WorldWideScience

Sample records for pattern mamp signatures

  1. Microbe-associated molecular pattern (MAMP) signatures, synergy, size and charge

    DEFF Research Database (Denmark)

    Aslam, Shazia N.; Erbs, Gitte; Morrissey, Kate L.

    2009-01-01

    Triggering of defences by microbes has mainly been investigated using single elicitors or microbe-associated molecular patterns (MAMPs), but MAMPs are released in planta as complex mixtures together with endogenous oligogalacturonan (OGA) elicitor. We investigated the early responses in Arabidops...

  2. Fungal innate immunity induced by bacterial microbe-associated molecular patterns (MAMPs)

    DEFF Research Database (Denmark)

    Ip Cho, Simon; Sundelin, Thomas; Erbs, Gitte

    2016-01-01

    Plants and animals detect bacterial presence through Microbe-Associated Molecular Patterns (MAMPs) which induce an innate immune response. The field of fungal-bacterial interaction at the molecular level is still in its infancy and little is known about MAMPs and their detection by fungi. Exposin...

  3. Fungal Innate Immunity Induced by Bacterial Microbe-Associated Molecular Patterns (MAMPs

    Directory of Open Access Journals (Sweden)

    Simon Ipcho

    2016-06-01

    Full Text Available Plants and animals detect bacterial presence through Microbe-Associated Molecular Patterns (MAMPs which induce an innate immune response. The field of fungal–bacterial interaction at the molecular level is still in its infancy and little is known about MAMPs and their detection by fungi. Exposing Fusarium graminearum to bacterial MAMPs led to increased fungal membrane hyperpolarization, a putative defense response, and a range of transcriptional responses. The fungus reacted with a different transcript profile to each of the three tested MAMPs, although a core set of genes related to energy generation, transport, amino acid production, secondary metabolism, and especially iron uptake were detected for all three. Half of the genes related to iron uptake were predicted MirA type transporters that potentially take up bacterial siderophores. These quick responses can be viewed as a preparation for further interactions with beneficial or pathogenic bacteria, and constitute a fungal innate immune response with similarities to those of plants and animals.

  4. MAMP (microbe-associated molecular pattern)-induced changes in plasma membrane-associated proteins.

    Science.gov (United States)

    Uhlíková, Hana; Solanský, Martin; Hrdinová, Vendula; Šedo, Ondrej; Kašparovský, Tomáš; Hejátko, Jan; Lochman, Jan

    2017-03-01

    Plant plasma membrane associated proteins play significant roles in Microbe-Associated Molecular Pattern (MAMP) mediated defence responses including signal transduction, membrane transport or energetic metabolism. To elucidate the dynamics of proteins associated with plasma membrane in response to cryptogein, a well-known MAMP of defence reaction secreted by the oomycete Phytophthora cryptogea, 2D-Blue Native/SDS gel electrophoresis of plasma membrane fractions was employed. This approach revealed 21 up- or down-regulated protein spots of which 15 were successfully identified as proteins related to transport through plasma membrane, vesicle trafficking, and metabolic enzymes including cytosolic NADP-malic enzyme and glutamine synthetase. Observed changes in proteins were also confirmed on transcriptional level by qRT-PCR analysis. In addition, a significantly decreased accumulation of transcripts observed after employment of a mutant variant of cryptogein Leu41Phe, exhibiting a conspicuous defect in induction of resistance, sustains the contribution of identified proteins in cryptogein-triggered cellular responses. Our data provide further evidence for dynamic MAMP-induced changes in plasma membrane associated proteins. Copyright © 2016 Elsevier GmbH. All rights reserved.

  5. The role of lipopolysaccharide and peptidoglycan, two glycosylated bacterial microbe-associated molecular patterns (MAMPs), in plant innate immunity

    DEFF Research Database (Denmark)

    Erbs, Gitte; Newman, Mari-Anne

    2012-01-01

    innate immune system through the action of pattern recognition receptors (PRRs). A greater insight into the mechanisms of MAMP recognition and the description of PRRs for different microbial glycoconjugates will have considerable impact on the improvement of plant health and disease resistance. Here...... to as ‘innate immunity’. Innate immunity is the first line of defence against invading microorganisms in vertebrates and the only line of defence in invertebrates and plants. Bacterial glycoconjugates, such as lipopolysaccharides (LPSs) from the outer membrane of Gram-negative bacteria and peptidoglycan (PGN......) from the cell walls of both Gram-positive and Gram-negative bacteria, have been found to act as elicitors of plant innate immunity. These conserved, indispensable, microbe-specific molecules are also referred to as ‘microbe-associated molecular patterns’ (MAMPs). MAMPs are recognized by the plant...

  6. MAMPs/PAMPs - elicitors of innate immunity in plants

    DEFF Research Database (Denmark)

    Erbs, Gitte; Newman, Mari-Anne

    2009-01-01

    Patterns (MAMPs or PAMPs), are recognised by the plant innate immune systems Pattern Recognition Receptors (PRRs). General bacterial elicitors, like lipopolysaccharides (LPS), flagellin (Flg), elongation factor Tu (EF-Tu), cold shock protein (CSP), peptidoglycan (PGN) and the enzyme superoxide dismutase...

  7. Genetic dissection of the maize (Zea mays L.) MAMP response

    Science.gov (United States)

    Microbe-associated molecular patterns (MAMPs) are highly conserved molecules commonly found in microbes which can be recognized by plant pattern recognition receptors (PRRs). Recognition triggers a suite of responses including production of reactive oxygen species (ROS) and nitric oxide (NO) and ex...

  8. A peroxidase-dependent apoplastic oxidative burst in cultured Arabidopsis cells functions in MAMP-elicited defense.

    Science.gov (United States)

    O'Brien, Jose A; Daudi, Arsalan; Finch, Paul; Butt, Vernon S; Whitelegge, Julian P; Souda, Puneet; Ausubel, Frederick M; Bolwell, G Paul

    2012-04-01

    Perception by plants of so-called microbe-associated molecular patterns (MAMPs) such as bacterial flagellin, referred to as pattern-triggered immunity, triggers a rapid transient accumulation of reactive oxygen species (ROS). We previously identified two cell wall peroxidases, PRX33 and PRX34, involved in apoplastic hydrogen peroxide (H2O2) production in Arabidopsis (Arabidopsis thaliana). Here, we describe the generation of Arabidopsis tissue culture lines in which the expression of PRX33 and PRX34 is knocked down by antisense expression of a heterologous French bean (Phaseolus vulgaris) peroxidase cDNA construct. Using these tissue culture lines and two inhibitors of ROS generation, azide and diphenylene iodonium, we found that perxoxidases generate about half of the H2O2 that accumulated in response to MAMP treatment and that NADPH oxidases and other sources such as mitochondria account for the remainder of the ROS. Knockdown of PRX33/PRX34 resulted in decreased expression of several MAMP-elicited genes, including MYB51, CYP79B2, and CYP81F2. Similarly, proteomic analysis showed that knockdown of PRX33/PRX34 led to the depletion of various MAMP-elicited defense-related proteins, including the two cysteine-rich peptides PDF2.2 and PDF2.3. Knockdown of PRX33/PRX34 also led to changes in the cell wall proteome, including increases in enzymes involved in cell wall remodeling, which may reflect enhanced cell wall expansion as a consequence of reduced H2O2-mediated cell wall cross-linking. Comparative metabolite profiling of a CaCl2 extract of the PRX33/PRX34 knockdown lines showed significant changes in amino acids, aldehydes, and keto acids but not fatty acids and sugars. Overall, these data suggest that PRX33/PRX34-generated ROS production is involved in the orchestration of pattern-triggered immunity in tissue culture cells.

