. Several testable predictions of the hypothesis are examined. First, we focus on the prediction that the number of diverse families of TEs fixed in a representative genome of a particular species positively correlates with the cumulative number of subpopulations (demes) in the historical metapopulation from which the species has emerged. Furthermore, we present evidence indicating that human AluYa5 and AluYb8 families might have originated in separate proto-human subpopulations. We also revisit prior evidence linking the origin of repetitive families to mammalian phylogeny and present additional evidence linking repetitive families to speciation based on mammalian taxonomy. Finally, we discuss evidence that mammalian orders represented by the largest numbers of species may be subject to relatively recent population subdivisions and speciation events. The hypothesis implies that subdivision of a population into small subpopulations is the major step in the origin of new families of TEs as well as of new species. The origin of new subpopulations is likely to be driven by the availability of new

  19. Evolutionary genomics of miniature inverted-repeat transposable elements (MITEs) in Brassica.

    Science.gov (United States)

    Nouroz, Faisal; Noreen, Shumaila; Heslop-Harrison, J S

    2015-12-01

    Miniature inverted-repeat transposable elements (MITEs) are truncated derivatives of autonomous DNA transposons, and are dispersed abundantly in most eukaryotic genomes. We aimed to characterize various MITEs families in Brassica in terms of their presence, sequence characteristics and evolutionary activity. Dot plot analyses involving comparison of homoeologous bacterial artificial chromosome (BAC) sequences allowed identification of 15 novel families of mobile MITEs. Of which, 5 were Stowaway-like with TA Target Site Duplications (TSDs), 4 Tourist-like with TAA/TTA TSDs, 5 Mutator-like with 9-10 bp TSDs and 1 novel MITE (BoXMITE1) flanked by 3 bp TSDs. Our data suggested that there are about 30,000 MITE-related sequences in Brassica rapa and B. oleracea genomes. In situ hybridization showed one abundant family was dispersed in the A-genome, while another was located near 45S rDNA sites. PCR analysis using primers flanking sequences of MITE elements detected MITE insertion polymorphisms between and within the three Brassica (AA, BB, CC) genomes, with many insertions being specific to single genomes and others showing evidence of more recent evolutionary insertions. Our BAC sequence comparison strategy enables identification of evolutionarily active MITEs with no prior knowledge of MITE sequences. The details of MITE families reported in Brassica enable their identification, characterization and annotation. Insertion polymorphisms of MITEs and their transposition activity indicated important mechanism of genome evolution and diversification. MITE families derived from known Mariner, Harbinger and Mutator DNA transposons were discovered, as well as some novel structures. The identification of Brassica MITEs will have broad applications in Brassica genomics, breeding, hybridization and phylogeny through their use as DNA markers.

  20. Transcriptional rewiring of the sex determining dmrt1 gene duplicate by transposable elements.

    Directory of Open Access Journals (Sweden)

    Amaury Herpin

    2010-02-01

    Full Text Available Control and coordination of eukaryotic gene expression rely on transcriptional and posttranscriptional regulatory networks. Evolutionary innovations and adaptations often require rapid changes of such networks. It has long been hypothesized that transposable elements (TE might contribute to the rewiring of regulatory interactions. More recently it emerged that TEs might bring in ready-to-use transcription factor binding sites to create alterations to the promoters by which they were captured. A process where the gene regulatory architecture is of remarkable plasticity is sex determination. While the more downstream components of the sex determination cascades are evolutionary conserved, the master regulators can switch between groups of organisms even on the interspecies level or between populations. In the medaka fish (Oryzias latipes a duplicated copy of dmrt1, designated dmrt1bY or DMY, on the Y chromosome was shown to be the master regulator of male development, similar to Sry in mammals. We found that the dmrt1bY gene has acquired a new feedback downregulation of its expression. Additionally, the autosomal dmrt1a gene is also able to regulate transcription of its duplicated paralog by binding to a unique target Dmrt1 site nested within the dmrt1bY proximal promoter region. We could trace back this novel regulatory element to a highly conserved sequence within a new type of TE that inserted into the upstream region of dmrt1bY shortly after the duplication event. Our data provide functional evidence for a role of TEs in transcriptional network rewiring for sub- and/or neo-functionalization of duplicated genes. In the particular case of dmrt1bY, this contributed to create new hierarchies of sex-determining genes.

  1. Transposable elements, a treasure trove to decipher epigenetic variation: insights from Arabidopsis and crop epigenomes.

    Science.gov (United States)

    Mirouze, Marie; Vitte, Clémentine

    2014-06-01

    In the past decade, plant biologists and breeders have developed a growing interest in the field of epigenetics, which is defined as the study of heritable changes in gene expression that cannot be explained by changes in the DNA sequence. Epigenetic marks can be responsive to the environment, and evolve faster than genetic changes. Therefore, epigenetic diversity may represent an unexplored resource of natural variation that could be used in plant breeding programmes. On the other hand, crop genomes are largely populated with transposable elements (TEs) that are efficiently targeted by epigenetic marks, and part of the epigenetic diversity observed might be explained by TE polymorphisms. Characterizing the degree to which TEs influence epigenetic variation in crops is therefore a major goal to better use epigenetic variation. To date, epigenetic analyses have been mainly focused on the model plant Arabidopsis thaliana, and have provided clues on epigenome features, components that silence pathways, and effects of silencing impairment. But to what extent can Arabidopsis be used as a model for the epigenomics of crops? In this review, we discuss the similarities and differences between the epigenomes of Arabidopsis and crops. We explore the relationship between TEs and epigenomes, focusing on TE silencing control and escape, and the impact of TE mobility on epigenomic variation. Finally, we provide insights into challenges to tackle, and future directions to take in the route towards using epigenetic diversity in plant breeding programmes. © The Author 2014. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  2. Transposable elements as stress adaptive capacitors induce genomic instability in fungal pathogen Magnaporthe oryzae.

    Directory of Open Access Journals (Sweden)

    Sonia Chadha

    Full Text Available A fundamental problem in fungal pathogenesis is to elucidate the evolutionary forces responsible for genomic rearrangements leading to races with fitter genotypes. Understanding the adaptive evolutionary mechanisms requires identification of genomic components and environmental factors reshaping the genome of fungal pathogens to adapt. Herein, Magnaporthe oryzae, a model fungal plant pathogen is used to demonstrate the impact of environmental cues on transposable elements (TE based genome dynamics. For heat shock and copper stress exposed samples, eight TEs belonging to class I and II family were employed to obtain DNA profiles. Stress induced mutant bands showed a positive correlation with dose/duration of stress and provided evidences of TEs role in stress adaptiveness. Further, we demonstrate that genome dynamics differ for the type/family of TEs upon stress exposition and previous reports of stress induced MAGGY transposition has underestimated the role of TEs in M. oryzae. Here, we identified Pyret, MAGGY, Pot3, MINE, Mg-SINE, Grasshopper and MGLR3 as contributors of high genomic instability in M. oryzae in respective order. Sequencing of mutated bands led to the identification of LTR-retrotransposon sequences within regulatory regions of psuedogenes. DNA transposon Pot3 was identified in the coding regions of chromatin remodelling protein containing tyrosinase copper-binding and PWWP domains. LTR-retrotransposons Pyret and MAGGY are identified as key components responsible for the high genomic instability and perhaps these TEs are utilized by M. oryzae for its acclimatization to adverse environmental conditions. Our results demonstrate how common field stresses change genome dynamics of pathogen and provide perspective to explore the role of TEs in genome adaptability, signalling network and its impact on the virulence of fungal pathogens.

  3. International Congress on Transposable Elements (ICTE 2012 in Saint Malo and the sea of TE stories

    Directory of Open Access Journals (Sweden)

    Ainouche Abdelkader

    2012-10-01

    Full Text Available Abstract An international conference on Transposable Elements (TEs was held 21–24 April 2012 in Saint Malo, France. Organized by the French Transposition Community (GDR Elements Génétiques Mobiles et Génomes, CNRS and the French Society of Genetics (SFG, the conference’s goal was to bring together researchers from around the world who study transposition in diverse organisms using multiple experimental approaches. The meeting drew more than 217 attendees and most contributed through poster presentations (117, invited talks and short talks selected from poster abstracts (48 in total. The talks were organized into four scientific sessions, focused on: impact of TEs on genomes, control of transposition, evolution of TEs and mechanisms of transposition. Here, we present highlights from the talks given during the platform sessions. The conference was sponsored by Alliance pour les sciences de la vie et de la santé (Aviesan, Centre national de la recherche scientifique (CNRS, Institut national de la santé et de la recherche médicale (INSERM, Institut de recherche pour le développement (IRD, Institut national de la recherche agronomique (INRA, Université de Perpignan, Université de Rennes 1, Région Bretagne and Mobile DNA. Chair of the organization committee Jean-Marc Deragon Organizers Abdelkader Ainouche, Mireille Bétermier, Mick Chandler, Richard Cordaux, Gaël Cristofari, Jean-Marc Deragon, Pascale Lesage, Didier Mazel, Olivier Panaud, Hadi Quesneville, Chantal Vaury, Cristina Vieira and Clémentine Vitte

  4. What transposable elements tell us about genome organization and evolution: the case of Drosophila.

    Science.gov (United States)

    Biémont, C; Vieira, C

    2005-01-01

    Transposable elements (TEs) have been identified in every organism in which they have been looked for. The sequencing of large genomes, such as the human genome and those of Drosophila, Arabidopsis, Caenorhabditis, has also shown that they are a major constituent of these genomes, accounting for 15% of the genome of Drosophila, 45% of the human genome, and more than 70% in some plants and amphibians. Compared with the 1% of genomic DNA dedicated to protein-coding sequences in the human genome, this has prompted various researchers to suggest that the TEs and the other repetitive sequences that constitute the so-called "noncoding DNA", are where the most stimulating discoveries will be made in the future (Bromham, 2002). We are therefore getting further and further from the original idea that this DNA was simply "junk DNA", that owed its presence in the genome entirely to its capacity for selfish transposition. Our understanding of the structures of TEs, their distribution along the genomes, their sequence and insertion polymorphisms within genomes, and within and between populations and species, their impact on genes and on the regulatory mechanisms of genetic expression, their effects on exon shuffling and other phenomena that reshape the genome, and their impact on genome size has increased dramatically in recent years. This leads to a more general picture of the impact of TEs on genomes, though many copies are still mainly selfish or junk DNA. In this review we focus mainly on discoveries made in Drosophila, but we also use information about other genomes when this helps to elucidate the general processes involved in the organization, plasticity, and evolution of genomes.

  5. Abundance and distribution of transposable elements in two Drosophila QTL mapping resources.

    Science.gov (United States)

    Cridland, Julie M; Macdonald, Stuart J; Long, Anthony D; Thornton, Kevin R

    2013-10-01

    Here we present computational machinery to efficiently and accurately identify transposable element (TE) insertions in 146 next-generation sequenced inbred strains of Drosophila melanogaster. The panel of lines we use in our study is composed of strains from a pair of genetic mapping resources: the Drosophila Genetic Reference Panel (DGRP) and the Drosophila Synthetic Population Resource (DSPR). We identified 23,087 TE insertions in these lines, of which 83.3% are found in only one line. There are marked differences in the distribution of elements over the genome, with TEs found at higher densities on the X chromosome, and in regions of low recombination. We also identified many more TEs per base pair of intronic sequence and fewer TEs per base pair of exonic sequence than expected if TEs are located at random locations in the euchromatic genome. There was substantial variation in TE load across genes. For example, the paralogs derailed and derailed-2 show a significant difference in the number of TE insertions, potentially reflecting differences in the selection acting on these loci. When considering TE families, we find a very weak effect of gene family size on TE insertions per gene, indicating that as gene family size increases the number of TE insertions in a given gene within that family also increases. TEs are known to be associated with certain phenotypes, and our data will allow investigators using the DGRP and DSPR to assess the functional role of TE insertions in complex trait variation more generally. Notably, because most TEs are very rare and often private to a single line, causative TEs resulting in phenotypic differences among individuals may typically fail to replicate across mapping panels since individual elements are unlikely to segregate in both panels. Our data suggest that "burden tests" that test for the effect of TEs as a class may be more fruitful.

  6. Transposable Element-Mediated Balancing Selection at Hsp90 Underlies Embryo Developmental Variation.

    Science.gov (United States)

    Chen, Bing; Zhang, Bo; Xu, Lingling; Li, Qing; Jiang, Feng; Yang, Pengcheng; Xu, Yanan; Kang, Le

    2017-05-01

    Understanding the roles of transposable elements (TEs) in the evolution of genome and adaptation is a long-sought goal. Here, we present a new model of TE co-option, in which a TE is harnessed by an essential gene and confers local adaptation through heterozygote advantage. We characterized a human Alu-like TE family, the Lm1 elements, in the genome of the migratory locust Locusta migratoria that harbors 0.7 million copies of the elements. Scanning Lm1 insertions in the natural locust populations revealed the widespread high polymorphism of Lm1. An Lm1 was recruited into the coding region of Heat-shock protein 90 (Hsp90), an important molecular chaperone for diverse signal transduction and developmental pathways. Only heterozygotes of the allele are present in natural populations. Allele frequency increases with decreased latitudes in east coastal China, even increasing up to 76% in southern populations. Regions flanking the Lm1 insertion display clear signatures of a selective sweep linked to Lm1. The Lm1-mediated Hsp90 mutation is consequential for the embryonic development of locust. Heterozygous embryos develop faster than the wild type, particularly when cued by long-day parental photoperiod. The heterozygotes also present a reduced within-population variation in embryonic development, i.e., high developmental synchrony of embryos. The naturally occurring Hsp90 mutation could facilitate multivoltinism and developmental synchronization of the locust in southern tropical region. These results revealed a genetic mechanism behind microevolutionary changes in which balancing selection may have acted to maintain the heterozygote advantage through TE co-option in essential genes. © The Author 2017. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. Scanning of transposable elements and analyzing expression of transposase genes of sweet potato [Ipomoea batatas].

    Science.gov (United States)

    Yan, Lang; Gu, Ying-Hong; Tao, Xiang; Lai, Xian-Jun; Zhang, Yi-Zheng; Tan, Xue-Mei; Wang, Haiyan

    2014-01-01

    Transposable elements (TEs) are the most abundant genomic components in eukaryotes and affect the genome by their replications and movements to generate genetic plasticity. Sweet potato performs asexual reproduction generally and the TEs may be an important genetic factor for genome reorganization. Complete identification of TEs is essential for the study of genome evolution. However, the TEs of sweet potato are still poorly understood because of its complex hexaploid genome and difficulty in genome sequencing. The recent availability of the sweet potato transcriptome databases provides an opportunity for discovering and characterizing the expressed TEs. We first established the integrated-transcriptome database by de novo assembling four published sweet potato transcriptome databases from three cultivars in China. Using sequence-similarity search and analysis, a total of 1,405 TEs including 883 retrotransposons and 522 DNA transposons were predicted and categorized. Depending on mapping sets of RNA-Seq raw short reads to the predicted TEs, we compared the quantities, classifications and expression activities of TEs inter- and intra-cultivars. Moreover, the differential expressions of TEs in seven tissues of Xushu 18 cultivar were analyzed by using Illumina digital gene expression (DGE) tag profiling. It was found that 417 TEs were expressed in one or more tissues and 107 in all seven tissues. Furthermore, the copy number of 11 transposase genes was determined to be 1-3 copies in the genome of sweet potato by Real-time PCR-based absolute quantification. Our result provides a new method for TE searching on species with transcriptome sequences while lacking genome information. The searching, identification and expression analysis of TEs will provide useful TE information in sweet potato, which are valuable for the further studies of TE-mediated gene mutation and optimization in asexual reproduction. It contributes to elucidating the roles of TEs in genome evolution.

  8. Regional dissemination of a trimethoprim-resistance gene cassette via a successful transposable element.

    Directory of Open Access Journals (Sweden)

    Amy S Labar

    Full Text Available Antimicrobial resistance is a growing international problem. We observed a 50% increase in the prevalence of trimethoprim resistance among fecal Escherichia coli from healthy Nigerian students between 1998 and 2005, a trend to increase that continued in 2009.A PCR-based screen revealed that 131 (43.1% of isolates obtained in Nigeria in 2005 and 2009 carried integron-borne dfrA cassettes. In the case of 67 (51.1% of these isolates, the cassette was a class 1-integron-borne dfrA7 gene, which has been reported at high prevalence from E. coli isolates from other parts of Africa. Complete sequencing of a 27 Kb dfrA7-bearing plasmid from one isolate located the dfrA7 gene within a Tn21-type transposon. The transposon also contained an IS26-derived bla/sul/str element, encoding resistance to β-lactams, sulphonamides and streptomycin, and mercury resistance genes. Although the plasmid backbone was only found in 12 (5.8% of trimethoprim-resistant isolates, dfrA7 and other transposon-borne genes were detected in 14 (16.3% and 32 (26.3% of trimethoprim resistant isolates collected in Nigeria in 2005 and 2009, respectively. Additionally, 37 (19.3% of trimethoprim-resistant E. coli isolates collected between 2006 and 2008 from Ghana were positive for the dfrA7 and a transposon marker, but only 4 (2.1% harbored the plasmid backbone.Our data point to transposition as a principal mechanism for disseminating dfrA7 among E. coli from Nigeria and Ghana. On-going intensive use of the affordable broad-spectrum antibacterials is likely to promote selective success of a highly prevalent transposable element in West Africa.

  9. Scaling vectors of attoJoule per bit modulators

    Science.gov (United States)

    Sorger, Volker J.; Amin, Rubab; Khurgin, Jacob B.; Ma, Zhizhen; Dalir, Hamed; Khan, Sikandar

    2018-01-01

    Electro-optic modulation performs the conversion between the electrical and optical domain with applications in data communication for optical interconnects, but also for novel optical computing algorithms such as providing nonlinearity at the output stage of optical perceptrons in neuromorphic analog optical computing. While resembling an optical transistor, the weak light-matter-interaction makes modulators 105 times larger compared to their electronic counterparts. Since the clock frequency for photonics on-chip has a power-overhead sweet-spot around tens of GHz, ultrafast modulation may only be required in long-distance communication, not for short on-chip links. Hence, the search is open for power-efficient on-chip modulators beyond the solutions offered by foundries to date. Here, we show scaling vectors towards atto-Joule per bit efficient modulators on-chip as well as some experimental demonstrations of novel plasmonic modulators with sub-fJ/bit efficiencies. Our parametric study of placing different actively modulated materials into plasmonic versus photonic optical modes shows that 2D materials overcompensate their miniscule modal overlap by their unity-high index change. Furthermore, we reveal that the metal used in plasmonic-based modulators not only serves as an electrical contact, but also enables low electrical series resistances leading to near-ideal capacitors. We then discuss the first experimental demonstration of a photon-plasmon-hybrid graphene-based electro-absorption modulator on silicon. The device shows a sub-1 V steep switching enabled by near-ideal electrostatics delivering a high 0.05 dB V-1 μm-1 performance requiring only 110 aJ/bit. Improving on this demonstration, we discuss a plasmonic slot-based graphene modulator design, where the polarization of the plasmonic mode aligns with graphene’s in-plane dimension; where a push-pull dual-gating scheme enables 2 dB V-1 μm-1 efficient modulation allowing the device to be just 770 nm

  10. Influence of Bit Depth on Subjective Video Quality Assessment for High Resolutions

    Directory of Open Access Journals (Sweden)

    Juraj Bienik

    2017-01-01

    Full Text Available This paper deals with the influence of bit depth on the subjective video quality assessment. To achieve this goal, eight video sequences, each representing a different content prototype, were analysed. Subjective evaluation was performed using the ACR method. The analysed video sequences were encoded to 8 and 10-bit bit depth. Two most used compression standards H.264 and H.265 were evaluated with 1, 3, 5, 10 and 15 Mbps bitrate in Full HD and UHD resolution. Finally, the perceived quality of both compression standards using the subjective tests with emphasis on bit-depth was compared. From the results we can state, that the practical application of 10-bit bit depth is not appropriate for Full HD resolution in the range of bitrate from 1 to 15 Mbps, for Ultra HD resolution, it is appropriate only for videos encoded by H.265/HEVC compression standard.

  11. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  12. Patent search and review on roller-bit bearings seals and lubrication systems. [State-of-the-art

    Energy Technology Data Exchange (ETDEWEB)

    Maurer, W.C.

    1975-10-14

    Over 300 patents on bit design were reviewed, and the more important ones were abstracted. These patents were divided into three groups dealing with roller bit bearings, seals, and lubrication systems. Review of these patents helps identify the problems encountered by previous bit designers and establishes the current state-of-the-art of roller bit design. This report can be used as a reference for designing improved bits both for the petroleum and the geothermal industries.

  13. Development and Testing of a Jet Assisted Polycrystalline Diamond Drilling Bit. Phase II Development Efforts

    Energy Technology Data Exchange (ETDEWEB)

    David S. Pixton

    1999-09-20

    Phase II efforts to develop a jet-assisted rotary-percussion drill bit are discussed. Key developments under this contract include: (1) a design for a more robust polycrystalline diamond drag cutter; (2) a new drilling mechanism which improves penetration and life of cutters; and (3) a means of creating a high-pressure mud jet inside of a percussion drill bit. Field tests of the new drill bit and the new robust cutter are forthcoming.

  14. Optimal finite-time erasure of a classical bit

    Science.gov (United States)

    Zulkowski, Patrick R.; DeWeese, Michael R.

    2014-05-01

    Information erasure inevitably leads to the generation of heat. Minimizing this dissipation will be crucial for developing small-scale information processing systems, but little is known about the optimal procedures required. We have obtained closed-form expressions for maximally efficient erasure cycles for deletion of a classical bit of information stored by the position of a particle diffusing in a double-well potential. We find that the extra heat generated beyond the Landauer bound is proportional to the square of the Hellinger distance between the initial and final states divided by the cycle duration, which quantifies how far out of equilibrium the system is driven. Finally, we demonstrate close agreement between the exact optimal cycle and the protocol found using a linear response framework.

  15. Bitlis Etnografya Müzesi'nde Bulunan Geleneksel Giysiler

    OpenAIRE

    Sökmen, Sultan

    2016-01-01

    Bu çalışmada, Bitlis Etnografya Müzesi'nde sergilenmekte olan geleneksel giysilerin kumaş, renk, süsleme ve teknik özelliklerinin tanıtımı amaçlanmıştır. Bu amaç doğrultusunda ilgili makamlardan yazılı izin alınarak müze vitrinlerinde sergilenmekte olan ve depolarda koruma altına alınan giysilerin fotoğrafları çekilmiş, gerekli ölçümleri yapılarak teknik özellikleri belirlenmiş, hammadde ve süsleme özellikleri incelenmiştir. Müzede bulunan geleneksel giysi örnekleri yeterince zengin olma...