  9. On the ligand binding profile and desensitization of plant ionotropic glutamate receptor (iGluR)-like channels functioning in MAMP-triggered Ca2+ influx

    DEFF Research Database (Denmark)

    Kwaaitaal, Mark Adrianus Cornelis J; Maintz, Jens; Cavdar, Meltem

    2012-01-01

    in the putative agonist binding profile and potential mode of desensitization of MAMP-activated plant iGluRs. Based on results from pharmacological inhibition and desensitization experiments, we propose that plant iGluR complexes responsible for the MAMP-triggered Ca ( 2+) signature have a binding profile...... that combines the specificities of mammalian NMDA-and non-NMDA types of iGluRs, possibly reflecting the evolutionary history of plant and animal iGluRs. We further hypothesize that, analogous to the mammalian NMDA-NR1 receptor, desensitization of plant iGluR-like channels might involve binding of the ubiquitous...

  10. Analysis of Microbe-Associated Molecular Pattern-Responsive Synthetic Promoters with the Parsley Protoplast System.

    Science.gov (United States)

    Kanofsky, Konstantin; Lehmeyer, Mona; Schulze, Jutta; Hehl, Reinhard

    2016-01-01

    Plants recognize pathogens by microbe-associated molecular patterns (MAMPs) and subsequently induce an immune response. The regulation of gene expression during the immune response depends largely on cis-sequences conserved in promoters of MAMP-responsive genes. These cis-sequences can be analyzed by constructing synthetic promoters linked to a reporter gene and by testing these constructs in transient expression systems. Here, the use of the parsley (Petroselinum crispum) protoplast system for analyzing MAMP-responsive synthetic promoters is described. The synthetic promoter consists of four copies of a potential MAMP-responsive cis-sequence cloned upstream of a minimal promoter and the uidA reporter gene. The reporter plasmid contains a second reporter gene, which is constitutively expressed and hence eliminates the requirement of a second plasmid used as a transformation control. The reporter plasmid is transformed into parsley protoplasts that are elicited by the MAMP Pep25. The MAMP responsiveness is validated by comparing the reporter gene activity from MAMP-treated and untreated cells and by normalizing reporter gene activity using the constitutively expressed reporter gene.

  11. Innate immune responses activated in Arabidopsis roots by microbe-associated molecular patterns.

    Science.gov (United States)

    Millet, Yves A; Danna, Cristian H; Clay, Nicole K; Songnuan, Wisuwat; Simon, Matthew D; Werck-Reichhart, Danièle; Ausubel, Frederick M

    2010-03-01

    Despite the fact that roots are the organs most subject to microbial interactions, very little is known about the response of roots to microbe-associated molecular patterns (MAMPs). By monitoring transcriptional activation of beta-glucuronidase reporters and MAMP-elicited callose deposition, we show that three MAMPs, the flagellar peptide Flg22, peptidoglycan, and chitin, trigger a strong tissue-specific response in Arabidopsis thaliana roots, either at the elongation zone for Flg22 and peptidoglycan or in the mature parts of the roots for chitin. Ethylene signaling, the 4-methoxy-indole-3-ylmethylglucosinolate biosynthetic pathway, and the PEN2 myrosinase, but not salicylic acid or jasmonic acid signaling, play major roles in this MAMP response. We also show that Flg22 induces the cytochrome P450 CYP71A12-dependent exudation of the phytoalexin camalexin by Arabidopsis roots. The phytotoxin coronatine, an Ile-jasmonic acid mimic produced by Pseudomonas syringae pathovars, suppresses MAMP-activated responses in the roots. This suppression requires the E3 ubiquitin ligase COI1 as well as the transcription factor JIN1/MYC2 but does not rely on salicylic acid-jasmonic acid antagonism. These experiments demonstrate the presence of highly orchestrated and tissue-specific MAMP responses in roots and potential pathogen-encoded mechanisms to block these MAMP-elicited signaling pathways.

  12. Innate Immune Responses Activated in Arabidopsis Roots by Microbe-Associated Molecular Patterns[W][OA

    Science.gov (United States)

    Millet, Yves A.; Danna, Cristian H.; Clay, Nicole K.; Songnuan, Wisuwat; Simon, Matthew D.; Werck-Reichhart, Danièle; Ausubel, Frederick M.

    2010-01-01

    Despite the fact that roots are the organs most subject to microbial interactions, very little is known about the response of roots to microbe-associated molecular patterns (MAMPs). By monitoring transcriptional activation of β-glucuronidase reporters and MAMP-elicited callose deposition, we show that three MAMPs, the flagellar peptide Flg22, peptidoglycan, and chitin, trigger a strong tissue-specific response in Arabidopsis thaliana roots, either at the elongation zone for Flg22 and peptidoglycan or in the mature parts of the roots for chitin. Ethylene signaling, the 4-methoxy-indole-3-ylmethylglucosinolate biosynthetic pathway, and the PEN2 myrosinase, but not salicylic acid or jasmonic acid signaling, play major roles in this MAMP response. We also show that Flg22 induces the cytochrome P450 CYP71A12-dependent exudation of the phytoalexin camalexin by Arabidopsis roots. The phytotoxin coronatine, an Ile-jasmonic acid mimic produced by Pseudomonas syringae pathovars, suppresses MAMP-activated responses in the roots. This suppression requires the E3 ubiquitin ligase COI1 as well as the transcription factor JIN1/MYC2 but does not rely on salicylic acid–jasmonic acid antagonism. These experiments demonstrate the presence of highly orchestrated and tissue-specific MAMP responses in roots and potential pathogen-encoded mechanisms to block these MAMP-elicited signaling pathways. PMID:20348432

  13. Selective forgery of RSA signatures with fixed-pattern padding

    NARCIS (Netherlands)

    Lenstra, A.K.; Shparlinski, I.E.; Naccache, D.; Paillier, P.

    2002-01-01

    We present a practical selective forgery attack against RSA signatures with fixed-pattern padding shorter than two thirds of the modulus length. Our result extends the practical existential forgery of such RSA signatures that was presented at Crypto 2001. For an n-bit modulus the heuristic

  14. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    International Nuclear Information System (INIS)

    Martínez-García, Eric E.; González-Lópezlira, Rosa A.

    2013-01-01

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L) J , as a function of (g – i) versus (i – J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  15. Genetic and biochemical investigations of the role of MamP in redox control of iron biomineralization in Magnetospirillum magneticum.

    Science.gov (United States)

    Jones, Stephanie R; Wilson, Tiffany D; Brown, Margaret E; Rahn-Lee, Lilah; Yu, Yi; Fredriksen, Laura L; Ozyamak, Ertan; Komeili, Arash; Chang, Michelle C Y

    2015-03-31

    Magnetotactic bacteria have evolved complex subcellular machinery to construct linear chains of magnetite nanocrystals that allow the host cell to sense direction. Each mixed-valent iron nanoparticle is mineralized from soluble iron within a membrane-encapsulated vesicle termed the magnetosome, which serves as a specialized compartment that regulates the iron, redox, and pH environment of the growing mineral. To dissect the biological components that control this process, we have carried out a genetic and biochemical study of proteins proposed to function in iron mineralization. In this study, we show that the redox sites of c-type cytochromes of the Magnetospirillum magneticum AMB-1 magnetosome island, MamP and MamT, are essential to their physiological function and that ablation of one or both heme motifs leads to loss of function, suggesting that their ability to carry out redox chemistry in vivo is important. We also develop a method to heterologously express fully heme-loaded MamP from AMB-1 for in vitro biochemical studies, which show that its Fe(III)-Fe(II) redox couple is set at an unusual potential (-89 ± 11 mV) compared with other related cytochromes involved in iron reduction or oxidation. Despite its low reduction potential, it remains competent to oxidize Fe(II) to Fe(III) and mineralize iron to produce mixed-valent iron oxides. Finally, in vitro mineralization experiments suggest that Mms mineral-templating peptides from AMB-1 can modulate the iron redox chemistry of MamP.

  16. Transcriptional Dynamics Driving MAMP-Triggered Immunity and Pathogen Effector-Mediated Immunosuppression in Arabidopsis Leaves Following Infection with Pseudomonas syringae pv tomato DC3000.

    Science.gov (United States)

    Lewis, Laura A; Polanski, Krzysztof; de Torres-Zabala, Marta; Jayaraman, Siddharth; Bowden, Laura; Moore, Jonathan; Penfold, Christopher A; Jenkins, Dafyd J; Hill, Claire; Baxter, Laura; Kulasekaran, Satish; Truman, William; Littlejohn, George; Prusinska, Justyna; Mead, Andrew; Steinbrenner, Jens; Hickman, Richard; Rand, David; Wild, David L; Ott, Sascha; Buchanan-Wollaston, Vicky; Smirnoff, Nick; Beynon, Jim; Denby, Katherine; Grant, Murray

    2015-11-01

    Transcriptional reprogramming is integral to effective plant defense. Pathogen effectors act transcriptionally and posttranscriptionally to suppress defense responses. A major challenge to understanding disease and defense responses is discriminating between transcriptional reprogramming associated with microbial-associated molecular pattern (MAMP)-triggered immunity (MTI) and that orchestrated by effectors. A high-resolution time course of genome-wide expression changes following challenge with Pseudomonas syringae pv tomato DC3000 and the nonpathogenic mutant strain DC3000hrpA- allowed us to establish causal links between the activities of pathogen effectors and suppression of MTI and infer with high confidence a range of processes specifically targeted by effectors. Analysis of this information-rich data set with a range of computational tools provided insights into the earliest transcriptional events triggered by effector delivery, regulatory mechanisms recruited, and biological processes targeted. We show that the majority of genes contributing to disease or defense are induced within 6 h postinfection, significantly before pathogen multiplication. Suppression of chloroplast-associated genes is a rapid MAMP-triggered defense response, and suppression of genes involved in chromatin assembly and induction of ubiquitin-related genes coincide with pathogen-induced abscisic acid accumulation. Specific combinations of promoter motifs are engaged in fine-tuning the MTI response and active transcriptional suppression at specific promoter configurations by P. syringae. © 2015 American Society of Plant Biologists. All rights reserved.

  17. In roots of Arabidopsis thaliana, the damage-associated molecular pattern AtPep1 is a stronger elicitor of immune signalling than flg22 or the chitin heptamer.

    Directory of Open Access Journals (Sweden)

    Lorenzo Poncini

    Full Text Available Plants interpret their immediate environment through perception of small molecules. Microbe-associated molecular patterns (MAMPs such as flagellin and chitin are likely to be more abundant in the rhizosphere than plant-derived damage-associated molecular patterns (DAMPs. We investigated how the Arabidopsis thaliana root interprets MAMPs and DAMPs as danger signals. We monitored root development during exposure to increasing concentrations of the MAMPs flg22 and the chitin heptamer as well as of the DAMP AtPep1. The tissue-specific expression of defence-related genes in roots was analysed using a toolkit of promoter::YFPN lines reporting jasmonic acid (JA-, salicylic acid (SA-, ethylene (ET- and reactive oxygen species (ROS- dependent signalling. Finally, marker responses were analysed during invasion by the root pathogen Fusarium oxysporum. The DAMP AtPep1 triggered a stronger activation of the defence markers compared to flg22 and the chitin heptamer. In contrast to the tested MAMPs, AtPep1 induced SA- and JA-signalling markers in the root and caused a severe inhibition of root growth. Fungal attack resulted in a strong activation of defence genes in tissues close to the invading fungal hyphae. The results collectively suggest that AtPep1 presents a stronger danger signal to the Arabidopsis root than the MAMPs flg22 and chitin heptamer.

  18. A small set of succinct signature patterns distinguishes Chinese and non-Chinese HIV-1 genomes.

    Directory of Open Access Journals (Sweden)

    Yan Wang

    Full Text Available The epidemiology of HIV-1 in China has unique features that may have led to unique viral strains. We therefore tested the hypothesis that it is possible to find distinctive patterns in HIV-1 genomes sampled in China. Using a rule inference algorithm we could indeed extract from sequences of the third variable loop (V3 of HIV-1 gp120 a set of 14 signature patterns that with 89% accuracy distinguished Chinese from non-Chinese sequences. These patterns were found to be specific to HIV-1 subtype, i.e. sequences complying with pattern 1 were of subtype B, pattern 2 almost exclusively covered sequences of subtype 01_AE, etc. We then analyzed the first of these signature patterns in depth, namely that L and W at two V3 positions are specifically occurring in Chinese sequences of subtype B/B' (3% false positives. This pattern was found to be in agreement with the phylogeny of HIV-1 of subtype B inside and outside of China. We could neither reject nor convincingly confirm that the pattern is stabilized by immune escape. For further interpretation of the signature pattern we used the recently developed measure of Direct Information, and in this way discovered evidence for physical interactions between V2 and V3. We conclude by a discussion of limitations of signature patterns, and the applicability of the approach to other genomic regions and other countries.

  19. Common patterns and disease-related signatures in tuberculosis and sarcoidosis.

    Science.gov (United States)

    Maertzdorf, Jeroen; Weiner, January; Mollenkopf, Hans-Joachim; Bauer, Torsten; Prasse, Antje; Müller-Quernheim, Joachim; Kaufmann, Stefan H E

    2012-05-15

    In light of the marked global health impact of tuberculosis (TB), strong focus has been on identifying biosignatures. Gene expression profiles in blood cells identified so far are indicative of a persistent activation of the immune system and chronic inflammatory pathology in active TB. Definition of a biosignature with unique specificity for TB demands that identified profiles can differentiate diseases with similar pathology, like sarcoidosis (SARC). Here, we present a detailed comparison between pulmonary TB and SARC, including whole-blood gene expression profiling, microRNA expression, and multiplex serum analytes. Our analysis reveals that previously disclosed gene expression signatures in TB show highly similar patterns in SARC, with a common up-regulation of proinflammatory pathways and IFN signaling and close similarity to TB-related signatures. microRNA expression also presented a highly similar pattern in both diseases, whereas cytokines in the serum of TB patients revealed a slightly elevated proinflammatory pattern compared with SARC and controls. Our results indicate several differences in expression between the two diseases, with increased metabolic activity and significantly higher antimicrobial defense responses in TB. However, matrix metallopeptidase 14 was identified as the most distinctive marker of SARC. Described communalities as well as unique signatures in blood profiles of two distinct inflammatory pulmonary diseases not only have considerable implications for the design of TB biosignatures and future diagnosis, but they also provide insights into biological processes underlying chronic inflammatory disease entities of different etiology.

  20. Recurrent signature patterns in HIV-1 B clade envelope glycoproteins associated with either early or chronic infections.