  16. Numerical optimization of writer geometries for bit patterned magnetic recording

    Science.gov (United States)

    Kovacs, A.; Oezelt, H.; Bance, S.; Fischbacher, J.; Gusenbauer, M.; Reichel, F.; Exl, L.; Schrefl, T.; Schabes, M. E.

    2014-05-01

    A fully-automated pole-tip shape optimization tool, involving write head geometry construction, meshing, micromagnetic simulation, and evaluation, is presented. Optimizations have been performed for three different writing schemes (centered, staggered, and shingled) for an underlying bit patterned media with an areal density of 2.12 Tdots/in.2. Optimizations were performed for a single-phase media with 10 nm thickness and a mag spacing of 8 nm. From the computed write field and its gradient and the minimum energy barrier during writing for islands on the adjacent track, the overall write error rate is computed. The overall write errors are 0.7, 0.08, and 2.8×10-5 for centered writing, staggered writing, and shingled writing.

  17. Bit-Serial Adder Based on Quantum Dots

    Science.gov (United States)

    Fijany, Amir; Toomarian, Nikzad; Modarress, Katayoon; Spotnitz, Mathew

    2003-01-01

    A proposed integrated circuit based on quantum-dot cellular automata (QCA) would function as a bit-serial adder. This circuit would serve as a prototype building block for demonstrating the feasibility of quantum-dots computing and for the further development of increasingly complex and increasingly capable quantum-dots computing circuits. QCA-based bit-serial adders would be especially useful in that they would enable the development of highly parallel and systolic processors for implementing fast Fourier, cosine, Hartley, and wavelet transforms. The proposed circuit would complement the QCA-based circuits described in "Implementing Permutation Matrices by Use of Quantum Dots" (NPO-20801), NASA Tech Briefs, Vol. 25, No. 10 (October 2001), page 42 and "Compact Interconnection Networks Based on Quantum Dots" (NPO-20855), which appears elsewhere in this issue. Those articles described the limitations of very-large-scale-integrated (VLSI) circuitry and the major potential advantage afforded by QCA. To recapitulate: In a VLSI circuit, signal paths that are required not to interact with each other must not cross in the same plane. In contrast, for reasons too complex to describe in the limited space available for this article, suitably designed and operated QCA-based signal paths that are required not to interact with each other can nevertheless be allowed to cross each other in the same plane without adverse effect. In principle, this characteristic could be exploited to design compact, coplanar, simple (relative to VLSI) QCA-based networks to implement complex, advanced interconnection schemes. To enable a meaningful description of the proposed bit-serial adder, it is necessary to further recapitulate the description of a quantum-dot cellular automation from the first-mentioned prior article: A quantum-dot cellular automaton contains four quantum dots positioned at the corners of a square cell. The cell contains two extra mobile electrons that can tunnel (in the

  18. A Fast Dynamic 64-bit Comparator with Small Transistor Count

    Directory of Open Access Journals (Sweden)

    Chua-Chin Wang

    2002-01-01

    Full Text Available In this paper, we propose a 64-bit fast dynamic CMOS comparator with small transistor count. Major features of the proposed comparator are the rearrangement and re-ordering of transistors in the evaluation block of a dynamic cell, and the insertion of a weak n feedback inverter, which helps the pull-down operation to ground. The simulation results given by pre-layout tools, e.g. HSPICE, and post-layout tools, e.g. TimeMill, reveal that the delay is around 2.5 ns while the operating clock rate reaches 100 MHz. A physical chip is fabricated to verify the correctness of our design by using UMC (United Microelectronics Company 0.5 μm (2P2M technology.

  19. Contador asincrónico de cuatro bits

    Directory of Open Access Journals (Sweden)

    Iván Jaramillo J.

    1999-01-01

    Full Text Available Este artículo describe el diseño e implementación del conttulor asincrónico de cuatro bits, realizado a partir de experiencias académicas en la Universidad Nacional de Colombia. Primero se menciona la estructura del contador, al igual que la caracterización de las celdas básicas (con base en las cuales se hizo este proyecto, y se muestran los resultados de la simulación eléctrica. Después, se describen las pruebas efectuadas al chip, y se hace una comparación entre estos datos experimentales y los obtenidos en la simulación.

  20. Measurement accuracy, bit-strings, Manthey's quaternions, and RRQM

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1995-01-01

    The author continues the discussion started last year. By now three potentially divergent research programs have surfaced in ANPA: (1) the Bastin-Kilmister understanding of the combinatorial hierarchy (Clive's open-quotes Menshevikclose quotes position); (2) the author's bit-string open-quotes Theory of Everythingclose quotes (which Clive has dubbed open-quotes Bolshevikclose quotes); (3) Manthey's cycle hierarchy based on co-occurrence and mutual exclusion that Clive helped him map onto quaternions (as an yet unnamed heresy?). Unless a common objective can be found, these three points of view will continue to diverge. The authors suggests the reconstruction of relativistic quantum mechanism (RRQM) as a reasonable, and attainable, goal that might aid convergence rather than divergence

  1. Geneva University - Superconducting flux quantum bits: fabricated quantum objects

    CERN Multimedia

    2007-01-01

    Ecole de physique Département de physique nucléaire et corspusculaire 24, Quai Ernest-Ansermet 1211 GENEVE 4 Tél: (022) 379 62 73 Fax: (022) 379 69 92 Lundi 29 janvier 2007 COLLOQUE DE LA SECTION DE PHYSIQUE 17 heures - Auditoire Stueckelberg Superconducting flux quantum bits: fabricated quantum objects Prof. Hans Mooij / Kavli Institute of Nanoscience, Delft University of Technology The quantum conjugate variables of a superconductor are the charge or number of Cooper pairs, and the phase of the order parameter. In circuits that contain small Josephson junctions, these quantum properties can be brought forward. In Delft we study so-called flux qubits, superconducting rings that contain three small Josephson junctions. When a magnetic flux of half a flux quantum is applied to the loop, there are two states with opposite circulating current. For suitable junction parameters, a quantum superposition of those macroscopic states is possible. Transitions can be driven with resonant microwaves. These quantum ...

  2. ALAT SOLAR TRACKER BERBASIS MIKROKONTROLER 8 BIT ATMega8535

    Directory of Open Access Journals (Sweden)

    I Wayan Sutaya

    2015-07-01

    Full Text Available Penelitian yang telah dilakukan ini adalah membuat prototipe alat solar tracker. Alat ini berfungsi untuk menggerakkan modul sel surya sehingga permukaan sel surya bisa terkena sinar matahari secara maksimal. Saat ini sel surya di Indonesia banyak terpasang secara statis atau tidak dilengkapi alat solar tracker sehingga energi matahari tidak diterima secara maksimal. Hal ini menyebabkan sel surya yang terpasang di beberapa daerah di Indonesia tidak memberikan manfaat yang optimal. Alat solar tracker yang dihasilkan pada penelitian ini diharapkan sebagai solusi dari permasalahan yang ada saat ini. Mikrokontroler 8 bit ATMega8535 yang digunakan sebagai otak utama dari alat solar tracker menjadikan alat ini menjadi berbiaya murah. Serta teknik memprogram dengan bahasa assembly menjadikan alat ini tahan terhadap kegagalan sistem. Solar tracker ini sudah bisa beroperasi dengan baik dan cocok digunakan pada modul sel surya berukuran kecil.

  3. Bit-string physics: A novel theory of everything

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, H.P.

    1994-08-01

    We encode the quantum numbers of the standard model of quarks and leptons using constructed bitstrings of length 256. These label a grouting universe of bit-strings of growing length that eventually construct a finite and discrete space-time with reasonable cosmological properties. Coupling constants and mass ratios, computed from closure under XOR and a statistical hypothesis, using only {h_bar}, c and m{sub p} to fix our units of mass, length and time in terms of standard (meterkilogram-second) metrology, agree with the first four to seven significant figures of accepted experimental results. Finite and discrete conservation laws and commutation relations insure the essential characteristics of relativistic quantum mechanics, including particle-antiparticle pair creation. The correspondence limit in (free space) Maxwell electromagnetism and Einstein gravitation is consistent with the Feynman-Dyson-Tanimura ``proof.``

  4. A low power 12-bit ADC for nuclear instrumentation

    International Nuclear Information System (INIS)

    Adachi, R.; Landis, D.; Madden, N.; Silver, E.; LeGros, M.

    1992-10-01

    A low power, successive approximation, analog-to-digital converter (ADC) for low rate, low cost, battery powered applications is described. The ADC is based on a commercial 50 mW successive approximation CMOS device (CS5102). An on-chip self-calibration circuit reduces the inherent differential nonlinearity to 7%. A further reduction of the differential nonlinearity to 0.5% is attained with a four bit Gatti function. The Gatti function is distributed to minimize battery power consumption. All analog functions reside with the ADC while the noisy digital functions reside in the personal computer based histogramming memory. Fiber optic cables carry afl digital information between the ADC and the personal computer based histogramming memory

  5. A one-bit approach for image registration

    Science.gov (United States)

    Nguyen, An Hung; Pickering, Mark; Lambert, Andrew

    2015-02-01

    Motion estimation or optic flow computation for automatic navigation and obstacle avoidance programs running on Unmanned Aerial Vehicles (UAVs) is a challenging task. These challenges come from the requirements of real-time processing speed and small light-weight image processing hardware with very limited resources (especially memory space) embedded on the UAVs. Solutions towards both simplifying computation and saving hardware resources have recently received much interest. This paper presents an approach for image registration using binary images which addresses these two requirements. This approach uses translational information between two corresponding patches of binary images to estimate global motion. These low bit-resolution images require a very small amount of memory space to store them and allow simple logic operations such as XOR and AND to be used instead of more complex computations such as subtractions and multiplications.

  6. Proposed first-generation WSQ bit allocation procedure

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J.N.; Brislawn, C.M.

    1993-09-08

    The Wavelet/Scalar Quantization (WSQ) gray-scale fingerprint image compression algorithm involves a symmetric wavelet transform (SWT) image decomposition followed by uniform scalar quantization of each subband. The algorithm is adaptive insofar as the bin widths for the scalar quantizers are image-specific and are included in the compressed image format. Since the decoder requires only the actual bin width values -- but not the method by which they were computed -- the standard allows for future refinements of the WSQ algorithm by improving the method used to select the scalar quantizer bin widths. This report proposes a bit allocation procedure for use with the first-generation WSQ encoder. In previous work a specific formula is provided for the relative sizes of the scalar quantizer bin widths in terms of the variances of the SWT subbands. An explicit specification for the constant of proportionality, q, that determines the absolute bin widths was not given. The actual compression ratio produced by the WSQ algorithm will generally vary from image to image depending on the amount of coding gain obtained by the run-length and Huffman coding, stages of the algorithm, but testing performed by the FBI established that WSQ compression produces archival quality images at compression ratios of around 20 to 1. The bit allocation procedure described in this report possesses a control parameter, r, that can be set by the user to achieve a predetermined amount of lossy compression, effectively giving the user control over the amount of distortion introduced by quantization noise. The variability observed in final compression ratios is thus due only to differences in lossless coding gain from image to image, chiefly a result of the varying amounts of blank background surrounding the print area in the images. Experimental results are presented that demonstrate the proposed method`s effectiveness.

  7. Bit-depth scalable video coding with new inter-layer prediction

    Directory of Open Access Journals (Sweden)

    Chiang Jui-Chiu

    2011-01-01

    Full Text Available Abstract The rapid advances in the capture and display of high-dynamic range (HDR image/video content make it imperative to develop efficient compression techniques to deal with the huge amounts of HDR data. Since HDR device is not yet popular for the moment, the compatibility problems should be considered when rendering HDR content on conventional display devices. To this end, in this study, we propose three H.264/AVC-based bit-depth scalable video-coding schemes, called the LH scheme (low bit-depth to high bit-depth, the HL scheme (high bit-depth to low bit-depth, and the combined LH-HL scheme, respectively. The schemes efficiently exploit the high correlation between the high and the low bit-depth layers on the macroblock (MB level. Experimental results demonstrate that the HL scheme outperforms the other two schemes in some scenarios. Moreover, it achieves up to 7 dB improvement over the simulcast approach when the high and low bit-depth representations are 12 bits and 8 bits, respectively.

  8. The Digital Agenda of Virtual Currencies. Can BitCoin Become a Global Currency?

    OpenAIRE

    KANCS D'ARTIS; CIAIAN PAVEL; MIROSLAVA RAJCANIOVA

    2015-01-01

    This paper identifies and analyzes BitCoin features which may facilitate Bitcoin to become a global currency, as well as characteristics which may impede the use of BitCoin as a medium of exchange, a unit of account and a store of value, and compares BitCoin with standard currencies with respect to the main functions of money. Among all analyzed BitCoin features, the extreme price volatility stands out most clearly compared to standard currencies. In order to understand the reasons for such e...

  9. Field drilling tests on improved geothermal unsealed roller-cone bits. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Hendrickson, R.R.; Jones, A.H.; Winzenried, R.W.; Maish, A.B.

    1980-05-01

    The development and field testing of a 222 mm (8-3/4 inch) unsealed, insert type, medium hard formation, high-temperature bit are described. Increased performance was gained by substituting improved materials in critical bit components. These materials were selected on bases of their high temperature properties, machinability and heat treatment response. Program objectives required that both machining and heat treating could be accomplished with existing rock bit production equipment. Six of the experimental bits were subjected to air drilling at 240/sup 0/C (460/sup 0/F) in Franciscan graywacke at the Geysers (California). Performances compared directly to conventional bits indicate that in-gage drilling time was increased by 70%. All bits at the Geysers are subjected to reaming out-of-gage hole prior to drilling. Under these conditions the experimental bits showed a 30% increase in usable hole drilled, compared with the conventional bits. The materials selected improved roller wear by 200%, friction per wear by 150%, and lug wear by 150%. These tests indicate a potential well cost savings of 4 to 8%. Savings of 12% are considered possible with drilling procedures optimized for the experimental bits.

  10. Designing embedded systems with 32-bit PIC microcontrollers and MikroC

    CERN Document Server

    Ibrahim, Dogan

    2013-01-01

    The new generation of 32-bit PIC microcontrollers can be used to solve the increasingly complex embedded system design challenges faced by engineers today. This book teaches the basics of 32-bit C programming, including an introduction to the PIC 32-bit C compiler. It includes a full description of the architecture of 32-bit PICs and their applications, along with coverage of the relevant development and debugging tools. Through a series of fully realized example projects, Dogan Ibrahim demonstrates how engineers can harness the power of this new technology to optimize their embedded design

  11. ReAS: Recovery of ancestral sequences for transposable elements from the unassembled reads of a whole genome shotgun

    DEFF Research Database (Denmark)

    Li, Ruiqiang; Ye, Jia; Li, Songgang

    2005-01-01

    We describe an algorithm, ReAS, to recover ancestral sequences for transposable elements (TEs) from the unassembled reads of a whole genome shotgun. The main assumptions are that these TEs must exist at high copy numbers across the genome and must not be so old that they are no longer recognizable...... in comparison to their ancestral sequences. Tested on the japonica rice genome, ReAS was able to reconstruct all of the high copy sequences in the Repbase repository of known TEs, and increase the effectiveness of RepeatMasker in identifying TEs from genome sequences. Udgivelsesdato: 2005-Sep...

  12. Stem loop sequences specific to transposable element IS605 are found linked to lipoprotein genes in Borrelia plasmids.

    Directory of Open Access Journals (Sweden)

    Nicholas Delihas

    Full Text Available BACKGROUND: Plasmids of Borrelia species are dynamic structures that contain a large number of repetitive genes, gene fragments, and gene fusions. In addition, the transposable element IS605/200 family, as well as degenerate forms of this IS element, are prevalent. In Helicobacter pylori, flanking regions of the IS605 transposase gene contain sequences that fold into identical small stem loops. These function in transposition at the single-stranded DNA level. METHODOLOGY/PRINCIPAL FINDINGS: In work reported here, bioinformatics techniques were used to scan Borrelia plasmid genomes for IS605 transposable element specific stem loop sequences. Two variant stem loop motifs are found in the left and right flanking regions of the transposase gene. Both motifs appear to have dispersed in plasmid genomes and are found "free-standing" and phylogenetically conserved without the associated IS605 transposase gene or the adjacent flanking sequence. Importantly, IS605 specific stem loop sequences are also found at the 3' ends of lipoprotein genes (PFam12 and PFam60, however the left and right sequences appear to develop their own evolutionary patterns. The lipoprotein gene-linked left stem loop sequences maintain the IS605 stem loop motif in orthologs but only at the RNA level. These show mutations whereby variants fold into phylogenetically conserved RNA-type stem loops that contain the wobble non-Watson-Crick G-U base-pairing. The right flanking sequence is associated with the family lipoprotein-1 genes. A comparison of homologs shows that the IS605 stem loop motif rapidly dissipates, but a more elaborate secondary structure appears to develop in its place. CONCLUSIONS/SIGNIFICANCE: Stem loop sequences specific to the transposable element IS605 are present in plasmid regions devoid of a transposase gene and significantly, are found linked to lipoprotein genes in Borrelia plasmids. These sequences are evolutionarily conserved and/or structurally developed in

  13. EnhancedBit: Unleashing the potential of the unchoking policy in the BitTorrent  protocol

    CERN Document Server

    Atlidakis, V; Delis, A

    2014-01-01

    In this paper, we propose a modification to the BitTorrent protocol related to its peer unchoking policy. In particular, we apply a novel optimistic unchoking approach that improves the quality of inter-connections amongst peers, i.e., increases the number of directly-connected and interested-in-cooperation peers without penalizing underutilized and/or idle peers. Our optimistic unchoking policy takes into consideration the number of clients currently interested in downloading from a peer that is to be unchoked. Our conjecture is that peers having few clients interested in downloading data from them, should be favored with optimistic unchoke intervals. This enables the peers in question to receive data since they become unchoked faster and in turn, they will trigger the interest of additional clients. In contrast, peers with plenty of "interested" clients should enjoy a lower priority to be selected as planned optimistic unchoked, since these peers likely have enough data to forward; nevertheless, they receiv...

  14. Computational identification of harmful mutation regions to the activity of transposable elements.

    Science.gov (United States)

    Jin, Lingling; McQuillan, Ian; Li, Longhai

    2017-11-17

    Transposable elements (TEs) are interspersed DNA sequences that can move or copy to new positions within a genome. TEs are believed to promote speciation and their activities play a significant role in human disease. In the human genome, the 22 AluY and 6 AluS TE subfamilies have been the most recently active, and their transposition has been implicated in many inherited human diseases and in various forms of cancer. Therefore, understanding their transposition activity is very important and identifying the factors that affect their transpositional activity is of great interest. Recently, there has been some work done to quantify the activity levels of active Alu TEs based on variation in the sequence. Given this activity data, an analysis of TE activity based on the position of mutations is conducted. A method/simulation is created to computationally predict so-called harmful mutation regions in the consensus sequence of a TE; that is, mutations that occur in these regions decrease the transpositional activity dramatically. The methods are applied to the most active subfamily, AluY, to identify the harmful regions, and seven harmful regions are identified within the AluY consensus with q-values less than 0.05. A supplementary simulation also shows that the identified harmful regions covering the AluYa5 RNA functional regions are not occurring by chance. This method is then applied to two additional TE families: the Alu family and the L1 family, to computationally detect the harmful regions in these elements. We use a computational method to identify a set of harmful mutation regions. Mutations within the identified harmful regions decrease the transpositional activity of active elements. The correlation between the mutations within these regions and the transpositional activity of TEs are shown to be statistically significant. Verifications are presented using the activity of AluY elements and the secondary structure of the AluYa5 RNA, providing evidence that the

  15. BrassicaTED - a public database for utilization of miniature transposable elements in Brassica species.

    Science.gov (United States)

    Murukarthick, Jayakodi; Sampath, Perumal; Lee, Sang Choon; Choi, Beom-Soon; Senthil, Natesan; Liu, Shengyi; Yang, Tae-Jin

    2014-06-20

    MITE, TRIM and SINEs are miniature form transposable elements (mTEs) that are ubiquitous and dispersed throughout entire plant genomes. Tens of thousands of members cause insertion polymorphism at both the inter- and intra- species level. Therefore, mTEs are valuable targets and resources for development of markers that can be utilized for breeding, genetic diversity and genome evolution studies. Taking advantage of the completely sequenced genomes of Brassica rapa and B. oleracea, characterization of mTEs and building a curated database are prerequisite to extending their utilization for genomics and applied fields in Brassica crops. We have developed BrassicaTED as a unique web portal containing detailed characterization information for mTEs of Brassica species. At present, BrassicaTED has datasets for 41 mTE families, including 5894 and 6026 members from 20 MITE families, 1393 and 1639 members from 5 TRIM families, 1270 and 2364 members from 16 SINE families in B. rapa and B. oleracea, respectively. BrassicaTED offers different sections to browse structural and positional characteristics for every mTE family. In addition, we have added data on 289 MITE insertion polymorphisms from a survey of seven Brassica relatives. Genes with internal mTE insertions are shown with detailed gene annotation and microarray-based comparative gene expression data in comparison with their paralogs in the triplicated B. rapa genome. This database also includes a novel tool, K BLAST (Karyotype BLAST), for clear visualization of the locations for each member in the B. rapa and B. oleracea pseudo-genome sequences. BrassicaTED is a newly developed database of information regarding the characteristics and potential utility of mTEs including MITE, TRIM and SINEs in B. rapa and B. oleracea. The database will promote the development of desirable mTE-based markers, which can be utilized for genomics and breeding in Brassica species. BrassicaTED will be a valuable repository for scientists

  16. Metastasis of tumor cells is enhanced by downregulation of Bit1.

    Directory of Open Access Journals (Sweden)

    Priya Prakash Karmali

    Full Text Available Resistance to anoikis, which is defined as apoptosis induced by loss of integrin-mediated cell attachment to the extracellular matrix, is a determinant of tumor progression and metastasis. We have previously identified the mitochondrial Bit1 (Bcl-2 inhibitor of transcription protein as a novel anoikis effector whose apoptotic function is independent from caspases and is uniquely controlled by integrins. In this report, we examined the possibility that Bit1 is suppressed during tumor progression and that Bit1 downregulation may play a role in tumor metastasis.Using a human breast tumor tissue array, we found that Bit1 expression is suppressed in a significant fraction of advanced stages of breast cancer. Targeted disruption of Bit1 via shRNA technology in lowly aggressive MCF7 cells conferred enhanced anoikis resistance, adhesive and migratory potential, which correlated with an increase in active Extracellular kinase regulated (Erk levels and a decrease in Erk-directed phosphatase activity. These pro-metastasis phenotypes were also observed following downregulation of endogenous Bit1 in Hela and B16F1 cancer cell lines. The enhanced migratory and adhesive potential of Bit1 knockdown cells is in part dependent on their high level of Erk activation since down-regulating Erk in these cells attenuated their enhanced motility and adhesive properties. The Bit1 knockdown pools also showed a statistically highly significant increase in experimental lung metastasis, with no differences in tumor growth relative to control clones in vivo using a BALB/c nude mouse model system. Importantly, the pulmonary metastases of Bit1 knockdown cells exhibited increased phospho-Erk staining.These findings indicate that downregulation of Bit1 conferred cancer cells with enhanced anoikis resistance, adhesive and migratory properties in vitro and specifically potentiated tumor metastasis in vivo. These results underscore the therapeutic importance of restoring Bit1

  17. DNA multi-bit non-volatile memory and bit-shifting operations using addressable electrode arrays and electric field-induced hybridization.

    Science.gov (United States)

    Song, Youngjun; Kim, Sejung; Heller, Michael J; Huang, Xiaohua

    2018-01-18

    DNA has been employed to either store digital information or to perform parallel molecular computing. Relatively unexplored is the ability to combine DNA-based memory and logical operations in a single platform. Here, we show a DNA tri-level cell non-volatile memory system capable of parallel random-access writing of memory and bit shifting operations. A microchip with an array of individually addressable electrodes was employed to enable random access of the memory cells using electric fields. Three segments on a DNA template molecule were used to encode three data bits. Rapid writing of data bits was enabled by electric field-induced hybridization of fluorescently labeled complementary probes and the data bits were read by fluorescence imaging. We demonstrated the rapid parallel writing and reading of 8 (2 3 ) combinations of 3-bit memory data and bit shifting operations by electric field-induced strand displacement. Our system may find potential applications in DNA-based memory and computations.

  18. Study of nonlinear phenomena in a multi-bit bandpass sigma delta modulator

    Energy Technology Data Exchange (ETDEWEB)

    Iu, H.H.C. [School of Electrical, Electronic and Computer Engineering, The University of Western Australia, 35 Stirling Highway, Crawley (Australia)]. E-mail: herbert@ee.uwa.edu.au

    2006-11-15

    Bandpass sigma delta modulators (SDMs) have applications in areas such as digital radio demodulation. It is well known that bandpass SDMs with single bit quantizers can exhibit nonlinear and complex state space dynamics like elliptical fractal patterns. These fractal patterns are usually confined in trapezoidal regions. In this paper, we consider bandpass SDMs with multi-bit quantizers. Their nonlinear dynamics is studied.

  19. Bit and Power Loading Approach for Broadband Multi-Antenna OFDM System

    DEFF Research Database (Denmark)

    Rahman, Muhammad Imadur; Das, Suvra S.; Wang, Yuanye

    2007-01-01

    In this work, we have studied bit and power allocation strategies for multi-antenna assisted Orthogonal Frequency Division Multiplexing (OFDM) systems and investigated the impact of different rates of bit and power allocations on various multi-antenna diversity schemes. It is observed that, if we...... allocations across OFDM sub-channels are required together for efficient exploitation of wireless channel....

  20. Enhanced bit rate-distance product impulse radio ultra-wideband over fiber link

    DEFF Research Database (Denmark)

    Rodes Lopez, Roberto; Jensen, Jesper Bevensee; Caballero Jambrina, Antonio

    2010-01-01

    We report on a record distance and bit rate-wireless impulse radio (IR) ultra-wideband (UWB) link with combined transmission over a 20 km long fiber link. We are able to improve the compliance with the regulated frequency emission mask and achieve bit rate-distance products as high as 16 Gbit/s·m....

  1. Application of time-hopping UWB range-bit rate performance in the UWB sensor networks

    NARCIS (Netherlands)

    Nascimento, J.R.V. do; Nikookar, H.

    2008-01-01

    In this paper, the achievable range-bit rate performance is evaluated for Time-Hopping (TH) UWB networks complying with the FCC outdoor emission limits in the presence of Multiple Access Interference (MAI). Application of TH-UWB range-bit rate performance is presented for UWB sensor networks.

  2. Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment

    NARCIS (Netherlands)

    Buhrman, H.; Christandl, M.; Hayden, P.; Lo, H.-K.; Wehner, S.

    2008-01-01

    Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classical and the quantum worlds. But when committing to a string of n bits at once, how far can we stretch the quantum limits? In this paper, we introduce a framework for quantum schemes where Alice commits

  3. 0.5 ns resolution, 8-bit time-to-digital converter with flash ADC

    International Nuclear Information System (INIS)

    Sobczynski, C.

    1987-01-01

    A two-channel time-to-digital converter based on an 8-bit flash ADC is presented. The full scale time range of 127.5 ns is digitized to 8 bits providing 500 ps time resolution. The conversion time per channel is less than 800 ns. The design is foreseen to be implemented into Fastbus. (orig.)

  4. On algorithmic equivalence of instruction sequences for computing bit string functions

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2015-01-01

    Every partial function from bit strings of a given length to bit strings of a possibly different given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We

  5. On algorithmic equivalence of instruction sequences for computing bit string functions

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2014-01-01

    Every partial function from bit strings of a given length to bit strings of a possibly different given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We

  6. FlavBit : a GAMBIT module for computing flavour observables and likelihoods

    NARCIS (Netherlands)

    Bernlochner, F.U.; Chrząszcz, M.; Dal, L.A.; Farmer, B.; Jackson, P.; Kvellestad, A.; Mahmoudi, F.; Putze, A.; Rogan, C.; Scott, P.; Serra, N.; Weniger, C.; White, M.

    2017-01-01

    Flavour physics observables are excellent probes of new physics up to very high energy scales. Here we present FlavBit, the dedicated flavour physics module of the global-fitting package GAMBIT. FlavBit includes custom implementations of various likelihood routines for a wide range of flavour

  7. Dispersion Tolerance of 40 Gbaud Multilevel Modulation Formats with up to 3 bits per Symbol

    DEFF Research Database (Denmark)

    Jensen, Jesper Bevensee; Tokle, Torger; Geng, Yan

    2006-01-01

    We present numerical and experimental investigations of dispersion tolerance for multilevel phase- and amplitude modulation with up to 3 bits per symbol at a symbol rate of 40 Gbaud......We present numerical and experimental investigations of dispersion tolerance for multilevel phase- and amplitude modulation with up to 3 bits per symbol at a symbol rate of 40 Gbaud...

  8. Development of a Tool Condition Monitoring System for Impregnated Diamond Bits in Rock Drilling Applications

    Science.gov (United States)

    Perez, Santiago; Karakus, Murat; Pellet, Frederic

    2017-05-01

    The great success and widespread use of impregnated diamond (ID) bits are due to their self-sharpening mechanism, which consists of a constant renewal of diamonds acting at the cutting face as the bit wears out. It is therefore important to keep this mechanism acting throughout the lifespan of the bit. Nonetheless, such a mechanism can be altered by the blunting of the bit that ultimately leads to a less than optimal drilling performance. For this reason, this paper aims at investigating the applicability of artificial intelligence-based techniques in order to monitor tool condition of ID bits, i.e. sharp or blunt, under laboratory conditions. Accordingly, topologically invariant tests are carried out with sharp and blunt bits conditions while recording acoustic emissions (AE) and measuring-while-drilling variables. The combined output of acoustic emission root-mean-square value (AErms), depth of cut ( d), torque (tob) and weight-on-bit (wob) is then utilized to create two approaches in order to predict the wear state condition of the bits. One approach is based on the combination of the aforementioned variables and another on the specific energy of drilling. The two different approaches are assessed for classification performance with various pattern recognition algorithms, such as simple trees, support vector machines, k-nearest neighbour, boosted trees and artificial neural networks. In general, Acceptable pattern recognition rates were obtained, although the subset composed by AErms and tob excels due to the high classification performances rates and fewer input variables.

  9. Towards the generation of random bits at terahertz rates based on a chaotic semiconductor laser

    International Nuclear Information System (INIS)

    Kanter, Ido; Aviad, Yaara; Reidler, Igor; Cohen, Elad; Rosenbluh, Michael

    2010-01-01

    Random bit generators (RBGs) are important in many aspects of statistical physics and crucial in Monte-Carlo simulations, stochastic modeling and quantum cryptography. The quality of a RBG is measured by the unpredictability of the bit string it produces and the speed at which the truly random bits can be generated. Deterministic algorithms generate pseudo-random numbers at high data rates as they are only limited by electronic hardware speed, but their unpredictability is limited by the very nature of their deterministic origin. It is widely accepted that the core of any true RBG must be an intrinsically non-deterministic physical process, e.g. measuring thermal noise from a resistor. Owing to low signal levels, such systems are highly susceptible to bias, introduced by amplification, and to small nonrandom external perturbations resulting in a limited generation rate, typically less than 100M bit/s. We present a physical random bit generator, based on a chaotic semiconductor laser, having delayed optical feedback, which operates reliably at rates up to 300Gbit/s. The method uses a high derivative of the digitized chaotic laser intensity and generates the random sequence by retaining a number of the least significant bits of the high derivative value. The method is insensitive to laser operational parameters and eliminates the necessity for all external constraints such as incommensurate sampling rates and laser external cavity round trip time. The randomness of long bit strings is verified by standard statistical tests.

  10. Towards the generation of random bits at terahertz rates based on a chaotic semiconductor laser

    Science.gov (United States)

    Kanter, Ido; Aviad, Yaara; Reidler, Igor; Cohen, Elad; Rosenbluh, Michael

    2010-06-01

    Random bit generators (RBGs) are important in many aspects of statistical physics and crucial in Monte-Carlo simulations, stochastic modeling and quantum cryptography. The quality of a RBG is measured by the unpredictability of the bit string it produces and the speed at which the truly random bits can be generated. Deterministic algorithms generate pseudo-random numbers at high data rates as they are only limited by electronic hardware speed, but their unpredictability is limited by the very nature of their deterministic origin. It is widely accepted that the core of any true RBG must be an intrinsically non-deterministic physical process, e.g. measuring thermal noise from a resistor. Owing to low signal levels, such systems are highly susceptible to bias, introduced by amplification, and to small nonrandom external perturbations resulting in a limited generation rate, typically less than 100M bit/s. We present a physical random bit generator, based on a chaotic semiconductor laser, having delayed optical feedback, which operates reliably at rates up to 300Gbit/s. The method uses a high derivative of the digitized chaotic laser intensity and generates the random sequence by retaining a number of the least significant bits of the high derivative value. The method is insensitive to laser operational parameters and eliminates the necessity for all external constraints such as incommensurate sampling rates and laser external cavity round trip time. The randomness of long bit strings is verified by standard statistical tests.

  11. Up to 20 Gbit/s bit-rate transparent integrated interferometric wavelength converter

    DEFF Research Database (Denmark)

    Jørgensen, Carsten; Danielsen, Søren Lykke; Hansen, Peter Bukhave

    1996-01-01

    We present a compact and optimised multiquantum-well based, integrated all-active Michelson interferometer for 26 Gbit/s optical wavelength conversion. Bit-rate transparent operation is demonstrated with a conversion penalty well below 0.5 dB at bit-rates ranging from 622 Mbit/s to 20 Gbit/s....

  12. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  13. A major invasion of transposable elements accounts for the large size of the Blumeria graminis f.sp. tritici genome.

    Science.gov (United States)

    Parlange, Francis; Oberhaensli, Simone; Breen, James; Platzer, Matthias; Taudien, Stefan; Simková, Hana; Wicker, Thomas; Doležel, Jaroslav; Keller, Beat

    2011-12-01

    Powdery mildew of wheat (Triticum aestivum L.) is caused by the ascomycete fungus Blumeria graminis f.sp. tritici. Genomic approaches open new ways to study the biology of this obligate biotrophic pathogen. We started the analysis of the Bg tritici genome with the low-pass sequencing of its genome using the 454 technology and the construction of the first genomic bacterial artificial chromosome (BAC) library for this fungus. High-coverage contigs were assembled with the 454 reads. They allowed the characterization of 56 transposable elements and the establishment of the Blumeria repeat database. The BAC library contains 12,288 clones with an average insert size of 115 kb, which represents a maximum of 7.5-fold genome coverage. Sequencing of the BAC ends generated 12.6 Mb of random sequence representative of the genome. Analysis of BAC-end sequences revealed a massive invasion of transposable elements accounting for at least 85% of the genome. This explains the unusually large size of this genome which we estimate to be at least 174 Mb, based on a large-scale physical map constructed through the fingerprinting of the BAC library. Our study represents a crucial step in the perspective of the determination and study of the whole Bg tritici genome sequence.

  14. Simple proof of the impossibility of bit commitment in generalized probabilistic theories using cone programming

    Science.gov (United States)

    Sikora, Jamie; Selby, John

    2018-04-01

    Bit commitment is a fundamental cryptographic task, in which Alice commits a bit to Bob such that she cannot later change the value of the bit, while, simultaneously, the bit is hidden from Bob. It is known that ideal bit commitment is impossible within quantum theory. In this work, we show that it is also impossible in generalized probabilistic theories (under a small set of assumptions) by presenting a quantitative trade-off between Alice's and Bob's cheating probabilities. Our proof relies crucially on a formulation of cheating strategies as cone programs, a natural generalization of semidefinite programs. In fact, using the generality of this technique, we prove that this result holds for the more general task of integer commitment.

  15. Changes realized from extended bit-depth and metal artifact reduction in CT

    Energy Technology Data Exchange (ETDEWEB)

    Glide-Hurst, C.; Chen, D.; Zhong, H.; Chetty, I. J. [Department of Radiation Oncology, Henry Ford Health Systems, Detroit, Michigan 48202 (United States)

    2013-06-15

    Purpose: High-Z material in computed tomography (CT) yields metal artifacts that degrade image quality and may cause substantial errors in dose calculation. This study couples a metal artifact reduction (MAR) algorithm with enhanced 16-bit depth (vs standard 12-bit) to quantify potential gains in image quality and dosimetry. Methods: Extended CT to electron density (CT-ED) curves were derived from a tissue characterization phantom with titanium and stainless steel inserts scanned at 90-140 kVp for 12- and 16-bit reconstructions. MAR was applied to sinogram data (Brilliance BigBore CT scanner, Philips Healthcare, v.3.5). Monte Carlo simulation (MC-SIM) was performed on a simulated double hip prostheses case (Cerrobend rods embedded in a pelvic phantom) using BEAMnrc/Dosxyz (400 000 0000 histories, 6X, 10 Multiplication-Sign 10 cm{sup 2} beam traversing Cerrobend rod). A phantom study was also conducted using a stainless steel rod embedded in solid water, and dosimetric verification was performed with Gafchromic film analysis (absolute difference and gamma analysis, 2% dose and 2 mm distance to agreement) for plans calculated with Anisotropic Analytic Algorithm (AAA, Eclipse v11.0) to elucidate changes between 12- and 16-bit data. Three patients (bony metastases to the femur and humerus, and a prostate cancer case) with metal implants were reconstructed using both bit depths, with dose calculated using AAA and derived CT-ED curves. Planar dose distributions were assessed via matrix analyses and using gamma criteria of 2%/2 mm. Results: For 12-bit images, CT numbers for titanium and stainless steel saturated at 3071 Hounsfield units (HU), whereas for 16-bit depth, mean CT numbers were much larger (e.g., titanium and stainless steel yielded HU of 8066.5 {+-} 56.6 and 13 588.5 {+-} 198.8 for 16-bit uncorrected scans at 120 kVp, respectively). MC-SIM was well-matched between 12- and 16-bit images except downstream of the Cerrobend rod, where 16-bit dose was {approx}6

  16. All-optical 2-bit header recognition and packet switching using polarization bistable VCSELs.

    Science.gov (United States)

    Hayashi, Daisuke; Nakao, Kazuya; Katayama, Takeo; Kawaguchi, Hitoshi

    2015-04-06

    We propose and evaluate an all-optical 2-bit header recognition and packet switching method using two 1.55-µm polarization bistable vertical-cavity surface-emitting lasers (VCSELs) and three optical switches. Polarization bistable VCSELs acted as flip-flop devices by using AND-gate operations of the header and set pulses, together with the reset pulses. Optical packets including 40-Gb/s non-return-to-zero pseudo-random bit-sequence payloads were successfully sent to one of four ports according to the state of two bits in the headers with a 4-bit 500-Mb/s return-to-zero format. The input pulse powers were 17.2 to 31.8 dB lower than the VCSEL output power. We also examined an extension of this method to multi-bit header recognition and packet switching.

  17. Warped Discrete Cosine Transform-Based Low Bit-Rate Block Coding Using Image Downsampling

    Directory of Open Access Journals (Sweden)

    Ertürk Sarp

    2007-01-01

    Full Text Available This paper presents warped discrete cosine transform (WDCT-based low bit-rate block coding using image downsampling. While WDCT aims to improve the performance of conventional DCT by frequency warping, the WDCT has only been applicable to high bit-rate coding applications because of the overhead required to define the parameters of the warping filter. Recently, low bit-rate block coding based on image downsampling prior to block coding followed by upsampling after the decoding process is proposed to improve the compression performance for low bit-rate block coders. This paper demonstrates that a superior performance can be achieved if WDCT is used in conjunction with image downsampling-based block coding for low bit-rate applications.

  18. Video Synchronization With Bit-Rate Signals and Correntropy Function

    Directory of Open Access Journals (Sweden)

    Igor Pereira

    2017-09-01

    Full Text Available We propose an approach for the synchronization of video streams using correntropy. Essentially, the time offset is calculated on the basis of the instantaneous transfer rates of the video streams that are extracted in the form of a univariate signal known as variable bit-rate (VBR. The state-of-the-art approach uses a window segmentation strategy that is based on consensual zero-mean normalized cross-correlation (ZNCC. This strategy has an elevated computational complexity, making its application to synchronizing online data streaming difficult. Hence, our proposal uses a different window strategy that, together with the correntropy function, allows the synchronization to be performed for online applications. This provides equivalent synchronization scores with a rapid offset determination as the streams come into the system. The efficiency of our approach has been verified through experiments that demonstrate its viability with values that are as precise as those obtained by ZNCC. The proposed approach scored 81 % in time reference classification against the equivalent 81 % of the state-of-the-art approach, requiring much less computational power.

  19. A short impossibility proof of quantum bit commitment

    Energy Technology Data Exchange (ETDEWEB)

    Chiribella, Giulio, E-mail: gchiribella@mail.tsinghua.edu.cn [Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University (China); D' Ariano, Giacomo Mauro, E-mail: dariano@unipv.it [QUIT group, Dipartimento di Fisica, via Bassi 6, 27100 Pavia (Italy); INFN Gruppo IV, Sezione di Pavia, via Bassi, 6, 27100 Pavia (Italy); Perinotti, Paolo, E-mail: paolo.perinotti@unipv.it [QUIT group, Dipartimento di Fisica, via Bassi 6, 27100 Pavia (Italy); INFN Gruppo IV, Sezione di Pavia, via Bassi, 6, 27100 Pavia (Italy); Schlingemann, Dirk, E-mail: d.schlingemann@tu-bs.de [ISI Foundation, Quantum Information Theory Unit, Viale S. Severo 65, 10133 Torino (Italy); Werner, Reinhard, E-mail: Reinhard.Werner@itp.uni-hannover.de [Institut für Theoretische Physik, Leibniz Universität Hannover, Appelstrasse 2, 30167 Hannover (Germany)

    2013-06-17

    Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment–bindingness tradeoff (Lo and Chau, 1997 [1], Mayers, 1997 [2]). A strengthened and explicit impossibility proof has been given in D'Ariano et al. (2007) [3] in the Heisenberg picture and in a C{sup ⁎}-algebraic framework, considering all conceivable protocols in which both classical and quantum information is exchanged. In the present Letter we provide a new impossibility proof in the Schrödinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs (Chiribella et al., 2008 [4]), with each single-party strategy represented by a conditioned comb. We prove that assuming a stronger notion of concealment—for each classical communication history, not in average—allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment–bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with the metric given by the comb discriminability-distance.

  20. Bit Level Synchronized MAC Protocol for Multireader RFID Networks

    Directory of Open Access Journals (Sweden)

    Namboodiri Vinod

    2010-01-01

    Full Text Available The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency channels due to technical and regulatory limitations. The typical solution is to separate the operation of such readers across time. This sequential operation, however, results in a long delay to identify all tags. We present a bit level synchronized (BLSync MAC protocol for multi-reader RFID networks that allows multiple readers to operate simultaneously on the same frequency channel. The BLSync protocol solves the reader collision problem by allowing all readers to transmit the same query at the same time. We analyze the performance of using the BLSync protocol and demonstrate benefits of 40%–50% in terms of tag reading delay for most settings. The benefits of BLSync, first demonstrated through analysis, are then validated and quantified through simulations on realistic reader-tag layouts.

  1. Transnational exchange of scientific data: The ``Bits of Power'' report

    Science.gov (United States)

    Berry, R. Stephen

    1998-07-01

    In 1994, the U.S. National Committee for the Committee on Data for Science and Technology (CODATA), organized under the Commission on Physical Sciences, Mathematics and Applications of the National Research Council established the Committee on Issues in the Transborder Flow of Scientific Data. The purpose of this Committee was to examine the current state of global access to scientific data, to identify strengths, problems and challenges confronting scientists now, or likely to arise in the next few years, and to make recommendations on building the strengths and ameliorating or avoiding the problems. The Committee's report appeared as the book Bits of Power: Issues in Global Access to Scientific Data (National Academy Press, Washington, D.C., 1997). This presentation is a brief summary of that report, particularly as it pertains to atomic and molecular data. The context is necessarily the evolution toward increasing electronic acquisition, archiving and distribution of scientific data. Thus the central issues were divided into the technological infrastructure, the issues for the sciences and scientists in the various disciplines, the economic aspects and the legal issues. For purposes of this study, the sciences fell naturally into four groups: the laboratory physical sciences, the biological sciences, the earth sciences and the astronomical and planetary sciences. Some of the substantive scientific aspects are specific to particular groups of sciences, but the matters of infrastructure, economic questions and legal issues apply, for the most part, to all the sciences.

  2. A CAMAC display module for fast bit-mapped graphics

    International Nuclear Information System (INIS)

    Abdel-Aal, R.E.