    Directory of Open Access Journals (Sweden)

    S Gnanakaran

    2011-09-01

    Full Text Available Here we have identified HIV-1 B clade Envelope (Env amino acid signatures from early in infection that may be favored at transmission, as well as patterns of recurrent mutation in chronic infection that may reflect common pathways of immune evasion. To accomplish this, we compared thousands of sequences derived by single genome amplification from several hundred individuals that were sampled either early in infection or were chronically infected. Samples were divided at the outset into hypothesis-forming and validation sets, and we used phylogenetically corrected statistical strategies to identify signatures, systematically scanning all of Env. Signatures included single amino acids, glycosylation motifs, and multi-site patterns based on functional or structural groupings of amino acids. We identified signatures near the CCR5 co-receptor-binding region, near the CD4 binding site, and in the signal peptide and cytoplasmic domain, which may influence Env expression and processing. Two signatures patterns associated with transmission were particularly interesting. The first was the most statistically robust signature, located in position 12 in the signal peptide. The second was the loss of an N-linked glycosylation site at positions 413-415; the presence of this site has been recently found to be associated with escape from potent and broad neutralizing antibodies, consistent with enabling a common pathway for immune escape during chronic infection. Its recurrent loss in early infection suggests it may impact fitness at the time of transmission or during early viral expansion. The signature patterns we identified implicate Env expression levels in selection at viral transmission or in early expansion, and suggest that immune evasion patterns that recur in many individuals during chronic infection when antibodies are present can be selected against when the infection is being established prior to the adaptive immune response.

  1. Comparing Patterns of Natural Selection across Species Using Selective Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Shapiro, Jesse; Alm, Eric J.

    2007-12-01

    Comparing gene expression profiles over many different conditions has led to insights that were not obvious from single experiments. In the same way, comparing patterns of natural selection across a set of ecologically distinct species may extend what can be learned from individual genome-wide surveys. Toward this end, we show how variation in protein evolutionary rates, after correcting for genome-wide effects such as mutation rate and demographic factors, can be used to estimate the level and types of natural selection acting on genes across different species. We identify unusually rapidly and slowly evolving genes, relative to empirically derived genome-wide and gene family-specific background rates for 744 core protein families in 30 c-proteobacterial species. We describe the pattern of fast or slow evolution across species as the"selective signature" of a gene. Selective signatures represent aprofile of selection across species that is predictive of gene function: pairs of genes with correlated selective signatures are more likely to share the same cellular function, and genes in the same pathway can evolve in concert. For example,glycolysis and phenylalanine metabolism genes evolve rapidly in Idiomarina loihiensis, mirroring an ecological shift in carbon source from sugars to amino acids. In a broader context, our results suggest that the genomic landscape is organized into functional modules even at the level of natural selection, and thus it may be easier than expected to understand the complex evolutionary pressures on a cell.

  2. Comparing Patterns of Natural Selection Across Species Using Selective Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Alm, Eric J.; Shapiro, B. Jesse; Alm, Eric J.

    2007-12-18

    Comparing gene expression profiles over many different conditions has led to insights that were not obvious from single experiments. In the same way, comparing patterns of natural selection across a set of ecologically distinct species may extend what can be learned from individual genome-wide surveys. Toward this end, we show how variation in protein evolutionary rates, after correcting for genome-wide effects such as mutation rate and demographic factors, can be used to estimate the level and types of natural selection acting on genes across different species. We identify unusually rapidly and slowly evolving genes, relative to empirically derived genome-wide and gene family-specific background rates for 744 core protein families in 30 gamma-proteobacterial species. We describe the pattern of fast or slow evolution across species as the 'selective signature' of a gene. Selective signatures represent a profile of selection across species that is predictive of gene function: pairs of genes with correlated selective signatures are more likely to share the same cellular function, and genes in the same pathway can evolve in concert. For example, glycolysis and phenylalanine metabolism genes evolve rapidly in Idiomarina loihiensis, mirroring an ecological shift in carbon source from sugars to amino acids. In a broader context, our results suggest that the genomic landscape is organized into functional modules even at the level of natural selection, and thus it may be easier than expected to understand the complex evolutionary pressures on a cell.

  3. Gram-positive bacterial lipoglycans based on a glycosylated diacylglycerol lipid anchor are microbe-associated molecular patterns recognized by TLR2.

    Directory of Open Access Journals (Sweden)

    Landry Blanc

    Full Text Available Innate immune recognition is the first line of host defense against invading microorganisms. It is a based on the detection, by pattern recognition receptors (PRRs, of invariant molecular signatures that are unique to microorganisms. TLR2 is a PRR that plays a major role in the detection of Gram-positive bacteria by recognizing cell envelope lipid-linked polymers, also called macroamphiphiles, such as lipoproteins, lipoteichoic acids and mycobacterial lipoglycans. These microbe-associated molecular patterns (MAMPs display a structure based on a lipid anchor, being either an acylated cysteine, a glycosylated diacylglycerol or a mannosyl-phosphatidylinositol respectively, and having in common a diacylglyceryl moiety. A fourth class of macroamphiphile, namely lipoglycans, whose lipid anchor is made, as for lipoteichoic acids, of a glycosylated diacylglycerol unit rather than a mannosyl-phosphatidylinositol, is found in Gram-positive bacteria and produced by certain Actinobacteria, including Micrococcus luteus, Stomatococcus mucilaginosus and Corynebacterium glutamicum. We report here that these alternative lipoglycans are also recognized by TLR2 and that they stimulate TLR2-dependant cytokine production, including IL-8, TNF-α and IL-6, and cell surface co-stimulatory molecule CD40 expression by a human macrophage cell line. However, they differ by their co-receptor requirement and the magnitude of the innate immune response they elicit. M. luteus and S. mucilaginosus lipoglycans require TLR1 for recognition by TLR2 and induce stronger responses than C. glutamicum lipoglycan, sensing of which by TLR2 is dependent on TLR6. These results expand the repertoire of MAMPs recognized by TLR2 to lipoglycans based on a glycosylated diacylglycerol lipid anchor and reinforce the paradigm that macroamphiphiles based on such an anchor, including lipoteichoic acids and alternative lipoglycans, induce TLR2-dependant innate immune responses.

  4. Movement Pattern Analysis Based on Sequence Signatures

    Directory of Open Access Journals (Sweden)

    Seyed Hossein Chavoshi

    2015-09-01

    Full Text Available Increased affordability and deployment of advanced tracking technologies have led researchers from various domains to analyze the resulting spatio-temporal movement data sets for the purpose of knowledge discovery. Two different approaches can be considered in the analysis of moving objects: quantitative analysis and qualitative analysis. This research focuses on the latter and uses the qualitative trajectory calculus (QTC, a type of calculus that represents qualitative data on moving point objects (MPOs, and establishes a framework to analyze the relative movement of multiple MPOs. A visualization technique called sequence signature (SESI is used, which enables to map QTC patterns in a 2D indexed rasterized space in order to evaluate the similarity of relative movement patterns of multiple MPOs. The applicability of the proposed methodology is illustrated by means of two practical examples of interacting MPOs: cars on a highway and body parts of a samba dancer. The results show that the proposed method can be effectively used to analyze interactions of multiple MPOs in different domains.

  5. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  6. The Signature of Southern Hemisphere Atmospheric Circulation Patterns in Antarctic Precipitation.

    Science.gov (United States)

    Marshall, Gareth J; Thompson, David W J; van den Broeke, Michiel R

    2017-11-28

    We provide the first comprehensive analysis of the relationships between large-scale patterns of Southern Hemisphere climate variability and the detailed structure of Antarctic precipitation. We examine linkages between the high spatial resolution precipitation from a regional atmospheric model and four patterns of large-scale Southern Hemisphere climate variability: the southern baroclinic annular mode, the southern annular mode, and the two Pacific-South American teleconnection patterns. Variations in all four patterns influence the spatial configuration of precipitation over Antarctica, consistent with their signatures in high-latitude meridional moisture fluxes. They impact not only the mean but also the incidence of extreme precipitation events. Current coupled-climate models are able to reproduce all four patterns of atmospheric variability but struggle to correctly replicate their regional impacts on Antarctic climate. Thus, linking these patterns directly to Antarctic precipitation variability may allow a better estimate of future changes in precipitation than using model output alone.