    1992-01-01

    In many data acquisition and analysis facilities for nuclear physics research, utilities for the display of two-dimensional (2D) images and spectra on graphics terminals suffer from low speed, poor resolution, and limit accuracy. Developed of CAMAC bit-mapped graphics modules for this purpose has been discouraged in the past by the large device count needed and the long times required to load the image data from the host computer into the CAMAC hardware; particularly since many such facilities have been designed to support fast DMA block transfers only for data acquisition into the host. This paper describes the design and implementation of a prototype CAMAC graphics display module with a resolution of 256x256 pixels at eight colours for which all components can be easily accommodated in a single-width package. Employed is a hardware technique which reduces the number of programmed CAMAC data transfer operations needed for writing 2D images into the display memory by approximately an order of magnitude, with attendant improvements in the display speed and CPU time consumption. Hardware and software details are given together with sample results. Information on the performance of the module in a typical VAX/MBD data acquisition environment is presented, including data on the mutual effects of simultaneous data acquisition traffic. Suggestions are made for further improvements in performance. (orig.)

  3. Modeling for write synchronization in bit patterned media recording

    Science.gov (United States)

    Lin, Maria Yu; Chan, Kheong Sann; Chua, Melissa; Zhang, Songhua; Kui, Cai; Elidrissi, Moulay Rachid

    2012-04-01

    Bit patterned media recording (BPMR) is a contender for next generation technology after conventional granular magnetic recording (CGMR) can no longer sustain the continued areal density growth. BPMR has several technological hurdles that need to be overcome, among them is solving the problem of write synchronization. With CGMR, grains are randomly distributed and occur almost all over the media. In contrast, BPMR has grains patterned into a regular lattice on the media with an approximate 50% duty cycle. Hence only about a quarter of the area is filled with magnetic material. During writing, the clock must be synchronized to the islands or the written in error rate becomes unacceptably large and the system fails. Maintaining synchronization during writing is a challenge as the system is not able to read and write simultaneously. Hence reading must occur periodically between the writing frequently enough to re-synchronize the writing clock to the islands. In this work, we study the requirements on the lengths of the synchronization and data sectors in a BPMR system using an advanced model for BPMR, and taking into consideration different spindle motor speed variations, which is the main cause of the mis-synchronization.

  4. Video Synchronization With Bit-Rate Signals and Correntropy Function.

    Science.gov (United States)

    Pereira, Igor; Silveira, Luiz F; Gonçalves, Luiz

    2017-09-04

    We propose an approach for the synchronization of video streams using correntropy. Essentially, the time offset is calculated on the basis of the instantaneous transfer rates of the video streams that are extracted in the form of a univariate signal known as variable bit-rate (VBR). The state-of-the-art approach uses a window segmentation strategy that is based on consensual zero-mean normalized cross-correlation (ZNCC). This strategy has an elevated computational complexity, making its application to synchronizing online data streaming difficult. Hence, our proposal uses a different window strategy that, together with the correntropy function, allows the synchronization to be performed for online applications. This provides equivalent synchronization scores with a rapid offset determination as the streams come into the system. The efficiency of our approach has been verified through experiments that demonstrate its viability with values that are as precise as those obtained by ZNCC. The proposed approach scored 81 % in time reference classification against the equivalent 81 % of the state-of-the-art approach, requiring much less computational power.

  5. Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT

    Directory of Open Access Journals (Sweden)

    Mahmuddin Yunus

    2014-01-01

    Full Text Available Abstrak Penyembunyian data pada file video dikenal dengan istilah steganografi video. Metode steganografi yang dikenal diantaranya metode Least Significant Bit (LSB dan Discrete Cosine Transform (DCT. Dalam penelitian ini dilakukan penyembunyian data pada file video dengan menggunakan metode LSB, metode DCT, dan gabungan metode LSB-DCT. Sedangkan kualitas file video yang dihasilkan setelah penyisipan dihitung dengan menggunakan Mean Square Error (MSE dan Peak Signal to Noise Ratio (PSNR.Uji eksperimen dilakukan berdasarkan ukuran file video, ukuran file berkas rahasia yang disisipkan, dan resolusi video. Hasil pengujian menunjukkan tingkat keberhasilan steganografi video dengan menggunakan metode LSB adalah 38%, metode DCT adalah 90%, dan gabungan metode LSB-DCT adalah 64%. Sedangkan hasil perhitungan MSE, nilai MSE metode DCT paling rendah dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan metode LSB-DCT mempunyai nilai yang lebih kecil dibandingkan metode LSB. Pada pengujian PSNR diperoleh databahwa nilai PSNR metode DCTlebih tinggi dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan nilai PSNR metode gabungan LSB-DCT lebih tinggi dibandingkan metode LSB.   Kata Kunci— Steganografi, Video, Least Significant Bit (LSB, Discrete Cosine Transform (DCT, Mean Square Error (MSE, Peak Signal to Noise Ratio (PSNR                             Abstract Hiding data in video files is known as video steganography. Some of the well known steganography methods areLeast Significant Bit (LSB and Discrete Cosine Transform (DCT method. In this research, data will be hidden on the video file with LSB method, DCT method, and the combined method of LSB-DCT. While the quality result of video file after insertion is calculated using the Mean Square Error (MSE and Peak Signal to Noise Ratio (PSNR. The experiments were conducted based on the size of the video file, the file size of the inserted secret files, and

  6. A multi-bit rate interface movement compensated multimode coder for video conferencing

    Science.gov (United States)

    1982-04-01

    This report describes a multi-bit rate video coder for DARPA video conferencing applications. The coder can operate at any preselected transmission bit rate ranging from 1.5 Mb/s to 64 kb/s. The proposed National Command Authority Teleconferencing System (NCATS) is designed to connect several conferencing sites. The system provides shared audio, video and graphic spaces. The video conferencing system communicates dynamic images of participants to different conferencing sites. The system is designed to operate under different bandwidth constraints. Under emergency situations communications bandwidth can be drastically reduced to allow only for 64 kb/s to carry out the video conferencing system. Under normal conditions larger channel capacity is available for this service. In order to accommodate the above requirements, a video codec that can operate at different transmission bit rates is needed. This allows for upgrading of picture quality when there is sufficient bandwidth and a graceful reduction of picture quality under severe bandwidth limitations. The NTSC colour video signal sampled at 14.3 MHz (4 times the colour subcarrier frequency) and uniformly quantized to 8 bits per picture element, requires a transmission bit rate of 114 Mb/s. Such a high bit rate is economically prohibitive especially for video conferencing applications. In order to reduce the transmission bit rate, redundant information in the signal has to be removed and the specific video conferencing environment has to be exploited.

  7. Use of One Time Pad Algorithm for Bit Plane Security Improvement

    Science.gov (United States)

    Suhardi; Suwilo, Saib; Budhiarti Nababan, Erna

    2017-12-01

    BPCS (Bit-Plane Complexity Segmentation) which is one of the steganography techniques that utilizes the human vision characteristics that cannot see the change in binary patterns that occur in the image. This technique performs message insertion by making a switch to a high-complexity bit-plane or noise-like regions with bits of secret messages. Bit messages that were previously stored precisely result the message extraction process to be done easily by rearranging a set of previously stored characters in noise-like region in the image. Therefore the secret message becomes easily known by others. In this research, the process of replacing bit plane with message bits is modified by utilizing One Time Pad cryptography technique which aims to increase security in bit plane. In the tests performed, the combination of One Time Pad cryptographic algorithm to the steganography technique of BPCS works well in the insertion of messages into the vessel image, although in insertion into low-dimensional images is poor. The comparison of the original image with the stegoimage looks identical and produces a good quality image with a mean value of PSNR above 30db when using a largedimensional image as the cover messages.

  8. A Novel Digital Background Calibration Technique for 16 bit SHA-less Multibit Pipelined ADC

    Directory of Open Access Journals (Sweden)

    Swina Narula

    2016-01-01

    Full Text Available In this paper, a high resolution of 16 bit and high speed of 125MS/s, multibit Pipelined ADC with digital background calibration is presented. In order to achieve low power, SHA-less front end is used with multibit stages. The first and second stages are used here as a 3.5 bit and the stages from third to seventh are of 2.5 bit and last stage is of 3-bit flash ADC. After bit alignment and truncation of total 19 bits, 16 bits are used as final digital output. To precise the remove linear gain error of the residue amplifier and capacitor mismatching error, a digital background calibration technique is used, which is a combination of signal dependent dithering (SDD and butterfly shuffler. To improve settling time of residue amplifier, a special circuit of voltage separation is used. With the proposed digital background calibration technique, the spurious-free dynamic range (SFDR has been improved to 97.74 dB @30 MHz and 88.9 dB @150 MHz, and the signal-to-noise and distortion ratio (SNDR has been improved to 79.77 dB @ 30 MHz, and 73.5 dB @ 150 MHz. The implementation of the Pipelined ADC has been completed with technology parameters of 0.18μm CMOS process with 1.8 V supply. Total power consumption is 300 mW by the proposed ADC.

  9. A preliminary study on the containment building integrity following BIT removal for nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Jo, Jong Young; Song, Dong Soo; Byun, Choong Sub [Korea Electric Power Research Institute, Daejeon (Korea, Republic of)

    2008-07-01

    Boron Injection Tank(BIT) is a component of the Safety Injection System, which its sole function is to provide concentrated boric acid to the reactor coolant in order to mitigate the consequences of postulated main steamline break accidents. Although BIT plays an important role in mitigating the accident, high concentration of 20,000ppm causes valve leakage, clog of precipitation and continuous heat tracing have to be provided. For the removal of BIT, benchmarking analysis is performed between COPATTA code used in final safety analysis report and CONTEMPT code to be used this study. CONTEMPT is well compatible with COPATTA. The sensitivity study for integrity is performed for the three cases of full double ended rupture at 102% power with diesel generator failure, 3.4m{sup 3} and 2400ppm BIT, 3.4m{sup 3} and 0ppm BIT and no volume of BIT. The results show that the deactivation of BIT is plausible for success.

  10. Autonomously stabilized entanglement between two superconducting quantum bits

    Science.gov (United States)

    Shankar, S.; Hatridge, M.; Leghtas, Z.; Sliwa, K. M.; Narla, A.; Vool, U.; Girvin, S. M.; Frunzio, L.; Mirrahimi, M.; Devoret, M. H.

    2013-12-01

    Quantum error correction codes are designed to protect an arbitrary state of a multi-qubit register from decoherence-induced errors, but their implementation is an outstanding challenge in the development of large-scale quantum computers. The first step is to stabilize a non-equilibrium state of a simple quantum system, such as a quantum bit (qubit) or a cavity mode, in the presence of decoherence. This has recently been accomplished using measurement-based feedback schemes. The next step is to prepare and stabilize a state of a composite system. Here we demonstrate the stabilization of an entangled Bell state of a quantum register of two superconducting qubits for an arbitrary time. Our result is achieved using an autonomous feedback scheme that combines continuous drives along with a specifically engineered coupling between the two-qubit register and a dissipative reservoir. Similar autonomous feedback techniques have been used for qubit reset, single-qubit state stabilization, and the creation and stabilization of states of multipartite quantum systems. Unlike conventional, measurement-based schemes, the autonomous approach uses engineered dissipation to counteract decoherence, obviating the need for a complicated external feedback loop to correct errors. Instead, the feedback loop is built into the Hamiltonian such that the steady state of the system in the presence of drives and dissipation is a Bell state, an essential building block for quantum information processing. Such autonomous schemes, which are broadly applicable to a variety of physical systems, as demonstrated by the accompanying paper on trapped ion qubits, will be an essential tool for the implementation of quantum error correction.

  11. High bit rate optical transmission using midspan spectral inversion ...

    African Journals Online (AJOL)

    صﺧﻟﻣ. رﺎﺛآ نﻋ ﺔﺟﺗﺎﻧﻟا ءﺎﺿوﺿﻟا ﺔﻟﮐﺷﻣﻟ نﮐﻣﯾ. ﻟا. ﺔﻟﺣرﻣ. ﻟا. تﺗﺷﺗﻟاو ﺔﯾطﺧ رﯾﻐ. اﻟﻟ. نﻣ دﺣﻟا ﻲﻧو. ﺔﻓﺎﺳﻣ. ثﺑﻟا. لدﻌﻣو ،. ﻲﺋﺎﻧﺛﻟا. ) bit. (. ﺔﻟﺣرﻣﻟ. -. لوﺣﺗﻟا. -. لﯾدﻌﺗﻟا تﻻﺎﺣ لﻔﻘﻟا .ﻓ. ﻲ. ذھا. ﻟا. لﺎﻘﻣ. ،. ﺎﻧﺳرد. ﺿﯾوﻌﺗ. ﻵا تﺎ. رﺎﺛ. ﻟا. ﺔﯾطﺧﻟاو ﺔﯾطﺧﻟا رﯾﻐ. ﻋن. قﯾرط. ﺔﻟﺣرﻣﻟا دادﺗﻣا فﺻﺗﻧﻣ. ﺔﯾرﺻﺑﻟا. ﺔﻘﻓرﻣﻟا. ) OPC .(. ،ﻻوأ. ﻧ. رﺎﺛآ رﮭظ. ﻟا. تﺗﺷﺗ. ا. ظﻧ ﻲﻓ ﻲﻧوﻟ. ﺎم. OD8PSK. ) ﺔﯾﻟﺿﺎﻔﺗ. ىوﺗﺳﻣﻟا ﺔﯾﺋوﺿ. -8. ﺔﻟﺣرﻣ. -. لوﺣﺗﻟا. -. لﻔﻘﻟا. (،.

  12. The Virtual Solar Observatory at Eight and a Bit!

    Science.gov (United States)

    Davey, Alisdair R.; VSO Team

    2011-05-01

    The Virtual Solar Observatory (VSO) was the first virtual observatory in the solar and heliophysics data space. It first saw the light of day in 2003 with a mission to serve the solar physics community by enabling homogenous access to heterogeneous data, and hiding the gory details of doing so from the user. The VSO pioneered what was to become the "Small Box" methodology, setting out to provide only the services required to navigate the user to the data and then letting them directly transferred the data from the data providers. After eight and a bit years the VSO now serves data from 72 different instruments covering a multitude of space and ground based observatories, including data from SDO. Dealing with the volume of data from SDO has proved to be our most difficult challenge, forcing us from the small box approach to one where the various VSO sites not only serve SDO data, but are central to the distribution of the data within the US and to Europe and other parts of the world. With SDO data serving mostly in place we are now working on integration with the Heliophysics Event Knowledgebase (HEK) and including a number of new solar data sets in the VSO family. We have a complete VSO search interface in IDL now, enabling searching, downloading and processing solar data, all be done without leaving the IDL command line, and will be releasing a brand new web interface providing users and data providers, with the ability to create far more detailed and instrument specific searches. Eight years on and the VSO has plenty of work in front of it.

  13. A Model of Computation for Bit-Level Concurrent Computing and Programming: APEC

    Science.gov (United States)

    Ajiro, Takashi; Tsuchida, Kensei

    A concurrent model of computation and a language based on the model for bit-level operation are useful for developing asynchronous and concurrent programs compositionally, which frequently use bit-level operations. Some examples are programs for video games, hardware emulation (including virtual machines), and signal processing. However, few models and languages are optimized and oriented to bit-level concurrent computation. We previously developed a visual programming language called A-BITS for bit-level concurrent programming. The language is based on a dataflow-like model that computes using processes that provide serial bit-level operations and FIFO buffers connected to them. It can express bit-level computation naturally and develop compositionally. We then devised a concurrent computation model called APEC (Asynchronous Program Elements Connection) for bit-level concurrent computation. This model enables precise and formal expression of the process of computation, and a notion of primitive program elements for controlling and operating can be expressed synthetically. Specifically, the model is based on a notion of uniform primitive processes, called primitives, that have three terminals and four ordered rules at most, as well as on bidirectional communication using vehicles called carriers. A new notion is that a carrier moving between two terminals can briefly express some kinds of computation such as synchronization and bidirectional communication. The model's properties make it most applicable to bit-level computation compositionally, since the uniform computation elements are enough to develop components that have practical functionality. Through future application of the model, our research may enable further research on a base model of fine-grain parallel computer architecture, since the model is suitable for expressing massive concurrency by a network of primitives.

  14. Digital PSK to BiO-L demodulator for 2 sup nx(bit rate) carrier

    Science.gov (United States)

    Shull, T. A.

    1979-01-01

    A phase shift key (PSK) to BiO-L demodulator which uses standard digital integrated circuits is discussed. The demodulator produces NRZ-L, bit clock, and BiO-L outputs from digital PSK input signals for which the carrier is a 2 to the Nth multiple of the bit rate. Various bit and carrier rates which are accommodated by changing various component values within the demodulator are described. The use of the unit for sinusoidal inputs as well as digital inputs is discussed.

  15. Cheat sensitive quantum bit commitment via pre- and post-selected quantum states

    Science.gov (United States)

    Li, Yan-Bing; Wen, Qiao-Yan; Li, Zi-Chen; Qin, Su-Juan; Yang, Ya-Tao

    2014-01-01

    Cheat sensitive quantum bit commitment is a most important and realizable quantum bit commitment (QBC) protocol. By taking advantage of quantum mechanism, it can achieve higher security than classical bit commitment. In this paper, we propose a QBC schemes based on pre- and post-selected quantum states. The analysis indicates that both of the two participants' cheat strategies will be detected with non-zero probability. And the protocol can be implemented with today's technology as a long-term quantum memory is not needed.

  16. Optimization of rock-bit life based on bearing failure criteria

    International Nuclear Information System (INIS)

    Feav, M.J.; Thorogood, J.L.; Whelehan, O.P.; Williamson, H.S.

    1992-01-01

    This paper reports that recent advances in rock-bit seal technology have allowed greater predictability of bearing life. Cone loss following bearing failure incurs costs related to remedial activities. A risk analysis approach, incorporating bearing-life relationships and the inter-dependence of drilling events, is used to formulate a bit-run cost-optimization method. The procedure enables a choice to be made between elastomeric and metal seals on a lowest-replacement-cost basis. The technique also provides a formal method for assessing the opportunity cost for using a device to detect bit-bearing failures downhole

  17. Inadvertently programmed bits in Samsung 128 Mbit flash devices: a flaky investigation

    Science.gov (United States)

    Swift, G.

    2002-01-01

    JPL's X2000 avionics design pioneers new territory by specifying a non-volatile memory (NVM) board based on flash memories. The Samsung 128Mb device chosen was found to demonstrate bit errors (mostly program disturbs) and block-erase failures that increase with cycling. Low temperature, certain pseudo- random patterns, and, probably, higher bias increase the observable bit errors. An experiment was conducted to determine the wearout dependence of the bit errors to 100k cycles at cold temperature using flight-lot devices (some pre-irradiated). The results show an exponential growth rate, a wide part-to-part variation, and some annealing behavior.

  18. The endogenous transposable element Tgm9 is suitable for functional analyses of soybean genes and generating novel mutants for genetic improvement of soybean

    Science.gov (United States)

    In soybean, variegated flowers can be caused by somatic excision of the CACTA-type transposable element Tgm9 from intron 2 of the DFR2 gene encoding dihydroflavonol-4-reductase in the anthocyanin pigment biosynthetic pathway. DFR2 has been mapped to the W4 locus where the allele containing the elem...

  19. Enhanced susceptibility of a transposable-element-bearing strain of Drosophila melanogaster to somatic eye-color mutations by ethyl nitrosourea, methyl nitrosourea, and X-rays

    International Nuclear Information System (INIS)

    Ryo, H.; Kondo, S.; Rasmuson, B.

    1983-01-01

    A strain of Drosophila with the genes z and w + plus a transposable element (TE) is about 3 times more sensitive than a strain without TE toward somatic eye-color mutations after larval exposure to ethyl nitrosourea, methyl nitrosourea and X-rays. The assay system with TE is simple, reliable, and sensitive for detecting somatic mutations induced in vivo by mutagens. (orig.)

  20. Bit Error Rate Performance of a MIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh Fading

    Directory of Open Access Journals (Sweden)

    Claude D'Amours

    2011-01-01

    Full Text Available We analytically derive the upper bound for the bit error rate (BER performance of a single user multiple input multiple output code division multiple access (MIMO-CDMA system employing parity-bit-selected spreading in slowly varying, flat Rayleigh fading. The analysis is done for spatially uncorrelated links. The analysis presented demonstrates that parity-bit-selected spreading provides an asymptotic gain of 10log(Nt dB over conventional MIMO-CDMA when the receiver has perfect channel estimates. This analytical result concurs with previous works where the (BER is determined by simulation methods and provides insight into why the different techniques provide improvement over conventional MIMO-CDMA systems.

  1. The genome of the Queensland fruit fly Bactrocera tryoni contains multiple representatives of the mariner family of transposable elements.

    Science.gov (United States)

    Green, C L; Frommer, M

    2001-08-01

    Representatives of five distinct types of transposable elements of the mariner family were detected in the genomes of the Queensland fruit fly Bactrocera tryoni and its sibling species Bactrocera neohumeralis by phylogenetic analysis of transposase gene fragments. Three mariner types were also found in an additional tephritid, Bactrocera jarvisi. Using genomic library screening and inverse PCR, full-length elements representing the mellifera subfamily (B. tryoni.mar1) and the irritans subfamily (B. tryoni.mar2) were isolated from the B. tryoni genome. Nucleotide consensus sequences for each type were derived from multiple defective copies. Predicted transposase sequences share approximately 23% amino acid identity. B. tryoni.mar1 elements have an estimated copy number of about 900 in the B. tryoni genome, whereas B. tryoni.mar2 element types appear to be present in low copy number.

  2. A Transposable Partitioning Locus Used To Stabilize Plasmid-Borne Hydrogen Oxidation and Trifolitoxin Production Genes in a Sinorhizobium Strain

    Science.gov (United States)

    Kent, Angela D.; Wojtasiak, Michelle L.; Robleto, Eduardo A.; Triplett, Eric W.

    1998-01-01

    Improved nitrogen-fixing inoculum strains for leguminous crops must be able to effectively compete with indigenous strains for nodulation, enhance legume productivity compared to the productivity obtained with indigenous strains, and maintain stable expression of any added genes in the absence of selection pressure. We constructed a transposable element containing the tfx region for expression of increased nodulation competitiveness and the par locus for plasmid stability. The transposon was inserted into tetA of pHU52, a broad-host-range plasmid conferring the H2 uptake phenotype. The resulting plasmid, pHUTFXPAR, conferred the plasmid stability, trifolitoxin production, and H2 uptake phenotypes in the broad-host-range organism Sinorhizobium sp. strain ANU280. The broad applications of a transposon conferring plasmid stability are discussed. PMID:9572932

  3. Genotype-dependent Burst of Transposable Element Expression in Crowns of Hexaploid Wheat (Triticum aestivum L. during Cold Acclimation

    Directory of Open Access Journals (Sweden)

    Debbie Laudencia-Chingcuanco

    2012-01-01

    Full Text Available The expression of 1,613 transposable elements (TEs represented in the Affymetrix Wheat Genome Chip was examined during cold treatment in crowns of four hexaploid wheat genotypes that vary in tolerance to cold and in flowering time. The TE expression profiles showed a constant level of expression throughout the experiment in three of the genotypes. In winter Norstar, the most cold-hardy of the four genotypes, a subset of the TEs showed a burst of expression after vernalization saturation was achieved. About 47% of the TEs were expressed, and both Class I (retrotransposons and Class II (DNA transposons types were well represented. Gypsy and Copia were the most represented among the retrotransposons while CACTA and Mariner were the most represented DNA transposons. The data suggests that the Vrn-A1 region plays a role in the stage-specific induction of TE expression in this genotype.

  4. Genome-Wide Comparative Analysis of 20 Miniature Inverted-Repeat Transposable Element Families in Brassica rapa and B. oleracea

    Science.gov (United States)

    Sampath, Perumal; Murukarthick, Jayakodi; Izzah, Nur Kholilatul; Lee, Jonghoon; Choi, Hong-Il; Shirasawa, Kenta; Choi, Beom-Soon; Liu, Shengyi; Nou, Ill-Sup; Yang, Tae-Jin

    2014-01-01

    Miniature inverted-repeat transposable elements (MITEs) are ubiquitous, non-autonomous class II transposable elements. Here, we conducted genome-wide comparative analysis of 20 MITE families in B. rapa, B. oleracea, and Arabidopsis thaliana. A total of 5894 and 6026 MITE members belonging to the 20 families were found in the whole genome pseudo-chromosome sequences of B. rapa and B. oleracea, respectively. Meanwhile, only four of the 20 families, comprising 573 members, were identified in the Arabidopsis genome, indicating that most of the families were activated in the Brassica genus after divergence from Arabidopsis. Copy numbers varied from 4 to 1459 for each MITE family, and there was up to 6-fold variation between B. rapa and B. oleracea. In particular, analysis of intact members showed that whereas eleven families were present in similar copy numbers in B. rapa and B. oleracea, nine families showed copy number variation ranging from 2- to 16-fold. Four of those families (BraSto-3, BraTo-3, 4, 5) were more abundant in B. rapa, and the other five (BraSto-1, BraSto-4, BraTo-1, 7 and BraHAT-1) were more abundant in B. oleracea. Overall, 54% and 51% of the MITEs resided in or within 2 kb of a gene in the B. rapa and B. oleracea genomes, respectively. Notably, 92 MITEs were found within the CDS of annotated genes, suggesting that MITEs might play roles in diversification of genes in the recently triplicated Brassica genome. MITE insertion polymorphism (MIP) analysis of 289 MITE members showed that 52% and 23% were polymorphic at the inter- and intra-species levels, respectively, indicating that there has been recent MITE activity in the Brassica genome. These recently activated MITE families with abundant MIP will provide useful resources for molecular breeding and identification of novel functional genes arising from MITE insertion. PMID:24747717

  5. Genome-wide comparative analysis of 20 miniature inverted-repeat transposable element families in Brassica rapa and B. oleracea.

    Directory of Open Access Journals (Sweden)

    Perumal Sampath

    Full Text Available Miniature inverted-repeat transposable elements (MITEs are ubiquitous, non-autonomous class II transposable elements. Here, we conducted genome-wide comparative analysis of 20 MITE families in B. rapa, B. oleracea, and Arabidopsis thaliana. A total of 5894 and 6026 MITE members belonging to the 20 families were found in the whole genome pseudo-chromosome sequences of B. rapa and B. oleracea, respectively. Meanwhile, only four of the 20 families, comprising 573 members, were identified in the Arabidopsis genome, indicating that most of the families were activated in the Brassica genus after divergence from Arabidopsis. Copy numbers varied from 4 to 1459 for each MITE family, and there was up to 6-fold variation between B. rapa and B. oleracea. In particular, analysis of intact members showed that whereas eleven families were present in similar copy numbers in B. rapa and B. oleracea, nine families showed copy number variation ranging from 2- to 16-fold. Four of those families (BraSto-3, BraTo-3, 4, 5 were more abundant in B. rapa, and the other five (BraSto-1, BraSto-4, BraTo-1, 7 and BraHAT-1 were more abundant in B. oleracea. Overall, 54% and 51% of the MITEs resided in or within 2 kb of a gene in the B. rapa and B. oleracea genomes, respectively. Notably, 92 MITEs were found within the CDS of annotated genes, suggesting that MITEs might play roles in diversification of genes in the recently triplicated Brassica genome. MITE insertion polymorphism (MIP analysis of 289 MITE members showed that 52% and 23% were polymorphic at the inter- and intra-species levels, respectively, indicating that there has been recent MITE activity in the Brassica genome. These recently activated MITE families with abundant MIP will provide useful resources for molecular breeding and identification of novel functional genes arising from MITE insertion.

  6. Heavy-ion radiation induces both activation of multiple endogenous transposable elements and alterations in DNA methylation in rice

    Science.gov (United States)

    Zhang, Meng; Sun, Yeqing; Li, Xishan; Xiaolin, Cui; Li, Xiang

    2012-07-01

    Space radiation represents a complex environmental condition in which several interacting factors such as electron, neutron, proton, heavy-ion are involved, which may provoke stress responses and jeopardize genome integrity. Given the inherent property of epigenetic modifications to respond to intrinsic aswell as external perturbations, it is conceivable that epigenetic markers like DNA methylation and transposition may undergo alterations in response to space radiation. Cytosine DNA methylation plays important roles in maintaining genome stability and controlling gene expression. A predominant means for Transposable elements (TEs) to cause genetic instability is via their transpositional activation. To find the detailed molecular characterization of the nature of genomic changes induced by space radiation, the seeds of rice were exposed to 0.02, 0.2, 1, 2 and 20 Gy dose of ^{12}C heavy-ion radiation, respectively. We found that extensive alteration in both DNA methylation and gene expression occurred in rice plants after different dose of heavy-ion radiation. Here we shown that heavy-ion radiation has induced transposition of mPing and Tos17 in rice, which belong to distinct classes including the miniature inverted terminal repeat TEs (MITEs) and long-terminal repeat (LTR) retrotransposons, respectively. mPing and Tos17 mobility were found to correlate with cytosine methylation alteration detected by MSAP and genetic variation detected by AFLP. The result showed that at least in some cases transposition of TEs was associated with cytosine demethylation within the elements. Our results implicate that the heavy-ion radiation represents a potent mutagenic agent that can cause genomic instabilities by eliciting transposition of endogenous TEs in rice. Keywords: Heavy-ion radiation, DNA methylation, Transposable elements, mPing, Tos17

  7. Flow cytometry sorting of nuclei enables the first global characterization of Paramecium germline DNA and transposable elements.

    Science.gov (United States)

    Guérin, Frédéric; Arnaiz, Olivier; Boggetto, Nicole; Denby Wilkes, Cyril; Meyer, Eric; Sperling, Linda; Duharcourt, Sandra

    2017-04-26

    DNA elimination is developmentally programmed in a wide variety of eukaryotes, including unicellular ciliates, and leads to the generation of distinct germline and somatic genomes. The ciliate Paramecium tetraurelia harbors two types of nuclei with different functions and genome structures. The transcriptionally inactive micronucleus contains the complete germline genome, while the somatic macronucleus contains a reduced genome streamlined for gene expression. During development of the somatic macronucleus, the germline genome undergoes massive and reproducible DNA elimination events. Availability of both the somatic and germline genomes is essential to examine the genome changes that occur during programmed DNA elimination and ultimately decipher the mechanisms underlying the specific removal of germline-limited sequences. We developed a novel experimental approach that uses flow cell imaging and flow cytometry to sort subpopulations of nuclei to high purity. We sorted vegetative micronuclei and macronuclei during development of P. tetraurelia. We validated the method by flow cell imaging and by high throughput DNA sequencing. Our work establishes the proof of principle that developing somatic macronuclei can be sorted from a complex biological sample to high purity based on their size, shape and DNA content. This method enabled us to sequence, for the first time, the germline DNA from pure micronuclei and to identify novel transposable elements. Sequencing the germline DNA confirms that the Pgm domesticated transposase is required for the excision of all ~45,000 Internal Eliminated Sequences. Comparison of the germline DNA and unrearranged DNA obtained from PGM-silenced cells reveals that the latter does not provide a faithful representation of the germline genome. We developed a flow cytometry-based method to purify P. tetraurelia nuclei to high purity and provided quality control with flow cell imaging and high throughput DNA sequencing. We identified 61

  8. Losing identity: structural diversity of transposable elements belonging to different classes in the genome of Anopheles gambiae

    Directory of Open Access Journals (Sweden)

    Fernández-Medina Rita D

    2012-06-01

    Full Text Available Abstract Background Transposable elements (TEs, both DNA transposons and retrotransposons, are genetic elements with the main characteristic of being able to mobilize and amplify their own representation within genomes, utilizing different mechanisms of transposition. An almost universal feature of TEs in eukaryotic genomes is their inability to transpose by themselves, mainly as the result of sequence degeneration (by either mutations or deletions. Most of the elements are thus either inactive or non-autonomous. Considering that the bulk of some eukaryotic genomes derive from TEs, they have been conceived as “TE graveyards.” It has been shown that once an element has been inactivated, it progressively accumulates mutations and deletions at neutral rates until completely losing its identity or being lost from the host genome; however, it has also been shown that these “neutral sequences” might serve as raw material for domestication by host genomes. Results We have analyzed the sequence structural variations, nucleotide divergence, and pattern of insertions and deletions of several superfamilies of TEs belonging to both class I (long terminal repeats [LTRs] and non-LTRs [NLTRs] and II in the genome of Anopheles gambiae, aiming at describing the landscape of deterioration of these elements in this particular genome. Our results describe a great diversity in patterns of deterioration, indicating lineage-specific differences including the presence of Solo-LTRs in the LTR lineage, 5′-deleted NLTRs, and several non-autonomous and MITEs in the class II families. Interestingly, we found fragments of NLTRs corresponding to the RT domain, which preserves high identity among them, suggesting a possible remaining genomic role for these domains. Conclusions We show here that the TEs in the An. gambiae genome deteriorate in different ways according to the class to which they belong. This diversity certainly has implications not only at the host

  9. UPIN Group File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Group Unique Physician Identifier Number (UPIN) File is the business entity file that contains the group practice UPIN and descriptive information. It does NOT...

  10. Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani

    Directory of Open Access Journals (Sweden)

    Rahmad Hidayat

    2015-04-01

    Full Text Available Bit-Plane Complexity Segmentation (BPCS is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes contained in a bit-plane. If a bit-plane has a high complexity, the bi-plane is categorized as a noise bit-plane that does not contain valuable information on the image. Classification of the bit-plane using the set cripst set (noise/not is not fair, where a little difference of the value will significantly change the status of the bit-plane. The purpose of this study is to apply the principles of fuzzy sets to classify the bit-plane into three sets that are informative, partly informative, and the noise region. Classification of the bit-plane into a fuzzy set is expected to classify the bit-plane in a more objective approach and ultimately message capacity of the images can be improved by using the Mamdani fuzzy inference to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted. This research is able to increase the capability of BPCS steganography techniques to insert a message in bit-pane with more precise so that the container image quality would be better. It can be seen that the PSNR value of original image and stego-image is only slightly different.

  11. An electrically reprogrammable 1024 bits MNOS ROM using MNOS-SOS e/d technology

    International Nuclear Information System (INIS)

    Mackowiak, E.; Le Goascoz, V.

    1976-01-01

    A 1024 bits fully decoded electrically writable and erasable non volatile ROM is described. Memory cells and peripheral circuits are made using P channel silicon on sapphire enhancement depletion technology [fr

  12. A Novel Rate Control Scheme for Constant Bit Rate Video Streaming

    Directory of Open Access Journals (Sweden)

    Venkata Phani Kumar M

    2015-08-01

    Full Text Available In this paper, a novel rate control mechanism is proposed for constant bit rate video streaming. The initial quantization parameter used for encoding a video sequence is determined using the average spatio-temporal complexity of the sequence, its resolution and the target bit rate. Simple linear estimation models are then used to predict the number of bits that would be necessary to encode a frame for a given complexity and quantization parameter. The experimental results demonstrate that our proposed rate control mechanism significantly outperforms the existing rate control scheme in the Joint Model (JM reference software in terms of Peak Signal to Noise Ratio (PSNR and consistent perceptual visual quality while achieving the target bit rate. Furthermore, the proposed scheme is validated through implementation on a miniature test-bed.

  13. Bit and Power Loading Approach for Broadband Multi-Antenna OFDM System

    DEFF Research Database (Denmark)

    Rahman, Muhammad Imadur; Das, Suvra S.; Wang, Yuanye

    2007-01-01

    In this work, we have studied bit and power allocation strategies for multi-antenna assisted Orthogonal Frequency Division Multiplexing (OFDM) systems and investigated the impact of different rates of bit and power allocations on various multi-antenna diversity schemes. It is observed that, if we......). Otherwise, it is possible to use adaptive power distribution to save power, which can be used for other purposes, or to increase the throughput of the system by transmitting higher number of bits. We also observed that in some scenarios and in some system conditions, some form of simultaneous bit and power...... cannot find the exact Signal to Noise Ratio (SNR) thresholds due to different reasons, such as reduced Link Adaptation (LA) rate, Channel State Information (CSI) error, feedback delay etc., it is better to fix the transmit power across all sub-channels to guarantee the target Frame Error Rate (FER...

  14. Frame, bit and chip error rate evaluation for a DSSS communication system

    Directory of Open Access Journals (Sweden)

    F.R. Castillo–Soria

    2008-07-01

    Full Text Available The relation between chips, bits and frames error rates in the Additive White Gaussian Noise (AWGN channel for a Direct Sequence Spread Spectrum (DSSS system, in Multiple Access Interference (MAI conditions is evaluated. A simple error–correction code (ECC for the Frame Error Rate (FER evaluation is used. 64 bits (chips Pseudo Noise (PN sequences are employed for the spread spectrum transmission.An iterative Montecarlo (stochastic simulation is used to evaluate how many errors on chips are introduced for channel effects and how they are related to the bit errors. It can be observed how the bit errors may eventually cause a frame error, i. e. CODEC or communication error. These results are useful for academics, engineers, or professionals alike.

  15. Ultimate DWDM format in fiber-true bit-parallel solitons on WDM beams

    Science.gov (United States)

    Yeh, C.; Bergman, L. A.

    2000-01-01

    Whether true solitons can exist on WDM beams (and in what form) is a question that is generally unknown. This paper will discuss an answer to this question and a demonstration of the bit-parallel WDM transmission.

  16. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    International Nuclear Information System (INIS)

    Mendonca, Fabio Alencar; Ramos, Rubens Viana

    2008-01-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed

  17. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    Science.gov (United States)

    Mendonça, Fábio Alencar; Ramos, Rubens Viana

    2008-02-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed.

  18. Semifragile Speech Watermarking Based on Least Significant Bit Replacement of Line Spectral Frequencies

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Nematollahi

    2017-01-01

    Full Text Available There are various techniques for speech watermarking based on modifying the linear prediction coefficients (LPCs; however, the estimated and modified LPCs vary from each other even without attacks. Because line spectral frequency (LSF has less sensitivity to watermarking than LPC, watermark bits are embedded into the maximum number of LSFs by applying the least significant bit replacement (LSBR method. To reduce the differences between estimated and modified LPCs, a checking loop is added to minimize the watermark extraction error. Experimental results show that the proposed semifragile speech watermarking method can provide high imperceptibility and that any manipulation of the watermark signal destroys the watermark bits since manipulation changes it to a random stream of bits.

  19. FastBit: an efficient indexing technology for accelerating data-intensive science

    International Nuclear Information System (INIS)

    Wu Kesheng

    2005-01-01

    FastBit is a software tool for searching large read-only datasets. It organizes user data in a column-oriented structure which is efficient for on-line analytical processing (OLAP), and utilizes compressed bitmap indices to further speed up query processing. Analyses have proven the compressed bitmap index used in FastBit to be theoretically optimal for onedimensional queries. Compared with other optimal indexing methods, bitmap indices are superior because they can be efficiently combined to answer multi-dimensional queries whereas other optimal methods can not. In this paper, we first describe the searching capability of FastBit, then briefly highlight two applications that make extensive use of FastBit, namely Grid Collector and DEX

  20. FastBit: An Efficient Indexing Technology For AcceleratingData-Intensive Science

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng

    2005-06-27

    FastBit is a software tool for searching large read-only data sets. It organizes user data in a column-oriented structure which is efficient for on-line analytical processing (OLAP), and utilizes compressed bitmap indices to further speed up query processing. Analyses have proven the compressed bitmap index used in FastBit to be theoretically optimal for one-dimensional queries. Compared with other optimal indexing methods, bitmap indices are superior because they can be efficiently combined to answer multi-dimensional queries whereas other optimal methods cannot. In this paper, we first describe the searching capability of FastBit, then briefly highlight two applications that make extensive use of FastBit, namely Grid Collector and DEX.

  1. FastBit: an efficient indexing technology for accelerating data-intensive science

    Science.gov (United States)

    Wu, Kesheng

    2005-01-01

    FastBit is a software tool for searching large read-only datasets. It organizes user data in a column-oriented structure which is efficient for on-line analytical processing (OLAP), and utilizes compressed bitmap indices to further speed up query processing. Analyses have proven the compressed bitmap index used in FastBit to be theoretically optimal for onedimensional queries. Compared with other optimal indexing methods, bitmap indices are superior because they can be efficiently combined to answer multi-dimensional queries whereas other optimal methods can not. In this paper, we first describe the searching capability of FastBit, then briefly highlight two applications that make extensive use of FastBit, namely Grid Collector and DEX.

  2. 20GSps 6-bit Low-Power Rad-Tolerant ADC, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed project aims to develop a 20GSps 6-bit radiation hardened analog to digital converter (ADC) required for microwave radiometers being developed for space...

  3. 20GSps 6-bit Low-Power Rad-Tolerant ADC, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed project aims to develop a 20GSps 6-bit ADC required for microwave radiometers being developed for space and airborne earth sensing applications and...

  4. Improved method of generating bit reversed numbers for calculating fast fourier transform

    Digital Repository Service at National Institute of Oceanography (India)

    Suresh, T.

    Fast Fourier Transform (FFT) is an important tool required for signal processing in defence applications. This paper reports an improved method for generating bit reversed numbers needed in calculating FFT using radix-2. The refined algorithm takes...

  5. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  6. SOLAR TRACKER CERDAS DAN MURAH BERBASIS MIKROKONTROLER 8 BIT ATMega8535

    Directory of Open Access Journals (Sweden)

    I Wayan Sutaya

    2016-08-01

    Full Text Available prototipe produk solar tracker cerdas berbasis mikrokontroler AVR 8 bit. Solar tracker ini memasukkan filter digital IIR (Infinite Impulse Response pada bagian program. Memprogram filter ini membutuhkan perkalian 32 bit sedangkan prosesor yang tersedia pada mikrokontroler yang dipakai adalah 8 bit. Proses perkalian ini hanya bisa dilakukan pada mikrokontroler 8 bit dengan menggunakan bahasa assembly yang merupakan bahasa level hardware. Solar tracker cerdas yang menggunakan mikrokontroler 8 bit sebagai otak utama pada penelitian ini menjadikan produk ini berbiaya rendah. Pengujian yang dilakukan menunjukkan bahwa solar tracker cerdas dibandingkan dengan solar tracker biasa mempunyai perbedaan konsumsi daya baterai yang sangat signifikan yaitu terjadi penghematan sebesar 85 %. Besar penghematan konsumsi daya ini tentunya bukan sebuah angka konstan melainkan tergantung seberapa besar noise yang dikenakan pada alat solar tracker. Untuk sebuah perlakuan yang sama, maka semakin besar noise semakin besar pula perbedaan penghematan konsumsi daya pada solar tracker yang cerdas. Kata-kata kunci: solar tracker, filter digital, mikrokontroler 8 bit, konsumsi daya Abstract This research had made a prototype of smart solar tracker product based on microcontroller AVR 8 bit. The solar tracker used digital filter IIR (Infinite Impulse Response on its software. Filter programming needs 32 bit multiplication but the processor inside of the microcontroller that used in this research is 8 bit. This multiplication is only can be solved on microcontroller 8 bit by using assembly language in programming. The language is a hardware level language. The smart solar tracker using the microcontroller 8 bit as a main brain in this research made the product had a low cost. The test results show that the comparison in saving of baterai power consumption between the smart solar tracker and the normal one is 85 %. The percentage of the saving indubitably is not a constant

  7. HIGH-POWER TURBODRILL AND DRILL BIT FOR DRILLING WITH COILED TUBING

    Energy Technology Data Exchange (ETDEWEB)

    Robert Radtke; David Glowka; Man Mohan Rai; David Conroy; Tim Beaton; Rocky Seale; Joseph Hanna; Smith Neyrfor; Homer Robertson

    2008-03-31

    Commercial introduction of Microhole Technology to the gas and oil drilling industry requires an effective downhole drive mechanism which operates efficiently at relatively high RPM and low bit weight for delivering efficient power to the special high RPM drill bit for ensuring both high penetration rate and long bit life. This project entails developing and testing a more efficient 2-7/8 in. diameter Turbodrill and a novel 4-1/8 in. diameter drill bit for drilling with coiled tubing. The high-power Turbodrill were developed to deliver efficient power, and the more durable drill bit employed high-temperature cutters that can more effectively drill hard and abrasive rock. This project teams Schlumberger Smith Neyrfor and Smith Bits, and NASA AMES Research Center with Technology International, Inc (TII), to deliver a downhole, hydraulically-driven power unit, matched with a custom drill bit designed to drill 4-1/8 in. boreholes with a purpose-built coiled tubing rig. The U.S. Department of Energy National Energy Technology Laboratory has funded Technology International Inc. Houston, Texas to develop a higher power Turbodrill and drill bit for use in drilling with a coiled tubing unit. This project entails developing and testing an effective downhole drive mechanism and a novel drill bit for drilling 'microholes' with coiled tubing. The new higher power Turbodrill is shorter, delivers power more efficiently, operates at relatively high revolutions per minute, and requires low weight on bit. The more durable thermally stable diamond drill bit employs high-temperature TSP (thermally stable) diamond cutters that can more effectively drill hard and abrasive rock. Expectations are that widespread adoption of microhole technology could spawn a wave of 'infill development' drilling of wells spaced between existing wells, which could tap potentially billions of barrels of bypassed oil at shallow depths in mature producing areas. At the same time, microhole

  8. Design and Demonstration of a 30 GHz 16-bit Superconductor RSFQ Microprocessor

    Science.gov (United States)

    2015-03-10

    for Public Release; Distribution Unlimited Final Report: Design and Demonstration of a 30 GHz 16-bit Superconductor RSFQ Microprocessor The views...P.O. Box 12211 Research Triangle Park, NC 27709-2211 Superconductor technology, RSFQ, RQL, processor design, arithmetic units, high-performance...Demonstration of a 30 GHz 16-bit Superconductor RSFQ Microprocessor Report Title The major objective of the project was to design and demonstrate operation

  9. DOA Parameter Estimation with 1-bit Quantization - Bounds, Methods and the Exponential Replacement

    OpenAIRE

    Stein, Manuel; Barbé, Kurt; Nossek, Josef A.