  7. The Arabidopsis Malectin-Like/LRR-RLK IOS1 Is Critical for BAK1-Dependent and BAK1-Independent Pattern-Triggered Immunity

    Science.gov (United States)

    Kadota, Yasuhiro; Huang, Pin-Yao; Chien, Hsiao-Chiao; Chu, Po-Wei; Zimmerli, Laurent

    2016-01-01

    Plasma membrane-localized pattern recognition receptors (PRRs) such as FLAGELLIN SENSING2 (FLS2), EF-TU RECEPTOR (EFR), and CHITIN ELICITOR RECEPTOR KINASE1 (CERK1) recognize microbe-associated molecular patterns (MAMPs) to activate pattern-triggered immunity (PTI). A reverse genetics approach on genes responsive to the priming agent β-aminobutyric acid (BABA) revealed IMPAIRED OOMYCETE SUSCEPTIBILITY1 (IOS1) as a critical PTI player. Arabidopsis thaliana ios1 mutants were hypersusceptible to Pseudomonas syringae bacteria. Accordingly, ios1 mutants showed defective PTI responses, notably delayed upregulation of the PTI marker gene FLG22-INDUCED RECEPTOR-LIKE KINASE1, reduced callose deposition, and mitogen-activated protein kinase activation upon MAMP treatment. Moreover, Arabidopsis lines overexpressing IOS1 were more resistant to bacteria and showed a primed PTI response. In vitro pull-down, bimolecular fluorescence complementation, coimmunoprecipitation, and mass spectrometry analyses supported the existence of complexes between the membrane-localized IOS1 and BRASSINOSTEROID INSENSITIVE1-ASSOCIATED KINASE1 (BAK1)-dependent PRRs FLS2 and EFR, as well as with the BAK1-independent PRR CERK1. IOS1 also associated with BAK1 in a ligand-independent manner and positively regulated FLS2-BAK1 complex formation upon MAMP treatment. In addition, IOS1 was critical for chitin-mediated PTI. Finally, ios1 mutants were defective in BABA-induced resistance and priming. This work reveals IOS1 as a novel regulatory protein of FLS2-, EFR-, and CERK1-mediated signaling pathways that primes PTI activation. PMID:27317676

  8. Contrasting patterns of polymorphism and selection in bacterial-sensing toll-like receptor 4 in two house mouse subspecies

    Czech Academy of Sciences Publication Activity Database

    Fornůsková, Alena; Bryja, Josef; Vinkler, M.; Macholán, Miloš; Piálek, Jaroslav

    2014-01-01

    Roč. 4, č. 14 (2014), s. 2931-2944 ISSN 2045-7758 R&D Projects: GA ČR GA206/08/0640 Institutional support: RVO:68081766 ; RVO:67985904 Keywords : adaptive evolution * arms race * directional selection * host–pathogen interaction * MAMPs * Mus musculus * parasite-mediated selection * pattern-recognition receptors Subject RIV: EG - Zoology Impact factor: 2.320, year: 2014

  9. Using pattern classification and nuclear forensic signatures to link UOC to source rocks and purification processes

    International Nuclear Information System (INIS)

    Marks, N.; Robel, M.; Borg, M.; Hutcheon, I.; Kristo, M.

    2014-01-01

    Nuclear forensics is a scientific discipline interfacing law enforcement, nuclear science and nonproliferation. Information on the history and on the potential origin of unknown nuclear material can be obtained through nuclear forensic analysis. Using commonly available techniques of mass spectrometry, microscopy and x-ray diffraction, we have gained insight into the processing and origin of a suite of uranium ore concentrate (UOC) samples. We have applied chemometric techniques to investigate the relationships between uranium ore deposits and UOC samples in order to identify chemical and isotopic signatures of nuclear forensic importance. We developed multivariate signatures based on elemental concentrations and isotope ratios using a database of characteristics of UOC originating throughout the world. By introducing detailed and specific information about the source rock geology for each sample, we improved our understanding of the preservation of forensic signatures in UOC. Improved characterization of sample processing and provenance allows us to begin to assess the statistical significance of different groupings of samples and identify underlying patterns. Initial results indicate the concentration of uranium in the ore body, the geochemical conditions associated with uranium emplacement, and host rock petrogenesis exert controlling influences on the impurities preserved in UOC. Specific ore processing techniques, particularly those related to In-Situ Recovery, are also reflected in UOC impurity signatures. Stable and radiogenic isotope geochemistry can be used in conjunction with rare earth element patterns and other characteristics to link UOCs to specific geologic deposits of origin. We will present a number of case studies illustrating the ways in which nuclear forensic analysis can provide insight into the ore geology and production and purification processes used to produce UOC. (author)

  10. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  11. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  12. The Energy Deposition Pattern as the Unconventional Strangelet Signature and its Relevance to the Castor Calorimeter

    International Nuclear Information System (INIS)

    Angelis, A.L.S.; Bartke, J.; Gladysz-Dziadus, E.; Wlodarczyk, Z.

    1998-07-01

    It has been shown, by GEANT simulations, that the energy deposition pattern in deep calorimeters could be the spectacular and unconventional signature of different kinds of stable and unstable strangelets. The CASTOR calorimeter is shown to be the appropriate tool for detection of strongly penetrating objects, such as strangelets possibly produced in the baryon-rich region in central Pb-Pb collisions at LHC energies. (author)

  13. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  14. Signature of dislocations and stacking faults of face-centred cubic nanocrystals in coherent X-ray diffraction patterns: a numerical study.

    Science.gov (United States)

    Dupraz, Maxime; Beutier, Guillaume; Rodney, David; Mordehai, Dan; Verdier, Marc

    2015-06-01

    Crystal defects induce strong distortions in diffraction patterns. A single defect alone can yield strong and fine features that are observed in high-resolution diffraction experiments such as coherent X-ray diffraction. The case of face-centred cubic nanocrystals is studied numerically and the signatures of typical defects close to Bragg positions are identified. Crystals of a few tens of nanometres are modelled with realistic atomic potentials and 'relaxed' after introduction of well defined defects such as pure screw or edge dislocations, or Frank or prismatic loops. Diffraction patterns calculated in the kinematic approximation reveal various signatures of the defects depending on the Miller indices. They are strongly modified by the dissociation of the dislocations. Selection rules on the Miller indices are provided, to observe the maximum effect of given crystal defects in the initial and relaxed configurations. The effect of several physical and geometrical parameters such as stacking fault energy, crystal shape and defect position are discussed. The method is illustrated on a complex structure resulting from the simulated nanoindentation of a gold nanocrystal.

  15. Relationship Between Methamphetamine Use and Risky Sexual Behavior in Adolescents

    Directory of Open Access Journals (Sweden)

    Cheng-Fang Yen

    2004-04-01

    Full Text Available Substance abuse and risky sexual behavior have been identified as behaviors that can endanger adolescent psychosocial development. This study examined the relationship between methamphetamine (MAMP use and risky sexual behavior in adolescents. Risky sexual behavior was compared not only between MAMP users and non-users, but also between high-frequency and low-frequency MAMP users. We compared the sexual intercourse histories of 85 adolescents formally charged as MAMP users with those of 170 gender-matched adolescents with no record of MAMP use. MAMP usage characteristics were compared between users who had and those who had not experienced sexual intercourse. Previous sexual experience was more likely in MAMP users than in non-users. MAMP users were also more likely to have had a greater total number of sexual partners and were more likely to have had unplanned sex under the influence of alcohol. High-frequency MAMP use was associated with increased tendencies to engage in unprotected sex and to use MAMP before sexual intercourse. In general, the chance of sexual intercourse increased in proportion to frequency of MAMP use. Given the clear link between MAMP use and risky sexual behavior, risk-reduction programs directed at teen MAMP users are urgently needed.