    2016-01-01

    While 1-bit analog-to-digital conversion (ADC) allows to significantly reduce the analog complexity of wireless receive systems, using the exact likelihood function of the hard-limiting system model in order to obtain efficient algorithms in the digital domain can make 1-bit signal processing challenging. If the signal model before the quantizer consists of correlated Gaussian random variables, the tail probability for a multivariate Gaussian distribution with N dimensions (general orthant pr...

  10. A 1 GHz sample rate, 256-channel, 1-bit quantization, CMOS, digital correlator chip

    Science.gov (United States)

    Timoc, C.; Tran, T.; Wongso, J.

    1992-01-01

    This paper describes the development of a digital correlator chip with the following features: 1 Giga-sample/second; 256 channels; 1-bit quantization; 32-bit counters providing up to 4 seconds integration time at 1 GHz; and very low power dissipation per channel. The improvements in the performance-to-cost ratio of the digital correlator chip are achieved with a combination of systolic architecture, novel pipelined differential logic circuits, and standard 1.0 micron CMOS process.

  11. Re-use of Low Bandwidth Equipment for High Bit Rate Transmission Using Signal Slicing Technique

    DEFF Research Database (Denmark)

    Wagner, Christoph; Spolitis, S.; Vegas Olmos, Juan José

    : Massive fiber-to-the-home network deployment requires never ending equipment upgrades operating at higher bandwidth. We show effective signal slicing method, which can reuse low bandwidth opto-electronical components for optical communications at higher bit rates.......: Massive fiber-to-the-home network deployment requires never ending equipment upgrades operating at higher bandwidth. We show effective signal slicing method, which can reuse low bandwidth opto-electronical components for optical communications at higher bit rates....

  12. Support research for development of improved geothermal drill bits. Annual report

    Energy Technology Data Exchange (ETDEWEB)

    hendrickson, R.R.; Barker, L.M.; Green, S.J.; Winzenried, R.W.

    1977-06-01

    A full-scale geothermal wellbore simulator and geothermal seal testing machine were constructed. The major emphasis in the Phase II program, in addition to constructing the above research simulators, includes: simulated tests on full-scale components, i.e., full-scale bits; screening tests on elastomeric seals under geothermal conditions; and initial considerations of research needs for development of sealed high-temperature bits. A detailed discussion of the work is presented. (MHR)

  13. Implementasi Kriptografi Algoritma Elgamal Dengan Steganografi Teknik Least Significant Bit (LSB) Berdasarkan Penyisipan Menggunakan Fungsi Linier

    OpenAIRE

    Nasution, Lidya Andiny

    2014-01-01

    Confidentiality of messages or data is owned by a person is an important thing. Safeguarding of confidentiality of the message can use a security message like Cryptography and steganography. This research used ElGamal algorithms for cryptographic and Least Significant Bit (LSB) techniques for Steganography. ElGamal algorithm use fermat's little theorem for checking prime numbers are used. Techniques least significant bit (LSB) of Steganography using a linear function to determine the location...

  14. Euclidean Geometry Codes, minimum weight words and decodable error-patterns using bit-flipping

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn; Jonsson, Bergtor

    2005-01-01

    We determine the number of minimum wigth words in a class of Euclidean Geometry codes and link the performance of the bit-flipping decoding algorithm to the geometry of the error patterns.......We determine the number of minimum wigth words in a class of Euclidean Geometry codes and link the performance of the bit-flipping decoding algorithm to the geometry of the error patterns....

  15. Increasing the bit rate in OCDMA systems using pulse position modulation techniques.

    Science.gov (United States)

    Arbab, Vahid R; Saghari, Poorya; Haghi, Mahta; Ebrahimi, Paniz; Willner, Alan E

    2007-09-17

    We have experimentally demonstrated two novel pulse position modulation techniques, namely Double Pulse Position Modulation (2-PPM) and Differential Pulse Position Modulation (DPPM) in Time-Wavelength OCDMA systems that will operate at a higher bit rate compared to traditional OOK-OCDMA systems with the same bandwidth. With 2-PPM technique, the number of active users will be more than DPPM while their bit rate is almost the same. Both techniques provide variable quality of service in OCDMA networks.

  16. Text File Comparator

    Science.gov (United States)

    Kotler, R. S.

    1983-01-01

    File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.

  17. Error Correcting Coding of Telemetry Information for Channel with Random Bit Inversions and Deletions

    Directory of Open Access Journals (Sweden)

    M. A. Elshafey

    2014-01-01

    Full Text Available This paper presents a method of error-correcting coding of digital information. Feature of this method is the treatment of cases of inversion and skip bits caused by a violation of the synchronization of the receiving and transmitting device or other factors. The article gives a brief overview of the features, characteristics, and modern methods of construction LDPC and convolutional codes, as well as considers a general model of the communication channel, taking into account the probability of bits inversion, deletion and insertion. The proposed coding scheme is based on a combination of LDPC coding and convolution coding. A comparative analysis of the proposed combined coding scheme and a coding scheme containing only LDPC coder is performed. Both of the two schemes have the same coding rate. Experiments were carried out on two models of communication channels at different probability values of bit inversion and deletion. The first model allows only random bit inversion, while the other allows both random bit inversion and deletion. In the experiments research and analysis of the delay decoding of convolutional coder is performed and the results of these experimental studies demonstrate the feasibility of planted coding scheme to improve the efficiency of data recovery that is transmitted over a communication channel with noises which allow random bit inversion and deletion without decreasing the coding rate.

  18. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  19. Tb/s physical random bit generation with bandwidth-enhanced chaos in three-cascaded semiconductor lasers.

    Science.gov (United States)

    Sakuraba, Ryohsuke; Iwakawa, Kento; Kanno, Kazutaka; Uchida, Atsushi

    2015-01-26

    We experimentally demonstrate fast physical random bit generation from bandwidth-enhanced chaos by using three-cascaded semiconductor lasers. The bandwidth-enhanced chaos is obtained with the standard bandwidth of 35.2 GHz, the effective bandwidth of 26.0 GHz and the flatness of 5.6 dB, whose waveform is used for random bit generation. Two schemes of single-bit and multi-bit extraction methods for random bit generation are carried out to evaluate the entropy rate and the maximum random bit generation rate. For single-bit generation, the generation rate at 20 Gb/s is obtained for physical random bit sequences. For multi-bit generation, the maximum generation rate at 1.2 Tb/s ( = 100 GS/s × 6 bits × 2 data) is equivalently achieved for physical random bit sequences whose randomness is verified by using both NIST Special Publication 800-22 and TestU01.

  20. Estimation of entropy rate in a fast physical random-bit generator using a chaotic semiconductor laser with intrinsic noise.

    Science.gov (United States)

    Mikami, Takuya; Kanno, Kazutaka; Aoyama, Kota; Uchida, Atsushi; Ikeguchi, Tohru; Harayama, Takahisa; Sunada, Satoshi; Arai, Ken-ichi; Yoshimura, Kazuyuki; Davis, Peter

    2012-01-01

    We analyze the time for growth of bit entropy when generating nondeterministic bits using a chaotic semiconductor laser model. The mechanism for generating nondeterministic bits is modeled as a 1-bit sampling of the intensity of light output. Microscopic noise results in an ensemble of trajectories whose bit entropy increases with time. The time for the growth of bit entropy, called the memory time, depends on both noise strength and laser dynamics. It is shown that the average memory time decreases logarithmically with increase in noise strength. It is argued that the ratio of change in average memory time with change in logarithm of noise strength can be used to estimate the intrinsic dynamical entropy rate for this method of random bit generation. It is also shown that in this model the entropy rate corresponds to the maximum Lyapunov exponent.

  1. Kepler Data Validation Time Series File: Description of File Format and Content

    Science.gov (United States)

    Mullally, Susan E.

    2016-01-01

    The Kepler space mission searches its time series data for periodic, transit-like signatures. The ephemerides of these events, called Threshold Crossing Events (TCEs), are reported in the TCE tables at the NASA Exoplanet Archive (NExScI). Those TCEs are then further evaluated to create planet candidates and populate the Kepler Objects of Interest (KOI) table, also hosted at the Exoplanet Archive. The search, evaluation and export of TCEs is performed by two pipeline modules, TPS (Transit Planet Search) and DV (Data Validation). TPS searches for the strongest, believable signal and then sends that information to DV to fit a transit model, compute various statistics, and remove the transit events so that the light curve can be searched for other TCEs. More on how this search is done and on the creation of the TCE table can be found in Tenenbaum et al. (2012), Seader et al. (2015), Jenkins (2002). For each star with at least one TCE, the pipeline exports a file that contains the light curves used by TPS and DV to find and evaluate the TCE(s). This document describes the content of these DV time series files, and this introduction provides a bit of context for how the data in these files are used by the pipeline.

  2. Implementasi Kombinasi Tiny Encryption Algorithm (TEA) Dan Algoritma Least Significant Bit(LSB)Untuk Keamanan File Text

    OpenAIRE

    Maharani, Helen Sri

    2015-01-01

    The easier of media communication brings the effect toward the pacificate information that use in media communication as extendence information tobe easier to known taken or even manipulated, and mesused by other side that not deserve. To handle many problems of robbing toward data or user information by unauthorized people, then develops some pacification techniques of data. One of it is cryptography. In cryptography, data will be encrypted so it can not be read and understood by others, but...

  3. The bit slice micro-processor 'GESPRO' as a project in the UA2 experiment

    CERN Document Server

    Becam, C; Delanghe, J; Fest, H M; Lecoq, J; Martin, H; Mencik, M; MerkeI, B; Meyer, J M; Perrin, M; Plothow, H; Rampazzo, J P; Schittly, A

    1981-01-01

    The bit slice micro-processor GESPRO is a CAMAC module plugged into a standard Elliot system crate via which it communicates as a slave with its host computer. It has full control of CAMAC as a master unit. GESPRO is a 24 bit machine with multi-mode memory addressing capacity of 64K words. The micro-processor structure uses 5 buses including pipe-line registers to mask access time and 16 interrupt levels. The micro-program memory capacity is 2K (RAM) words of 48 bits each. A special hardwired module allows floating point, as well as integer, multiplication of 24*24 bits, result in 48 bits, in about 200 ns. This micro-processor could be used in the UA2 data acquisition chain and trigger system for the following tasks: (a) online data reduction, i.e. to read DURANDAL, process the information resulting in accepting or rejecting the event; (b) readout and analysis of the accepted data; (c) preprocess the data. The UA2 version of GESPRO is under construction, programs and micro-programs are under development. Hard...

  4. ParBiBit: Parallel tool for binary biclustering on modern distributed-memory systems.

    Science.gov (United States)

    González-Domínguez, Jorge; Expósito, Roberto R

    2018-01-01

    Biclustering techniques are gaining attention in the analysis of large-scale datasets as they identify two-dimensional submatrices where both rows and columns are correlated. In this work we present ParBiBit, a parallel tool to accelerate the search of interesting biclusters on binary datasets, which are very popular on different fields such as genetics, marketing or text mining. It is based on the state-of-the-art sequential Java tool BiBit, which has been proved accurate by several studies, especially on scenarios that result on many large biclusters. ParBiBit uses the same methodology as BiBit (grouping the binary information into patterns) and provides the same results. Nevertheless, our tool significantly improves performance thanks to an efficient implementation based on C++11 that includes support for threads and MPI processes in order to exploit the compute capabilities of modern distributed-memory systems, which provide several multicore CPU nodes interconnected through a network. Our performance evaluation with 18 representative input datasets on two different eight-node systems shows that our tool is significantly faster than the original BiBit. Source code in C++ and MPI running on Linux systems as well as a reference manual are available at https://sourceforge.net/projects/parbibit/.

  5. The bit slice micro-processor 'GESPRO' as a project in the UA2 experiment

    International Nuclear Information System (INIS)

    Becam, C.; Bernaudin, P.; Delanghe, J.; Mencik, M.; Merkel, B.; Plothow, H.; Fest, H.M.; Lecoq, J.; Martin, H.; Meyer, J.M.

    1981-01-01

    The bit slice micro-processor GESPRO, as it is proposed for use in the UA 2 data acquisition chain and trigger system, is a CAMAC module plugged into a standard Elliott System crate via which it communicates as a slave with its host computer (ND, DEC). It has full control of CAMAC as a master unit. GESPRO is a 24 bit machine (150 ns effective cycle time) with multi-mode memory addressing capacity of 64 K words. The micro-processor structure uses 5 busses including pipe-line registers to mask access time and 16 interrupt levels. The micro-program memory capacity is 2 K (RAM) words of 48 bits each. A special hardwired module allows floating point (as well as integer) multiplication of 24 x 24 bits, result in 48 bits, in about 200 ns. This micro-processor could be used in the UA2 data acquisition chain and trigger system for the following tasks: a) online data reduction, i.e. to read DURANDAL (fast ADC's = the hardware trigger in the experiment), process the information (effective mass calculation, etc.) resulting in accepting or rejecting the event. b) read out and analysis of the accepted data (collect statistical information). c) preprocess the data (calculation of pointers, address decoding, etc.). The UA2 version of GESPRO is under construction, programs and micro-programs are under development. Hardware and software will be tested with simulated data. First results are expected in about one year from now. (orig.)

  6. A 12-bit 1-MS/s 26-μW SAR ADC for Sensor Applications

    Science.gov (United States)

    Chung, Yung-Hui; Yen, Chia-Wei; Tsai, Cheng-Hsun

    2018-01-01

    This chapter presents an energy-efficient 12-bit 1-MS/s successive approximation register analog-to-digital converter (ADC) for sensor applications. A programmable dynamic comparator is proposed to suppress static current and maintain good linearity. A hybrid charge redistribution digital-to-analog converter is proposed to decrease the total capacitance, which would reduce the power consumption of the input and reference buffers. In the proposed ADC, its total input capacitance is only 700 fF, which greatly reduces the total power consumption of the analog frontend circuits. The 12-bit ADC is fabricated using 0.18-μm complementary metal-oxidesemiconductor technology, and it consumes only 26 μW from a 1 V supply at 1-MS/s. The measured signal-to-noise-and-distortion ratio (SNDR) and spurious-free dynamic range (SFDR) are 60.1 and 72.6 dB, respectively. The measured effective number of bits (ENOB) for a 100 kHz input frequency is 9.7 bits. At the Nyquist input frequency, the measured SNDR and SFDR are 59.7 and 71 dB, respectively. The ENOB is maintained at 9.6 bits and the figure-of-merit is 33.5 fJ/conversion-step.

  7. A Self-adaptive Bit-level Color Image Encryption Algorithm Based on Generalized Arnold Map

    Directory of Open Access Journals (Sweden)

    Ye Rui-Song

    2017-01-01

    Full Text Available A self-adaptive bit-level color image encryption algorithm based on generalized Arnold map is proposed. The red, green, blue components of the plain-image with height H and width W are decomposed into 8-bit planes and one three-dimensional bit matrix with size ze H×W×24 is obtained. The generalized Arnold map is used to generate pseudo-random sequences to scramble the resulted three-dimensional bit matrix by sort-based approach. The scrambled 3D bit matrix is then rearranged to be one scrambled color image. Chaotic sequences produced by another generalized Arnold map are used to diffuse the resulted red, green, blue components in a cross way to get more encryption effects. Self-adaptive strategy is adopted in both the scrambling stage and diffusion stage, meaning that the key streams are all related to the content of the plain-image and therefore the encryption algorithm show strong robustness against known/chosen plaintext attacks. Some other performances are carried out, including key space, key sensitivity, histogram, correlation coefficients between adjacent pixels, information entropy and difference attack analysis, etc. All the experimental results show that the proposed image encryption algorithm is secure and effective for practical application.

  8. Inter-track interference mitigation with two-dimensional variable equalizer for bit patterned media recording

    Directory of Open Access Journals (Sweden)

    Yao Wang

    2017-05-01

    Full Text Available The increased track density in bit patterned media recording (BPMR causes increased inter-track interference (ITI, which degrades the bit error rate (BER performance. In order to mitigate the effect of the ITI, signals from multiple tracks can be equalized by a 2D equalizer with 1D target. Usually, the 2D fixed equalizer coefficients are obtained by using a pseudo-random bit sequence (PRBS for training. In this study, a 2D variable equalizer is proposed, where various sets of 2D equalizer coefficients are predetermined and stored for different ITI patterns besides the usual PRBS training. For data detection, as the ITI patterns are unknown in the first global iteration, the main and adjacent tracks are equalized with the conventional 2D fixed equalizer, detected with Bahl-Cocke-Jelinek-Raviv (BCJR detector and decoded with low-density parity-check (LDPC decoder. Then using the estimated bit information from main and adjacent tracks, the ITI pattern for each island of the main track can be estimated and the corresponding 2D variable equalizers are used to better equalize the bits on the main track. This process is executed iteratively by feeding back the main track information. Simulation results indicate that for both single-track and two-track detection, the proposed 2D variable equalizer can achieve better BER and frame error rate (FER compared to that with the 2D fixed equalizer.

  9. Video steganography based on bit-plane decomposition of wavelet-transformed video

    Science.gov (United States)

    Noda, Hideki; Furuta, Tomofumi; Niimi, Michiharu; Kawaguchi, Eiji

    2004-06-01

    This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. BPCS steganography makes use of bit-plane decomposition and the characteristics of the human vision system, where noise-like regions in bit-planes of a dummy image are replaced with secret data without deteriorating image quality. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. In 3-D SPIHT-BPCS steganography, embedding rates of around 28% of the compressed video size are achieved for twelve bit representation of wavelet coefficients with no noticeable degradation in video quality.

  10. A 9-Bit 50 MSPS Quadrature Parallel Pipeline ADC for Communication Receiver Application

    Science.gov (United States)

    Roy, Sounak; Banerjee, Swapna

    2018-03-01

    This paper presents the design and implementation of a pipeline Analog-to-Digital Converter (ADC) for superheterodyne receiver application. Several enhancement techniques have been applied in implementing the ADC, in order to relax the target specifications of its building blocks. The concepts of time interleaving and double sampling have been used simultaneously to enhance the sampling speed and to reduce the number of amplifiers used in the ADC. Removal of a front end sample-and-hold amplifier is possible by employing dynamic comparators with switched capacitor based comparison of input signal and reference voltage. Each module of the ADC comprises two 2.5-bit stages followed by two 1.5-bit stages and a 3-bit flash stage. Four such pipeline ADC modules are time interleaved using two pairs of non-overlapping clock signals. These two pairs of clock signals are in phase quadrature with each other. Hence the term quadrature parallel pipeline ADC has been used. These configurations ensure that the entire ADC contains only eight operational-trans-conductance amplifiers. The ADC is implemented in a 0.18-μm CMOS process and supply voltage of 1.8 V. The proto-type is tested at sampling frequencies of 50 and 75 MSPS producing an Effective Number of Bits (ENOB) of 6.86- and 6.11-bits respectively. At peak sampling speed, the core ADC consumes only 65 mW of power.

  11. Corrected multiple upsets and bit reversals for improved 1-s resolution measurements

    International Nuclear Information System (INIS)

    Brucker, G.J.; Stassinopoulos, E.G.; Stauffer, C.A.

    1994-01-01

    Previous work has studied the generation of single and multiple errors in control and irradiated static RAM samples (Harris 6504RH) which were exposed to heavy ions for relatively long intervals of time (minute), and read out only after the beam was shut off. The present investigation involved storing 4k x 1 bit maps every second during 1 min ion exposures at low flux rates of 10 3 ions/cm 2 -s in order to reduce the chance of two sequential ions upsetting adjacent bits. The data were analyzed for the presence of adjacent upset bit locations in the physical memory plane, which were previously defined to constitute multiple upsets. Improvement in the time resolution of these measurements has provided more accurate estimates of multiple upsets. The results indicate that the percentage of multiples decreased from a high of 17% in the previous experiment to less than 1% for this new experimental technique. Consecutive double and triple upsets (reversals of bits) were detected. These were caused by sequential ions hitting the same bit, with one or two reversals of state occurring in a 1-min run. In addition to these results, a status review for these same parts covering 3.5 years of imprint damage recovery is also presented

  12. Bounds on Minimum Energy per Bit for Optical Wireless Relay Channels

    Directory of Open Access Journals (Sweden)

    A. D. Raza

    2014-09-01

    Full Text Available An optical wireless relay channel (OWRC is the classical three node network consisting of source, re- lay and destination nodes with optical wireless connectivity. The channel law is assumed Gaussian. This paper studies the bounds on minimum energy per bit required for reliable communication over an OWRC. It is shown that capacity of an OWRC is concave and energy per bit is monotonically increasing in square of the peak optical signal power, and consequently the minimum energy per bit is inversely pro- portional to the square root of asymptotic capacity at low signal to noise ratio. This has been used to develop upper and lower bound on energy per bit as a function of peak signal power, mean to peak power ratio, and variance of channel noise. The upper and lower bounds on minimum energy per bit derived in this paper correspond respectively to the decode and forward lower bound and the min-max cut upper bound on OWRC capacity

  13. Adaptation in Drosophila melanogaster Natural Populations. Fitness Effects and Evolutionary History of a Natural Insertion and Molecular Effects of Several Transposable Elements on Immune-Related Genes

    OpenAIRE

    Ullastres i Coll, Anna

    2017-01-01

    [eng] A major challenge of modern Biology is elucidating the genetic basis of adaptation. While there are many SNP-based studies trying to elucidate the genetic basis of genotype-phenotype relationships, the role of transposable element (TE)-induced mutations is understudied. Recent evidences demonstrate that TEs are a powerful tool to identify the genetic basis of adaptive phenotypic traits. Drosophila melanogaster is a good model to study adaptation because it is original from subtropical ...

  14. Functional Anatomy of Recognition of Chinese Multi-Character Words: Convergent Evidence from Effects of Transposable Nonwords, Lexicality, and Word Frequency.

    Science.gov (United States)

    Lin, Nan; Yu, Xi; Zhao, Ying; Zhang, Mingxia

    2016-01-01

    This fMRI study aimed to identify the neural mechanisms underlying the recognition of Chinese multi-character words by partialling out the confounding effect of reaction time (RT). For this purpose, a special type of nonword-transposable nonword-was created by reversing the character orders of real words. These nonwords were included in a lexical decision task along with regular (non-transposable) nonwords and real words. Through conjunction analysis on the contrasts of transposable nonwords versus regular nonwords and words versus regular nonwords, the confounding effect of RT was eliminated, and the regions involved in word recognition were reliably identified. The word-frequency effect was also examined in emerged regions to further assess their functional roles in word processing. Results showed significant conjunctional effect and positive word-frequency effect in the bilateral inferior parietal lobules and posterior cingulate cortex, whereas only conjunctional effect was found in the anterior cingulate cortex. The roles of these brain regions in recognition of Chinese multi-character words were discussed.

  15. High-throughput sequencing of transposable element insertions suggests adaptive evolution of the invasive Asian tiger mosquito towards temperate environments.

    Science.gov (United States)

    Goubert, Clement; Henri, Helene; Minard, Guillaume; Valiente Moro, Claire; Mavingui, Patrick; Vieira, Cristina; Boulesteix, Matthieu

    2017-08-01

    Invasive species represent unique opportunities to evaluate the role of local adaptation during colonization of new environments. Among these species, the Asian tiger mosquito, Aedes albopictus, is a threatening vector of several human viral diseases, including dengue and chikungunya, and raises concerns about the Zika fever. Its broad presence in both temperate and tropical environments has been considered the reflection of great "ecological plasticity." However, no study has been conducted to assess the role of adaptive evolution in the ecological success of Ae. albopictus at the molecular level. In the present study, we performed a genomic scan to search for potential signatures of selection leading to local adaptation in one-hundred-forty field-collected mosquitoes from native populations of Vietnam and temperate invasive populations of Europe. High-throughput genotyping of transposable element insertions led to the discovery of more than 120,000 polymorphic loci, which, in their great majority, revealed a virtual absence of structure between the biogeographic areas. Nevertheless, 92 outlier loci showed a high level of differentiation between temperate and tropical populations. The majority of these loci segregate at high insertion frequencies among European populations, indicating that this pattern could have been caused by recent adaptive evolution events in temperate areas. An analysis of the overlapping and neighbouring genes highlighted several candidates, including diapause, lipid and juvenile hormone pathways. © 2017 John Wiley & Sons Ltd.

  16. The Queensland fruit fly, Bactrocera tryoni, contains multiple members of the hAT family of transposable elements.

    Science.gov (United States)

    Pinkerton, A C; Whyard, S; Mende, H A; Coates, C J; O'Brochta, D A; Atkinson, P W

    1999-11-01

    Members of the hAT transposable element family are mobile in non-host insect species and have been used as transformation vectors in some of these species. We report that the Queensland fruit fly, Bactrocera tryoni, contains at least two types of insect hAT elements called Homer and a Homer-like element (HLE). The Homer element is 3789 bp in size and contains 12-bp imperfect inverted terminal repeats. The Homer element contains a long open reading frame (ORF) that encodes a putative transposase. Three different copies of this long ORF were recovered from the B. tryoni genome and, upon transcription and translation in an in vitro system, all produced transposase. The HLE is an incomplete element since no 3' inverted terminal repeat (ITR) was found. Homer and the HLE are as related to one another as either is to the other insect hAT elements such as Hermes, hobo, hermit and hopper. The structure and distribution of these two Homer elements is described.

  17. DNA topoisomerase 1α promotes transcriptional silencing of transposable elements through DNA methylation and histone lysine 9 dimethylation in Arabidopsis.

    Directory of Open Access Journals (Sweden)

    Thanh Theresa Dinh

    2014-07-01

    Full Text Available RNA-directed DNA methylation (RdDM and histone H3 lysine 9 dimethylation (H3K9me2 are related transcriptional silencing mechanisms that target transposable elements (TEs and repeats to maintain genome stability in plants. RdDM is mediated by small and long noncoding RNAs produced by the plant-specific RNA polymerases Pol IV and Pol V, respectively. Through a chemical genetics screen with a luciferase-based DNA methylation reporter, LUCL, we found that camptothecin, a compound with anti-cancer properties that targets DNA topoisomerase 1α (TOP1α was able to de-repress LUCL by reducing its DNA methylation and H3K9me2 levels. Further studies with Arabidopsis top1α mutants showed that TOP1α silences endogenous RdDM loci by facilitating the production of Pol V-dependent long non-coding RNAs, AGONAUTE4 recruitment and H3K9me2 deposition at TEs and repeats. This study assigned a new role in epigenetic silencing to an enzyme that affects DNA topology.

  18. Interdisciplinary treatment of a patient with bilateral cleft lip and palate and congenitally missing and transposed teeth.

    Science.gov (United States)

    Germec-Cakan, Derya; Canter, Halil Ibrahim; Cakan, Umut; Demir, Becen

    2014-03-01

    The comprehensive treatment of a patient with cleft lip and palate requires an interdisciplinary approach for functional and esthetic outcomes. A 20-year-old woman with bilateral cleft lip and palate had a chief complaint of unesthetic appearance of her teeth and the presence of oronasal fistulae. Her clinical and radiographic evaluation showed a dolichofacial growth pattern, a Class II skeletal relationship with retroclined maxillary central incisors, 5 mm of negative overjet, maxillary constriction, maxillary and mandibular crowding, congenitally missing maxillary right incisors and left lateral incisor, and a transposed maxillary left canine. Her treatment plan included the extraction of 3 premolars, maxillary expansion, segmental maxillary osteotomy, repair of the oronasal fistulae, rhinoplasty, periodontal surgery, and prosthodontic rehabilitation. To obtain a better occlusion and reduce the dimensions of the fistulae, orthognathic surgery comprising linear and rotational movements of the maxillary segments (premaxilla, right and left maxillary alveolar segments) in all 3 axes was planned by performing 3-dimensional virtual surgery on 3-dimensional computerized tomography. At the end of the interdisciplinary treatment, a functional occlusion, a harmonious profile, and patient satisfaction were achieved. Posttreatment records after 1 year showed stable results. Copyright © 2014 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  19. Expression of Pseudomonas aeruginosa transposable phages in Pseudomonas putida cells. I. Establishment of lysogeny and lytic growth efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Gorbunova, S.A.; Yanenko, A.S.; Akhverdyan, V.Z.; Reulets, M.A.; Krylov, V.N.

    1986-03-01

    Expression of the genomes of Pseudomonas aeruginosa transposable phages (TP) in the cells of a heterologous host, P. putida PpGl, was studied. A high efficiency of TP lytic growth in PpGl cells was obtained both after zygotic induction following RP4::TP plasmid transfer and after thermoinduction of PpGl cells lysogenic for thermoinducible prophage D3112cts15. Characteristic for PpGl cells was a high TP yield (20-25 phage D3112cts15 particles per cell), which was evidence of a high level of TP transposition in cells of this species. The frequency of RP4::TP transfer into PpGl and PA01 cells was equal, but the lysogeny detection rat was somewhat lower in PpGl. Pseudomonas aeruginosa TP can integrate into the PpGl chromosome, producing inducible lysogens. The presence of RP4 is not necessary for the expression of the TP genome in PpGl cells. The D3112cts15 TP may be used for interspecific transduction of plasmids and chromosomal markers.

  20. Heterochromatin and molecular characterization of DsmarMITE transposable element in the beetle Dichotomius schiffleri (Coleoptera: Scarabaeidae).

    Science.gov (United States)

    Xavier, Crislaine; Cabral-de-Mello, Diogo Cavalcanti; de Moura, Rita Cássia

    2014-12-01

    Cytogenetic studies of the Neotropical beetle genus Dichotomius (Scarabaeinae, Coleoptera) have shown dynamism for centromeric constitutive heterochromatin sequences. In the present work we studied the chromosomes and isolated repetitive sequences of Dichotomius schiffleri aiming to contribute to the understanding of coleopteran genome/chromosomal organization. Dichotomius schiffleri presented a conserved karyotype and heterochromatin distribution in comparison to other species of the genus with 2n = 18, biarmed chromosomes, and pericentromeric C-positive blocks. Similarly to heterochromatin distributional patterns, the highly and moderately repetitive DNA fraction (C 0 t-1 DNA) was detected in pericentromeric areas, contrasting with the euchromatic mapping of an isolated TE (named DsmarMITE). After structural analyses, the DsmarMITE was classified as a non-autonomous element of the type miniature inverted-repeat transposable element (MITE) with terminal inverted repeats similar to Mariner elements of insects from different orders. The euchromatic distribution for DsmarMITE indicates that it does not play a part in the dynamics of constitutive heterochromatin sequences.

  1. Expression of Pseudomonas aeruginosa transposable phages in Pseudomonas putida cells. I. Establishment of lysogeny and lytic growth efficiency

    International Nuclear Information System (INIS)

    Gorbunova, S.A.; Yanenko, A.S.; Akhverdyan, V.Z.; Reulets, M.A.; Krylov, V.N.

    1986-01-01

    Expression of the genomes of Pseudomonas aeruginosa transposable phages (TP) in the cells of a heterologous host, P. putida PpGl, was studied. A high efficiency of TP lytic growth in PpGl cells was obtained both after zygotic induction following RP4::TP plasmid transfer and after thermoinduction of PpGl cells lysogenic for thermoinducible prophage D3112cts15. Characteristic for PpGl cells was a high TP yield (20-25 phage D3112cts15 particles per cell), which was evidence of a high level of TP transposition in cells of this species. The frequency of RP4::TP transfer into PpGl and PA01 cells was equal, but the lysogeny detection rat was somewhat lower in PpGl. Pseudomonas aeruginosa TP can integrate into the PpGl chromosome, producing inducible lysogens. The presence of RP4 is not necessary for the expression of the TP genome in PpGl cells. The D3112cts15 TP may be used for interspecific transduction of plasmids and chromosomal markers

  2. Do Morphemes Matter when Reading Compound Words with Transposed Letters? Evidence from Eye-Tracking and Event-Related Potentials

    Science.gov (United States)

    Stites, Mallory C.; Federmeier, Kara D.; Christianson, Kiel

    2017-01-01

    The current study investigates the online processing consequences of encountering compound words with transposed letters (TLs), to determine if TLs that cross morpheme boundaries are more disruptive to reading than those within a single morpheme, as would be predicted by accounts of obligatory morpho-orthopgrahic decomposition. Two measures of online processing, eye movements and event-related potentials (ERPs), were collected in separate experiments. Participants read sentences containing correctly spelled compound words (cupcake), or compounds with TLs occurring either across morpheme boundaries (cucpake) or within one morpheme (cupacke). Results showed that between- and within-morpheme transpositions produced equal processing costs in both measures, in the form of longer reading times (Experiment 1) and a late posterior positivity (Experiment 2) that did not differ between conditions. Findings converge to suggest that within- and between-morpheme TLs are equally disruptive to recognition, providing evidence against obligatory morpho-orthographic processing and in favor of whole-word access of English compound words during sentence reading. PMID:28791313

  3. Rapid Increase in Genome Size as a Consequence of Transposable Element Hyperactivity in Wood-White (Leptidea) Butterflies

    Science.gov (United States)

    Talla, Venkat; Suh, Alexander; Kalsoom, Faheema; Dincă, Vlad; Vila, Roger; Friberg, Magne; Wiklund, Christer

    2017-01-01

    Abstract Characterizing and quantifying genome size variation among organisms and understanding if genome size evolves as a consequence of adaptive or stochastic processes have been long-standing goals in evolutionary biology. Here, we investigate genome size variation and association with transposable elements (TEs) across lepidopteran lineages using a novel genome assembly of the common wood-white (Leptidea sinapis) and population re-sequencing data from both L. sinapis and the closely related L. reali and L. juvernica together with 12 previously available lepidopteran genome assemblies. A phylogenetic analysis confirms established relationships among species, but identifies previously unknown intraspecific structure within Leptidea lineages. The genome assembly of L. sinapis is one of the largest of any lepidopteran taxon so far (643 Mb) and genome size is correlated with abundance of TEs, both in Lepidoptera in general and within Leptidea where L. juvernica from Kazakhstan has considerably larger genome size than any other Leptidea population. Specific TE subclasses have been active in different Lepidoptera lineages with a pronounced expansion of predominantly LINEs, DNA elements, and unclassified TEs in the Leptidea lineage after the split from other Pieridae. The rate of genome expansion in Leptidea in general has been in the range of four Mb/Million year (My), with an increase in a particular L. juvernica population to 72 Mb/My. The considerable differences in accumulation rates of specific TE classes in different lineages indicate that TE activity plays a major role in genome size evolution in butterflies and moths. PMID:28981642

  4. A dual origin of the Xist gene from a protein-coding gene and a set of transposable elements.

    Directory of Open Access Journals (Sweden)

    Eugeny A Elisaphenko

    2008-06-01

    Full Text Available X-chromosome inactivation, which occurs in female eutherian mammals is controlled by a complex X-linked locus termed the X-inactivation center (XIC. Previously it was proposed that genes of the XIC evolved, at least in part, as a result of pseudogenization of protein-coding genes. In this study we show that the key XIC gene Xist, which displays fragmentary homology to a protein-coding gene Lnx3, emerged de novo in early eutherians by integration of mobile elements which gave rise to simple tandem repeats. The Xist gene promoter region and four out of ten exons found in eutherians retain homology to exons of the Lnx3 gene. The remaining six Xist exons including those with simple tandem repeats detectable in their structure have similarity to different transposable elements. Integration of mobile elements into Xist accompanies the overall evolution of the gene and presumably continues in contemporary eutherian species. Additionally we showed that the combination of remnants of protein-coding sequences and mobile elements is not unique to the Xist gene and is found in other XIC genes producing non-coding nuclear RNA.

  5. The complex genetic context of blaPER-1 flanked by miniature inverted-repeat transposable elements in Acinetobacter johnsonii.

    Directory of Open Access Journals (Sweden)

    Zhiyong Zong

    Full Text Available On a large plasmid of Acinetobacter johnsonii strain XBB1 from hospital sewage, blaPER-1 and ISCR1 were found in a complex Tn402-like integron carrying an arr3-aacA4 cassette array. The integron was truncated by the same 439-bp miniature inverted-repeat transposable element (MITE at both ends. blaPER-1 and its complex surroundings might have been mobilized by the MITEst into an orf of unknown function, evidenced by the presence of the characteristic 5-bp direct target repeats. The same 439-bp MITEs have also been found flanking class 1 integrons carrying metallo-β-lactamases genes bla IMP-1, bla IMP-5 and bla VIM-2 before but without ISCR1. Although the cassette arrays are different, integrons have always been truncated by the 439-bp MITEs at the exact same locations. The results suggested that MITEs might be able to mobilize class 1 integrons via transposition or homologous recombination and therefore represent a possible common mechanism for mobilizing antimicrobial resistance determinants.

  6. Exploring repetitive DNA landscapes using REPCLASS, a tool that automates the classification of transposable elements in eukaryotic genomes.

    Science.gov (United States)

    Feschotte, Cédric; Keswani, Umeshkumar; Ranganathan, Nirmal; Guibotsy, Marcel L; Levine, David

    2009-07-23

    Eukaryotic genomes contain large amount of repetitive DNA, most of which is derived from transposable elements (TEs). Progress has been made to develop computational tools for ab initio identification of repeat families, but there is an urgent need to develop tools to automate the annotation of TEs in genome sequences. Here we introduce REPCLASS, a tool that automates the classification of TE sequences. Using control repeat libraries, we show that the program can classify accurately virtually any known TE types. Combining REPCLASS to ab initio repeat finding in the genomes of Caenorhabditis elegans and Drosophila melanogaster allowed us to recover the contrasting TE landscape characteristic of these species. Unexpectedly, REPCLASS also uncovered several novel TE families in both genomes, augmenting the TE repertoire of these model species. When applied to the genomes of distant Caenorhabditis and Drosophila species, the approach revealed a remarkable conservation of TE composition profile within each genus, despite substantial interspecific covariations in genome size and in the number of TEs and TE families. Lastly, we applied REPCLASS to analyze 10 fungal genomes from a wide taxonomic range, most of which have not been analyzed for TE content previously. The results showed that TE diversity varies widely across the fungi "kingdom" and appears to positively correlate with genome size, in particular for DNA transposons. Together, these data validate REPCLASS as a powerful tool to explore the repetitive DNA landscapes of eukaryotes and to shed light onto the evolutionary forces shaping TE diversity and genome architecture.

  7. ARGONAUTE 6 bridges transposable element mRNA-derived siRNAs to the establishment of DNA methylation

    Science.gov (United States)

    McCue, Andrea D; Panda, Kaushik; Nuthikattu, Saivageethi; Choudury, Sarah G; Thomas, Erica N; Slotkin, R Keith

    2015-01-01

    Transposable elements (TEs) generate mutations and chromosomal instability when active. To repress TE activity, eukaryotic cells evolved mechanisms to both degrade TE mRNAs into small interfering RNAs (siRNAs) and modify TE chromatin to epigenetically inhibit transcription. Since the populations of small RNAs that participate in TE post-transcriptional regulation differ from those that establish RNA-directed DNA methylation (RdDM), the mechanism through which transcriptionally active TEs transition from post-transcriptional RNAi regulation to chromatin level control has remained unclear. We have identified the molecular mechanism of a plant pathway that functions to direct DNA methylation to transcriptionally active TEs. We demonstrated that 21–22 nucleotide (nt) siRNA degradation products from the RNAi of TE mRNAs are directly incorporated into the ARGONAUTE 6 (AGO6) protein and direct AGO6 to TE chromatin to guide its function in RdDM. We find that this pathway functions in reproductive precursor cells to primarily target long centromeric high-copy transcriptionally active TEs for RdDM prior to gametogenesis. This study provides a direct mechanism that bridges the gap between the post-transcriptional regulation of TEs and the establishment of TE epigenetic silencing. PMID:25388951

  8. Download this PDF file

    African Journals Online (AJOL)

    Ngozi Ezenwa-Ohaeto

    the nature and basic dynamics of contemporary African politics. All over the continent, the anti-colonial struggle ... Bits of Wood respectively. This suggests that their writings can be nationalist in orientation, ..... architecture used by political actors in Aburiria as they continually invent tales that, with breathtaking speed,.

  9. Download this PDF file

    African Journals Online (AJOL)

    YDessalegn

    recommended for buffer management. Keywords: TCP; delay ... importance, the standard TCP does not perform well in high bandwidth delay .... reduce the time for reading the bits, this buffering concept could be implemented. Fig. 3 shows the situation after the buffers are created. These buffers are named as b1 and b2.

  10. Download this PDF file

    African Journals Online (AJOL)

    taland reciprocalliterary friendship in which. "if Jean went over the top a bit, Bosman had to tug him back" (141). The book My Friend Herman Charles Bos- ... narian head of the Normal College as revenge for one of Bosman's many misdemeanours,. Gray paints a picture of Bosman as a rebel and a social misfit, whose soul ...

  11. A radiation tolerant 32-bit digital signal processor (DSP); Un processeur de traitement du signal 32 bits (DSP) tolerant aux radiations

    Energy Technology Data Exchange (ETDEWEB)

    Ramaswamy, S.; Alcom, C.; Haddad, N.; Lawson, D.; Page, T.; Scandalis, G.; Scott, T. [Lockheed Martin Federal Systems, Manassas, VA (United States); Robinson, P.; Bain, D. [Innovative Systems and Technologies Corp., Tampa, FL (United States)

    1999-07-01

    This paper describes the development of a radiation tolerant version of the Analog Devices Incorporated (ADI) ADSP-21020 (RH21020), a programmable 32/40-bit floating point DSP. Implementation of layout transfer and successful fabrication of RH21020 in a Qualified Manufacturers List (QML) radiation hardened process are discussed. Results of electrical and radiation characterization of the RH21020 are reported in this paper. (authors)

  12. Source Reference File

    Data.gov (United States)

    Social Security Administration — This file contains a national set of names and contact information for doctors, hospitals, clinics, and other facilities (known collectively as sources) from which...

  13. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  14. Architecture and performance of radiation-hardened 64-bit SOS/MNOS memory

    International Nuclear Information System (INIS)

    Kliment, D.C.; Ronen, R.S.; Nielsen, R.L.; Seymour, R.N.; Splinter, M.R.

    1976-01-01

    This paper discusses the circuit architecture and performance of a nonvolatile 64-bit MNOS memory fabricated on silicon on sapphire (SOS). The circuit is a test vehicle designed to demonstrate the feasibility of a high-performance, high-density, radiation-hardened MNOS/SOS memory. The array is organized as 16 words by 4 bits and is fully decoded. It utilizes a two-(MNOS) transistor-per-bit cell and differential sensing scheme and is realized in PMOS static resistor load logic. The circuit was fabricated and tested as both a fast write random access memory (RAM) and an electrically alterable read only memory (EAROM) to demonstrate design and process flexibility. Discrete device parameters such as retention, circuit electrical characteristics, and tolerance to total dose and transient radiation are presented

  15. PENINGKATAN KINERJA PERANGKAT ELEKTRONIK BERBASIS MIKROKONTROLER AVR 8 BIT DENGAN MENGGUNAKAN RTOS (REAL TIME OPERATING SYSTEM

    Directory of Open Access Journals (Sweden)

    I Wayan Sutaya

    2015-01-01

    Full Text Available Tujuan dari penelitian ini adalah untuk mengimplementasikan RTOS (Real Time Operating System pada perangkat elektronik berbasis mikrokontroler AVR 8 bit sehingga didapatkan peningkatan kinerja pada perangkat tersebut. RTOS yang digunakan adalah freeRTOS dimana RTOS ini mendukung mikrokontroler 8 bit, berukuran kecil, dan bersifat open source. Hasil penelitian ini berguna bagi praktisi-praktisi elektronika dalam hal menekan biaya produksi pembuatan perangkat elektronik berbasis mikrokontroler 8 bit karena resource yang digunakan bisa dikurangi. Metode yang digunakan adalah metode penelitian pengembangan (Research and development dengan cara membuat studi kasus perangkat elektronik yang berbasis mikrokontroler. Perangkat elektronik yang dibuat adalah unit kendali elektronik pada sepeda motor. Selanjutnya mikrokontroler pada perangkat ini diprogram dengan menggunakan dua skenario. Skenario pertama adalah tanpa menggunakan RTOS dan skenario kedua dengan menggunakan RTOS. Dari dua skenario ini dilakukan pengujian dan analisis untuk mengetahui besar peningkatan kinerja yang didapat.