  16. Kinematic signature of a rotating bar near a resonance

    Science.gov (United States)

    Weinberg, Martin D.

    1994-01-01

    Recent work based on H I, star count and emission data suggests that the Milky Way has rotating bar-like features. In this paper, I show that such features cause distinctive stellar kinematic signatures near Outer Lindblad Resonance (OLR) and Inner Lindblad Resonance (ILR). The effect of these resonances may be observable far from the peak density of the pattern and relatively nearby the solar position. The details of the kinematic signatures depend on the evolutionary history of the 'bar' and therefore velocity data, both systematic and velocity dispersion, may be used to probe the evolutionary history as well as the present state of Galaxy. Kinematic models for a variety of sample scenarios are presented. Models with evolving pattern speeds show significantly stronger dispersion signatures than those with static pattern speeds, suggesting that useful observational constraints are possible. The models are applied to the proposed rotating spheroid and bar models; we find (1) none of these models chosen to represent the proposed large-scale rotating spheroid are consistent with the stellar kinematics and (2) a Galactic bar with semimajor axis of 3 kpc will cause a large increase in velocity dispersion in the vicinity of OLR (approximately 5 kpc) with little change in the net radial motion and such a signature is suggested by K-giant velocity data. Potential future observations and analyses are discussed.

  17. Changes in Diversification Patterns and Signatures of Selection during the Evolution of Murinae-Associated Hantaviruses

    Directory of Open Access Journals (Sweden)

    Guillaume Castel

    2014-03-01

    Full Text Available In the last 50 years, hantaviruses have significantly affected public health worldwide, but the exact extent of the distribution of hantavirus diseases, species and lineages and the risk of their emergence into new geographic areas are still poorly known. In particular, the determinants of molecular evolution of hantaviruses circulating in different geographical areas or different host species are poorly documented. Yet, this understanding is essential for the establishment of more accurate scenarios of hantavirus emergence under different climatic and environmental constraints. In this study, we focused on Murinae-associated hantaviruses (mainly Seoul Dobrava and Hantaan virus using sequences available in GenBank and conducted several complementary phylogenetic inferences. We sought for signatures of selection and changes in patterns and rates of diversification in order to characterize hantaviruses’ molecular evolution at different geographical scales (global and local. We then investigated whether these events were localized in particular geographic areas. Our phylogenetic analyses supported the assumption that RNA virus molecular variations were under strong evolutionary constraints and revealed changes in patterns of diversification during the evolutionary history of hantaviruses. These analyses provide new knowledge on the molecular evolution of hantaviruses at different scales of time and space.

  18. Chiral Analysis of Methamphetamine in Oral Fluid Samples: A Method to Distinguish Licit from Illicit Drug Use.

    Science.gov (United States)

    Borg, Damon; Kolb, Elizabeth; Lantigua, Cindy; Stripp, Richard

    2018-01-01

    Methamphetamine (MAMP) is a popular illicit drug abused for its central nervous system stimulating effects. MAMP is also used therapeutically in the treatment of overeating disorders, narcolepsy, attention deficit disorder, in over-the-counter (OTC) products to ease nasal congestion. MAMP exists in two enantiomeric forms, dextrorotary (d-MAMP) or levorotary (l-MAMP). The compounds are similar in chemical structure, simply differing in the orientation of functional groups around the asymmetric carbon. In part because of the availability of l-MAMP in OTC nasal inhalers, forensic guidelines require a sample to contain greater than 20% d-MAMP to consider illicit drug use when interpreting results. Standard analytical methods readily detect MAMP in biological specimens but cannot resolve the enantiomeric composition of the sample. Specialized analytical techniques based on chiral separation of the enantiomers are required to differentiate d-MAMP from l-MAMP. Our laboratory sought to develop and validate a method for the analysis of oral fluid specimens for d/l-MAMP using a chiral derivatizing agent and traditional reverse phase liquid chromatography tandem mass spectrometry (LC-MS-MS). MAMP was extracted from dilute oral fluid samples using Strata-XC solid phase extraction (SPE) cartridges and derivatized with Marfey's reagent. Chromatographic separation was achieved using Zorbax Eclipse Plus C18 columns. Linearity, accuracy and precision, recovery, matrix effects and specificity of the method were all within acceptable criteria. Intraday accuracy ranged from 93.3 to 103.4% and precision 0.1 to 1.6%. Interday accuracy ranged from 90.0 to 103.4% and precision 3.8 to 11.6%. Finally, having previously tested positive for MAMP using non-chiral analysis, 256 de-identified authentic oral fluid samples were analyzed using this validated method. 98% of all samples tested positive for d-MAMP at greater than 20%.

  19. Signatures of selection in loci governing major colour patterns in Heliconius butterflies and related species

    Directory of Open Access Journals (Sweden)

    Joron Mathieu

    2010-11-01

    Full Text Available Abstract Background Protein-coding change is one possible genetic mechanism underlying the evolution of adaptive wing colour pattern variation in Heliconius butterflies. Here we determine whether 38 putative genes within two major Heliconius patterning loci, HmYb and HmB, show evidence of positive selection. Ratios of nonsynonymous to synonymous nucleotide changes (ω were used to test for selection, as a means of identifying candidate genes within each locus that control wing pattern. Results Preliminary analyses using 454 transcriptome and Bacterial Artificial Chromosome (BAC sequences from three Heliconius species highlighted a cluster of genes within each region showing relatively higher rates of sequence evolution. Other genes within the region appear to be highly constrained, and no ω estimates exceeded one. Three genes from each locus with the highest average pairwise ω values were amplified from additional Heliconius species and races. Two selected genes, fizzy-like (HmYb and DALR (HmB, were too divergent for amplification across species and were excluded from further analysis. Amongst the remaining genes, HM00021 and Kinesin possessed the highest background ω values within the HmYb and HmB loci, respectively. After accounting for recombination, these two genes both showed evidence of having codons with a signature of selection, although statistical support for this signal was not strong in any case. Conclusions Tests of selection reveal a cluster of candidate genes in each locus, suggesting that weak directional selection may be occurring within a small region of each locus, but coding changes alone are unlikely to explain the full range of wing pattern diversity. These analyses pinpoint many of the same genes believed to be involved in the control of colour patterning in Heliconius that have been identified through other studies implementing different research methods.

  20. Immunity in the moss Physcomitrella patens

    DEFF Research Database (Denmark)

    Bressendorff, Simon

    model system, we identify and create targeted knock out of nine Physcomitrella homologs of defense related Arabidopsis genes. The knock-out lines are assessed for altered immune responses to a range of different pathogens. We find that at least one Physcomitrella mitogen activated protein kinase (MPK...... molecular patterns (MAMPs) including fungal chitin and bacterial MAMPs. The knock out of PpMPK4A renders the moss more susceptible to the pathogenic fungi Botrytis cinerea and Alternaria brassicicola and fails to accumulate several defense related transcripts and ROS production upon treatment with fungal...... to MAMP-triggered immunity, and the moss may use other signaling components to respond to abiotic stresses. In addition, a Physcomitrella knock-out of a homolog of the autophagy related gene ATG5 provides the first analysis of autophagy in non-vascular plants. PpATG5 knock-out mutants show clear signs...