  16. Directed self-assembly of block copolymers for use in bit patterned media fabrication

    International Nuclear Information System (INIS)

    Griffiths, Rhys Alun; Vijayaraghavan, Aravind; Thomson, Thomas; Williams, Aled; Oakland, Chloe; Roberts, Jonathan

    2013-01-01

    Reduction of the bit size in conventional magnetic recording media is becoming increasingly difficult due to the superparamagnetic limit. Bit patterned media (BPM) has been proposed as a replacement technology as it will enable hard disk areal densities to increase past 1 Tb in −2 . Block copolymer directed self-assembly (BCP DSA) is the leading candidate for forming BPM due to its ability to create uniform patterns over macroscopic areas. Here we review the latest research into two different BCP DSA techniques: graphoepitaxy and chemoepitaxy (or chemical prepatterning). In addition to assessing their potential for forming high density bit patterns, we also review current approaches using these techniques for forming servo patterns, which are required for hard disk drive (HDD) operation. Finally, we review the current state of UV nanoimprint lithography, which is the favoured technique for enabling mass production of BPM HDDs. (topical review)

  17. 10-bit rapid single flux quantum digital-to-analog converter for ac voltage standard

    International Nuclear Information System (INIS)

    Maezawa, M; Hirayama, F

    2008-01-01

    Digital-to-analog (D/A) converters based on rapid single flux quantum (RSFQ) technology are under development for ac voltage standard applications. We present design and test results on a prototype 10-bit version integrated on a single chip. The 10-bit chip includes over 6000 Josephson junctions and consumes a bias current exceeding 1 A. To reduce the effects of the high bias current on circuit operation, a custom design method was employed in part and large circuit blocks were divided into smaller ones. The 10-bit chips were fabricated and tested at low speed. The test results suggested that our design approach could manage large bias currents on the order of 1 A per chip

  18. An Information-Theoretic Perspective on the Quantum Bit Commitment Impossibility Theorem

    Directory of Open Access Journals (Sweden)

    Marius Nagy

    2018-03-01

    Full Text Available This paper proposes a different approach to pinpoint the causes for which an unconditionally secure quantum bit commitment protocol cannot be realized, beyond the technical details on which the proof of Mayers’ no-go theorem is constructed. We have adopted the tools of quantum entropy analysis to investigate the conditions under which the security properties of quantum bit commitment can be circumvented. Our study has revealed that cheating the binding property requires the quantum system acting as the safe to harbor the same amount of uncertainty with respect to both observers (Alice and Bob as well as the use of entanglement. Our analysis also suggests that the ability to cheat one of the two fundamental properties of bit commitment by any of the two participants depends on how much information is leaked from one side of the system to the other and how much remains hidden from the other participant.

  19. Efficient bit sifting scheme of post-processing in quantum key distribution

    Science.gov (United States)

    Li, Qiong; Le, Dan; Wu, Xianyan; Niu, Xiamu; Guo, Hong

    2015-10-01

    Bit sifting is an important step in the post-processing of quantum key distribution (QKD). Its function is to sift out the undetected original keys. The communication traffic of bit sifting has essential impact on the net secure key rate of a practical QKD system. In this paper, an efficient bit sifting scheme is presented, of which the core is a lossless source coding algorithm. Both theoretical analysis and experimental results demonstrate that the performance of the scheme is approaching the Shannon limit. The proposed scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means the proposed scheme can decrease the secure key consumption for classical channel authentication and increase the net secure key rate of the QKD system, as demonstrated by analyzing the improvement on the net secure key rate. Meanwhile, some recommendations on the application of the proposed scheme to some representative practical QKD systems are also provided.

  20. A Josephson four-bit full adder using direct coupled functional gates

    International Nuclear Information System (INIS)

    Matheron, G.; Migny, P.; Sie, O.

    1984-09-01

    A Josephson 4-bit full adder circuit using functional direct coupled gates has been designed and studied through computer simulations. The circuit consists of only 27 gates taken from a complete logic family composed of OR, AND, EXOR and MAJORITY gates. The proposed adder scheme needs 180 Josephson junctions and 150 thin film resistors. The computed critical path delay was found 180 ps/4bits for carry propagation, with a power dissipation estimated to be less than 100 μW on the basis of a Nb/Pb-In technology with 4 μm minimum linewidth and with a Josephson current density of 1000 A/cm 2 . The worst case total add time for the 4 bits has been found less than 300 ps

  1. Nanocrystalline, superhard, ductile ceramic coatings for roller-cone bit bearings

    Energy Technology Data Exchange (ETDEWEB)

    Namavar, F.; Colter, P.; Karimy, H. [Spire Corp., Bedford, MA (United States)] [and others

    1997-12-31

    The established method for construction of roller bits utilizes carburized steel, frequently with inserted metal bearing surfaces. This construction provides the necessary surface hardness while maintaining other desirable properties in the core. Protective coatings are a logical development where enhanced hardness, wear resistance, corrosion resistance, and surface properties are required. The wear properties of geothermal roller-cone bit bearings could be further improved by application of protective ceramic hard coatings consisting of nanometer-sized crystallites. Nanocrystalline protective coatings provide the required combination of hardness and toughness which has not been available thus far using traditional ceramics having larger grains. Increased durability of roller-cone bit bearings will ultimately reduce the cost of drilling geothermal wells through increased durability.

  2. Ternary and Multi-Bit FIR Filter Area-Performance Tradeoffs in FPGA

    Directory of Open Access Journals (Sweden)

    Khalil-Ur-Rahman Dayo

    2013-01-01

    Full Text Available In this paper, performance and area of conventional FIR (Finite Impulse Responce filters versus ternary sigma delta modulated FIR filter is compared in FPGA (Field Programmable Gate Arrays using VHDL (Verilog Description Language. Two different approaches were designed and synthesized at same spectral performance by obtaining a TIR (Target Impulse Response. Both filters were synthesized on adaptive LUT (Look Up Table FPGA device in pipelined and non-pipelined modes. It is shown that the Ternary FIR filter occupies approximately the same area as the corresponding multi-bit filter, but for a given specification, the ternary FIR filter has 32% better performance in non-pipelined and 72% in pipelined mode, compared to its equivalent Multi-Bit filter at its optimum 12-bit coefficient quantization. These promising results shows that ternary logic based (i.e. +1,0,-1 filters can be used for huge chip area savings and higher performance.

  3. Robust Face Recognition using Voting by Bit-plane Images based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Dongmei Wei

    2015-08-01

    Full Text Available Plurality voting is widely employed as combination strategies in pattern recognition. As a technology proposed recently, sparse representation based classification codes the query image as a sparse linear combination of entire training images and classifies the query sample class by class exploiting the class representation error. In this paper, an improvement face recognition approach using sparse representation and plurality voting based on the binary bit-plane images is proposed. After being equalized, gray images are decomposed into eight bit-plane images, sparse representation based classification is exploited respectively on the five bit-plane images that have more discrimination information. Finally, the true identity of query image is voted by these five identities obtained. Experiment results shown that this proposed approach is preferable both in recognition accuracy and in recognition speed.

  4. FlavBit. A GAMBIT module for computing flavour observables and likelihoods

    Energy Technology Data Exchange (ETDEWEB)

    Bernlochner, Florian U. [Physikalisches Institut der Rheinischen Friedrich-Wilhelms-Universitaet Bonn (Germany); Chrzaszcz, Marcin [Universitaet Zuerich, Physik-Institut, Zurich (Switzerland); Polish Academy of Sciences, H. Niewodniczanski Institute of Nuclear Physics, Krakow (Poland); Dal, Lars A. [University of Oslo, Department of Physics, Oslo (Norway); Farmer, Ben [Oskar Klein Centre for Cosmoparticle Physics, AlbaNova University Centre, Stockholm (Sweden); Stockholm University, Department of Physics, Stockholm (Sweden); Jackson, Paul; White, Martin [University of Adelaide, Department of Physics, Adelaide, SA (Australia); Australian Research Council Centre of Excellence for Particle Physics at the Tera-scale (Australia); Kvellestad, Anders [NORDITA, Stockholm (Sweden); Mahmoudi, Farvah [Univ Lyon, Univ Lyon 1, ENS de Lyon, CNRS, Centre de Recherche Astrophysique de Lyon UMR5574, Saint-Genis-Laval (France); CERN, Theoretical Physics Department, Geneva (Switzerland); Putze, Antje [LAPTh, Universite de Savoie, CNRS, Annecy-le-Vieux (France); Rogan, Christopher [Harvard University, Department of Physics, Cambridge, MA (United States); Scott, Pat [Imperial College London, Department of Physics, Blackett Laboratory, London (United Kingdom); Serra, Nicola [Universitaet Zuerich, Physik-Institut, Zurich (Switzerland); Weniger, Christoph [University of Amsterdam, GRAPPA, Institute of Physics, Amsterdam (Netherlands); Collaboration: The GAMBIT Flavour Workgroup

    2017-11-15

    Flavour physics observables are excellent probes of new physics up to very high energy scales. Here we present FlavBit, the dedicated flavour physics module of the global-fitting package GAMBIT. FlavBit includes custom implementations of various likelihood routines for a wide range of flavour observables, including detailed uncertainties and correlations associated with LHCb measurements of rare, leptonic and semileptonic decays of B and D mesons, kaons and pions. It provides a generalised interface to external theory codes such as SuperIso, allowing users to calculate flavour observables in and beyond the Standard Model, and then test them in detail against all relevant experimental data. We describe FlavBit and its constituent physics in some detail, then give examples from supersymmetry and effective field theory illustrating how it can be used both as a standalone library for flavour physics, and within GAMBIT. (orig.)

  5. Design and development of CAMAC 12 bit ADC/DAC dual purpose module

    International Nuclear Information System (INIS)

    Kulkarni, S.G.; Gore, J.A.; Ramlal, V.; Matkar, U.V.; Lokare, R.N.; Yadav, M.L.; Ekambaram, M.; Gupta, A.K.; Datar, V.M.

    2013-01-01

    A dual function CAMAC module is designed for Pelletron Accelerator which can function as 12 bit 8 channels DAC or 12 bit 16 channels ADC. Spartan 2 series of FPGA is used for implementing the CAMAC interface logic as well as logic for ADC/DAC interface. The PCB has both the ADC and DAC mounted but the module can have only one function selected due to wiring constraint. Two different VHDL programs (one for the ADC and other for the DAC) reside on the EEPROM permitting selection of any one as per the functionality required. The module is working as a 12 bit DAC at BARC-TIFR Pelletron Linac Facility, successfully. (author)

  6. Twin-bit via resistive random access memory in 16 nm FinFET logic technologies

    Science.gov (United States)

    Shih, Yi-Hong; Hsu, Meng-Yin; King, Ya-Chin; Lin, Chrong Jung

    2018-04-01

    A via resistive random access memory (RRAM) cell fully compatible with the standard CMOS logic process has been successfully demonstrated for high-density logic nonvolatile memory (NVM) modules in advanced FinFET circuits. In this new cell, the transition metal layers are formed on both sides of a via, given two storage bits per via. In addition to its compact cell area (1T + 14 nm × 32 nm), the twin-bit via RRAM cell features a low operation voltage, a large read window, good data retention, and excellent cycling capability. As fine alignments between mask layers become possible, the twin-bit via RRAM cell is expected to be highly scalable in advanced FinFET technology.

  7. Image Watermarking Scheme for Specifying False Positive Probability and Bit-pattern Embedding

    Science.gov (United States)

    Sayama, Kohei; Nakamoto, Masayoshi; Muneyasu, Mitsuji; Ohno, Shuichi

    This paper treats a discrete wavelet transform(DWT)-based image watermarking with considering the false positive probability and bit-pattern embedding. We propose an iterative embedding algorithm of watermarking signals which are K sets pseudo-random numbers generated by a secret key. In the detection, K correlations between the watermarked DWT coefficients and watermark signals are computed by using the secret key. L correlations are made available for the judgment of the watermark presence with specified false positive probability, and the other K-L correlations are corresponding to the bit-pattern signal. In the experiment, we show the detection results with specified false positive probability and the bit-pattern recovery, and the comparison of the proposed method against JPEG compression, scaling down and cropping.

  8. arXiv FlavBit: A GAMBIT module for computing flavour observables and likelihoods

    CERN Document Server

    Bernlochner, Florian U.; Dal, Lars A.; Farmer, Ben; Jackson, Paul; Kvellestad, Anders; Mahmoudi, Farvah; Putze, Antje; Rogan, Christopher; Scott, Pat; Serra, Nicola; Weniger, Christoph; White, Martin

    2017-11-21

    Flavour physics observables are excellent probes of new physics up to very high energy scales. Here we present FlavBit, the dedicated flavour physics module of the global-fitting package GAMBIT. FlavBit includes custom implementations of various likelihood routines for a wide range of flavour observables, including detailed uncertainties and correlations associated with LHCb measurements of rare, leptonic and semileptonic decays of B and D mesons, kaons and pions. It provides a generalised interface to external theory codes such as SuperIso, allowing users to calculate flavour observables in and beyond the Standard Model, and then test them in detail against all relevant experimental data. We describe FlavBit and its constituent physics in some detail, then give examples from supersymmetry and effective field theory illustrating how it can be used both as a standalone library for flavour physics, and within GAMBIT.

  9. Optimized H.264/AVC-Based Bit Stream Switching for Mobile Video Streaming

    Directory of Open Access Journals (Sweden)

    Liebl Günther

    2006-01-01

    Full Text Available We show the suitability of H.264/MPEG-4 AVC extended profile for wireless video streaming applications. In particular, we exploit the advanced bit stream switching capabilities using SP/SI pictures defined in the H.264/MPEG-4 AVC standard. For both types of switching pictures, optimized encoders are developed. We introduce a framework for dynamic switching and frame scheduling. For this purpose we define an appropriate abstract representation for media encoded for video streaming, as well as for the characteristics of wireless variable bit rate channels. The achievable performance gains over H.264/MPEG-4 AVC with constant bit rate (CBR encoding are shown for wireless video streaming over enhanced GPRS (EGPRS.

  10. Worst-case residual clipping noise power model for bit loading in LACO-OFDM

    KAUST Repository

    Zhang, Zhenyu

    2018-03-19

    Layered ACO-OFDM enjoys better spectral efficiency than ACO-OFDM, but its performance is challenged by residual clipping noise (RCN). In this paper, the power of RCN of LACO-OFDM is analyzed and modeled. As RCN is data-dependent, the worst-case situation is considered. A worst-case indicator is defined for relating the power of RCN and the power of noise at the receiver, wherein a linear relation is shown to be a practical approximation. An LACO-OFDM bit-loading experiment is performed to examine the proposed RCN power model for data rates of 6 to 7 Gbps. The experiment\\'s results show that accounting for RCN has two advantages. First, it leads to better bit loading and achieves up to 59% lower overall bit-error rate (BER) than when the RCN is ignored. Second, it balances the BER across layers, which is a desired property from a channel coding perspective.

  11. Highly accurate moving object detection in variable bit rate video-based traffic monitoring systems.

    Science.gov (United States)

    Huang, Shih-Chia; Chen, Bo-Hao

    2013-12-01

    Automated motion detection, which segments moving objects from video streams, is the key technology of intelligent transportation systems for traffic management. Traffic surveillance systems use video communication over real-world networks with limited bandwidth, which frequently suffers because of either network congestion or unstable bandwidth. Evidence supporting these problems abounds in publications about wireless video communication. Thus, to effectively perform the arduous task of motion detection over a network with unstable bandwidth, a process by which bit-rate is allocated to match the available network bandwidth is necessitated. This process is accomplished by the rate control scheme. This paper presents a new motion detection approach that is based on the cerebellar-model-articulation-controller (CMAC) through artificial neural networks to completely and accurately detect moving objects in both high and low bit-rate video streams. The proposed approach is consisted of a probabilistic background generation (PBG) module and a moving object detection (MOD) module. To ensure that the properties of variable bit-rate video streams are accommodated, the proposed PBG module effectively produces a probabilistic background model through an unsupervised learning process over variable bit-rate video streams. Next, the MOD module, which is based on the CMAC network, completely and accurately detects moving objects in both low and high bit-rate video streams by implementing two procedures: 1) a block selection procedure and 2) an object detection procedure. The detection results show that our proposed approach is capable of performing with higher efficacy when compared with the results produced by other state-of-the-art approaches in variable bit-rate video streams over real-world limited bandwidth networks. Both qualitative and quantitative evaluations support this claim; for instance, the proposed approach achieves Similarity and F1 accuracy rates that are 76

  12. 76 FR 62092 - Filing Procedures

    Science.gov (United States)

    2011-10-06

    ... INTERNATIONAL TRADE COMMISSION Filing Procedures AGENCY: International Trade Commission. ACTION: Notice of issuance of Handbook on Filing Procedures. SUMMARY: The United States International Trade Commission (``Commission'') is issuing a Handbook on Filing Procedures to replace its Handbook on Electronic...

  13. Design and Simulation of 1-bit Sigma Delta ADC in 0.18um CMOS Technology

    OpenAIRE

    Jaydip H. Chaudhari

    2013-01-01

    This paper presents the design of a first order single bit Sigma-Delta ADC which is realized using CMOS technology. In this paper, a first Order Sigma-Delta ADC is implemented in a standard 0.18um CMOS technology. The Design and Simulation of the Modulator is done using Mentor Graphics Tool. First order single bit Sigma Delta ADC Modulator is implemented using ±1.8 power supply and simulation results are plotted using Mentor Graphics Tool. This paper firstly elaborate about ADC types and Clas...

  14. Randomized OBDDs for the Most Significant Bit of Multiplication Need Exponential Size

    Science.gov (United States)

    Bollig, Beate; Gillé, Marc

    Integer multiplication as one of the basic arithmetic functions has been in the focus of several complexity theoretical investigations and ordered binary decision diagrams (OBDDs) are one of the most common dynamic data structures for Boolean functions. Only two years ago, the question whether the deterministic OBDD complexity of the most significant bit of integer multiplication is exponential has been answered affirmatively. Since probabilistic methods have turned out to be useful in almost all areas of computer science, one may ask whether randomization can help to represent the most significant bit of integer multiplication in smaller size. Here, it is proved that the randomized OBDD complexity is also exponential.

  15. Analytical expression for the bit error rate of cascaded all-optical regenerators

    DEFF Research Database (Denmark)

    Mørk, Jesper; Öhman, Filip; Bischoff, S.

    2003-01-01

    We derive an approximate analytical expression for the bit error rate of cascaded fiber links containing all-optical 2R-regenerators. A general analysis of the interplay between noise due to amplification and the degree of reshaping (nonlinearity) of the regenerator is performed.......We derive an approximate analytical expression for the bit error rate of cascaded fiber links containing all-optical 2R-regenerators. A general analysis of the interplay between noise due to amplification and the degree of reshaping (nonlinearity) of the regenerator is performed....

  16. Adaptive Bit Rate Video Streaming Through an RF/Free Space Optical Laser Link

    Directory of Open Access Journals (Sweden)

    A. Akbulut

    2010-06-01

    Full Text Available This paper presents a channel-adaptive video streaming scheme which adjusts video bit rate according to channel conditions and transmits video through a hybrid RF/free space optical (FSO laser communication system. The design criteria of the FSO link for video transmission to 2.9 km distance have been given and adaptive bit rate video streaming according to the varying channel state over this link has been studied. It has been shown that the proposed structure is suitable for uninterrupted transmission of videos over the hybrid wireless network with reduced packet delays and losses even when the received power is decreased due to weather conditions.

  17. Entropy of Bit-Stuffing-Induced Measures for Two-Dimensional Checkerboard Constraints

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Vaarby, Torben Strange

    2007-01-01

    A modified bit-stuffing scheme for two-dimensional (2-D) checkerboard constraints is introduced. The entropy of the scheme is determined based on a probability measure defined by the modified bit-stuffing. Entropy results of the scheme are given for 2-D constraints on a binary alphabet....... The constraints considered are 2-D RLL (d, infinity) for d = 2, 3 and 4 as well as for the constraint with a minimum 1-norm distance of 3 between Is. For these results the entropy is within 1-2% of an upper bound on the capacity for the constraint. As a variation of the scheme, periodic merging arrays are also...

  18. A Novel Nondestructive Bit-Line Discharging Scheme for Deep Submicrometer STT-RAM

    DEFF Research Database (Denmark)

    Zeinali, Behzad; Madsen, Jens Kargaard; Raghavan, Praveen

    A combination of semiconductor integrated circuits (IC) and a dense array of scaled magnetic tunnel junctions (MTJ) makes promising Spin-Transfer Torque Random Access Memory (STT-RAM). This emerging memory minimizes the leakage power consumption and provides a high density at scaled technologies......, the sensing scheme is accomplished in one step. In this scheme, the Bit-Line is pre-charged and then discharged during read operation. The MTJ resistance state can be found by comparing the time constant of discharging. The simulation results show the overall sensing time is 4 ns when the Bit-Line capacitance...

  19. Optimal multitone bit allocation for fixed-rate video transmission over ADSL

    Science.gov (United States)

    Antonini, Marc; Moureaux, Jean-Marie; Lecuire, Vincent

    2002-01-01

    In this paper we propose a novel approach for the bit allocation performed in an ADSL modulator. This new method is based on the observation that the transmission speed using ADSL strongly depends on the distance between the central office and the subscriber's side and does not permit real-time transmission for high bitrate video on long distances. The algorithm we develop takes into account the characteristics of a video sequence and distributes the channel error according to visual sensitivity. This method involves variable transmission Bit Error Rate.

  20. Single-word multiple-bit upsets in static random access devices

    International Nuclear Information System (INIS)

    Koga, R.; Pinkerton, S.D.; Lie, T.J.; Crawford, K.B.

    1993-01-01

    Energetic ions and protons can cause single event upsets (SEUs) in static random access memory (SRAM) cells. In some cases multiple bits may be upset as the result of a single event. Space-borne electronics systems incorporating high-density SRAM are vulnerable to single-word multiple-bit upsets (SMUs). The authors review here recent observations of SMU, present the results of a systematic investigation of the physical cell arrangements employed in several currently available SRAM device types, and discuss implications for the occurrence and mitigation of SMU