  1. Tumor image signatures and habitats: a processing pipeline of multimodality metabolic and physiological images.

    Science.gov (United States)

    You, Daekeun; Kim, Michelle M; Aryal, Madhava P; Parmar, Hemant; Piert, Morand; Lawrence, Theodore S; Cao, Yue

    2018-01-01

    To create tumor "habitats" from the "signatures" discovered from multimodality metabolic and physiological images, we developed a framework of a processing pipeline. The processing pipeline consists of six major steps: (1) creating superpixels as a spatial unit in a tumor volume; (2) forming a data matrix [Formula: see text] containing all multimodality image parameters at superpixels; (3) forming and clustering a covariance or correlation matrix [Formula: see text] of the image parameters to discover major image "signatures;" (4) clustering the superpixels and organizing the parameter order of the [Formula: see text] matrix according to the one found in step 3; (5) creating "habitats" in the image space from the superpixels associated with the "signatures;" and (6) pooling and clustering a matrix consisting of correlation coefficients of each pair of image parameters from all patients to discover subgroup patterns of the tumors. The pipeline was applied to a dataset of multimodality images in glioblastoma (GBM) first, which consisted of 10 image parameters. Three major image "signatures" were identified. The three major "habitats" plus their overlaps were created. To test generalizability of the processing pipeline, a second image dataset from GBM, acquired on the scanners different from the first one, was processed. Also, to demonstrate the clinical association of image-defined "signatures" and "habitats," the patterns of recurrence of the patients were analyzed together with image parameters acquired prechemoradiation therapy. An association of the recurrence patterns with image-defined "signatures" and "habitats" was revealed. These image-defined "signatures" and "habitats" can be used to guide stereotactic tissue biopsy for genetic and mutation status analysis and to analyze for prediction of treatment outcomes, e.g., patterns of failure.

  2. Distinct mutational signatures characterize concurrent loss of polymerase proofreading and mismatch repair.

    Science.gov (United States)

    Haradhvala, N J; Kim, J; Maruvka, Y E; Polak, P; Rosebrock, D; Livitz, D; Hess, J M; Leshchiner, I; Kamburov, A; Mouw, K W; Lawrence, M S; Getz, G

    2018-05-01

    Fidelity of DNA replication is maintained using polymerase proofreading and the mismatch repair pathway. Tumors with loss of function of either mechanism have elevated mutation rates with characteristic mutational signatures. Here we report that tumors with concurrent loss of both polymerase proofreading and mismatch repair function have mutational patterns that are not a simple sum of the signatures of the individual alterations, but correspond to distinct, previously unexplained signatures: COSMIC database signatures 14 and 20. We then demonstrate that in all five cases in which the chronological order of events could be determined, polymerase epsilon proofreading alterations precede the defect in mismatch repair. Overall, we illustrate that multiple distinct mutational signatures can result from different combinations of a smaller number of mutational processes (of either damage or repair), which can influence the interpretation and discovery of mutational signatures.

  3. A Prototype of Mathematical Treatment of Pen Pressure Data for Signature Verification.

    Science.gov (United States)

    Li, Chi-Keung; Wong, Siu-Kay; Chim, Lai-Chu Joyce

    2018-01-01

    A prototype using simple mathematical treatment of the pen pressure data recorded by a digital pen movement recording device was derived. In this study, a total of 48 sets of signature and initial specimens were collected. Pearson's correlation coefficient was used to compare the data of the pen pressure patterns. From the 820 pair comparisons of the 48 sets of genuine signatures, a high degree of matching was found in which 95.4% (782 pairs) and 80% (656 pairs) had rPA > 0.7 and rPA > 0.8, respectively. In the comparison of the 23 forged signatures with their corresponding control signatures, 20 of them (89.2% of pairs) had rPA values prototype could be used as a complementary technique to improve the objectivity of signature examination and also has a good potential to be developed as a tool for automated signature identification. © 2017 American Academy of Forensic Sciences.

  4. Supernova signatures of neutrino mass ordering

    Science.gov (United States)

    Scholberg, Kate

    2018-01-01

    A suite of detectors around the world is poised to measure the flavor-energy-time evolution of the ten-second burst of neutrinos from a core-collapse supernova occurring in the Milky Way or nearby. Next-generation detectors to be built in the next decade will have enhanced flavor sensitivity and statistics. Not only will the observation of this burst allow us to peer inside the dense matter of the extreme event and learn about the collapse processes and the birth of the remnant, but the neutrinos will bring information about neutrino properties themselves. This review surveys some of the physical signatures that the currently-unknown neutrino mass pattern will imprint on the observed neutrino events at Earth, emphasizing the most robust and least model-dependent signatures of mass ordering.

  5. Reading the viral signature by Toll-like receptors and other pattern recognition receptors.

    Science.gov (United States)

    Mogensen, Trine H; Paludan, Søren R

    2005-03-01

    Successful host defense against viral infections relies on early production of type I interferon (IFN) and subsequent activation of a cellular cytotoxic response. The acute IFN and inflammatory response against virus infections is mediated by cellular pattern-recognition receptors (PRRs) that recognize specific molecular structures on viral particles or products of viral replication. Toll-like receptors (TLRs) constitute a class of membrane-bound PRRs capable of detecting microbial infections. While TLR2 and TLR4, which were first identified to recognize Gram-positive and Gram-negative bacteria, respectively, sense specific viral proteins on the cell surface, TLRs 3, 7, 8, and 9 serve as receptors for viral nucleic acids in endosomic compartments. In addition to TLRs, cells express cytoplasmic PRRs such as the RNA helicase retinoic acid inducible gene I and the kinase double-stranded RNA-activated protein kinase R, both of which sense dsRNA, a characteristic signature of viral replication, and initiate a protective cellular response. Here we review the recent progress in our understanding of PRRs and viral infections and discuss the molecular and cellular responses evoked by virus-activated PRRs. Finally, we look into what is currently known about the role of PRRs in viral infections in vivo.

  6. Multiple-Active Multiple-Passive Antenna Systems and Applications

    DEFF Research Database (Denmark)

    Tsakalaki, Elpiniki

    2013-01-01

    -passive (MAMP) antenna topologies, as explained in Sect. 8.1. Then, Sect. 8.2 proposes MAMP antenna structures with application to reconfigurable MIMO transmission in the presence of antenna mutual coupling under poor scattering channel conditions. For this purpose, the section presents an adaptive MAMP antenna...... system capable of changing its transmission parameters via passive radiators attached to tunable loads, according to the structure of the RF propagation channel. The hybrid MAMP array structure can be tractably analyzed using the active element response vector (instead of the classical steering vector...... adaptive MAMP system can be limited to practical dimensions whereas the passive antennas require no extra RF hardware, thus meeting the cost, space, and power constrains of the users’ mobile terminals. The simulation results show that the adaptive MAMP system, thanks to its “adaptivity”, is able to achieve...

  7. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  8. Algorithms for Hyperspectral Endmember Extraction and Signature Classification with Morphological Dendritic Networks

    Science.gov (United States)

    Schmalz, M.; Ritter, G.

    Accurate multispectral or hyperspectral signature classification is key to the nonimaging detection and recognition of space objects. Additionally, signature classification accuracy depends on accurate spectral endmember determination [1]. Previous approaches to endmember computation and signature classification were based on linear operators or neural networks (NNs) expressed in terms of the algebra (R, +, x) [1,2]. Unfortunately, class separation in these methods tends to be suboptimal, and the number of signatures that can be accurately classified often depends linearly on the number of NN inputs. This can lead to poor endmember distinction, as well as potentially significant classification errors in the presence of noise or densely interleaved signatures. In contrast to traditional CNNs, autoassociative morphological memories (AMM) are a construct similar to Hopfield autoassociatived memories defined on the (R, +, ?,?) lattice algebra [3]. Unlimited storage and perfect recall of noiseless real valued patterns has been proven for AMMs [4]. However, AMMs suffer from sensitivity to specific noise models, that can be characterized as erosive and dilative noise. On the other hand, the prior definition of a set of endmembers corresponds to material spectra lying on vertices of the minimum convex region covering the image data. These vertices can be characterized as morphologically independent patterns. It has further been shown that AMMs can be based on dendritic computation [3,6]. These techniques yield improved accuracy and class segmentation/separation ability in the presence of highly interleaved signature data. In this paper, we present a procedure for endmember determination based on AMM noise sensitivity, which employs morphological dendritic computation. We show that detected endmembers can be exploited by AMM based classification techniques, to achieve accurate signature classification in the presence of noise, closely spaced or interleaved signatures, and

  9. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  10. Characterization of geostationary particle signatures based on the 'injection boundary' model

    International Nuclear Information System (INIS)

    Mauk, B.H.; Meng, C.

    1983-01-01

    To lend further support to the 'injection boundary' concept, this paper characterizes the details of geostationary particle signatures using a very simple-minded analysis procedure. The signatures are generated using the time of flight effects which evolve from an initial sharply defined, double-spiraled boundary configuration. By using only the most fundamental characteristics of standard convection configurations, the very complex and highly variable dispersion patterns frequently observed by geostationary satellites are successfully reproduced. In particular, seven distinctly different ion-electron paired dispersion patterns on energy versus time spectrograms (1 eV to 100 KeV) are predicted, and all seven of these are observed on a regular basis by both the SCATHA satellite (in the near geostationary orbit) and the ATS-6 satellite. Many of the details of the patterns have not been previously presented. It is concluded that most dynamical dispersion features (including energetic ion and electron echoes) can be mapped to the double-spiral boundary without further ad hoc assumptions. It is shown further that the predicted and observed dispersion patterns have symmetries which are distinct from the symmetries generally associated with the quasistationary particle convection patterns

  11. The spectrum of genomic signatures: from dinucleotides to chaos game representation.

    Science.gov (United States)

    Wang, Yingwei; Hill, Kathleen; Singh, Shiva; Kari, Lila

    2005-02-14

    In the post genomic era, access to complete genome sequence data for numerous diverse species has opened multiple avenues for examining and comparing primary DNA sequence organization of entire genomes. Previously, the concept of a genomic signature was introduced with the observation of species-type specific Dinucleotide Relative Abundance Profiles (DRAPs); dinucleotides were identified as the subsequences with the greatest bias in representation in a majority of genomes. Herein, we demonstrate that DRAP is one particular genomic signature contained within a broader spectrum of signatures. Within this spectrum, an alternative genomic signature, Chaos Game Representation (CGR), provides a unique visualization of patterns in sequence organization. A genomic signature is associated with a particular integer order or subsequence length that represents a measure of the resolution or granularity in the analysis of primary DNA sequence organization. We quantitatively explore the organizational information provided by genomic signatures of different orders through different distance measures, including a novel Image Distance. The Image Distance and other existing distance measures are evaluated by comparing the phylogenetic trees they generate for 26 complete mitochondrial genomes from a diversity of species. The phylogenetic tree generated by the Image Distance is compatible with the known relatedness of species. Quantitative evaluation of the spectrum of genomic signatures may be used to ultimately gain insight into the determinants and biological relevance of the genome signatures.

  12. Vectorial secretion of interleukin-8 (IL-8 or CXCL8) mediates homeostatic effects on the intestinal epithelium via apically located CXCR1

    NARCIS (Netherlands)

    Baarlen, van Peter; Rossi, Oriana; Wells, Jerry

    2014-01-01

    CXCL8 is produced by many cell types including epithelial, endothelial, fibroblasts and macrophages in response to TLR recognition of microbe-associated molecular patterns (MAMPs) or inflammatory cytokines and recruits phagocytes from the vasculature to sites of infection via interaction with its

  13. An Airborne Campaign Measuring Wind Signatures from the Sea Surface using an L-band Polarimetric Radiometer

    DEFF Research Database (Denmark)

    Søbjærg, Sten Schmidl; Skou, Niels

    2003-01-01

    A series of circle flights have been carried out over the sea surface, using the EMIRAD L-band polarimetric radiometer. Motion compensation is applied, and polarimetric azimuth signatures are generated. Single tracks show geophysical noise, typically about 2 K, but averaging decreases the noise, ......, but a comparison of the signature to the downwelling galactic background radiation indicates, that the signature may not origin from the wind driven sea surface pattern....

  14. Signature effects in 2qp bands of doubly even rare-earth nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Kalra, Kawalpreet [Amity University, AUUP, Department of Physics, Amity Institute of Applied Sciences (AIAS), Noida (India); Goel, Alpana [Amity University, AUUP, Amity Institute of Nuclear Science and Technology (AINST), Noida (India); Jain, A.K. [Indian Institute of Technology (IIT), Department of Physics, Roorkee (India)

    2016-12-15

    The two-quasiparticle rotational bands in deformed doubly even nuclei in the rare-earth region have been studied in detail. A number of interesting features like odd-even staggering and signature inversion have been observed. The phenomenon of signature inversion/reversal is observed experimentally in {sup 162}{sub 66}Dy, {sup 170}{sub 70}Yb and {sup 170}{sub 74}W in even-even nuclei. Two quasiparticle plus rotor model (TQPRM) calculations are carried out to explain the reverse pattern of signature in {sup 170}{sub 74}W for the rotational band having configuration {(h_1_1_/_2)_p x (d_5_/_2)_p}. (orig.)

  15. A mutational signature reveals alterations underlying deficient homologous recombination repair in breast cancer.

    Science.gov (United States)

    Polak, Paz; Kim, Jaegil; Braunstein, Lior Z; Karlic, Rosa; Haradhavala, Nicholas J; Tiao, Grace; Rosebrock, Daniel; Livitz, Dimitri; Kübler, Kirsten; Mouw, Kent W; Kamburov, Atanas; Maruvka, Yosef E; Leshchiner, Ignaty; Lander, Eric S; Golub, Todd R; Zick, Aviad; Orthwein, Alexandre; Lawrence, Michael S; Batra, Rajbir N; Caldas, Carlos; Haber, Daniel A; Laird, Peter W; Shen, Hui; Ellisen, Leif W; D'Andrea, Alan D; Chanock, Stephen J; Foulkes, William D; Getz, Gad

    2017-10-01

    Biallelic inactivation of BRCA1 or BRCA2 is associated with a pattern of genome-wide mutations known as signature 3. By analyzing ∼1,000 breast cancer samples, we confirmed this association and established that germline nonsense and frameshift variants in PALB2, but not in ATM or CHEK2, can also give rise to the same signature. We were able to accurately classify missense BRCA1 or BRCA2 variants known to impair homologous recombination (HR) on the basis of this signature. Finally, we show that epigenetic silencing of RAD51C and BRCA1 by promoter methylation is strongly associated with signature 3 and, in our data set, was highly enriched in basal-like breast cancers in young individuals of African descent.

  16. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  17. Spectral signature verification using statistical analysis and text mining

    Science.gov (United States)

    DeCoster, Mallory E.; Firpi, Alexe H.; Jacobs, Samantha K.; Cone, Shelli R.; Tzeng, Nigel H.; Rodriguez, Benjamin M.

    2016-05-01

    In the spectral science community, numerous spectral signatures are stored in databases representative of many sample materials collected from a variety of spectrometers and spectroscopists. Due to the variety and variability of the spectra that comprise many spectral databases, it is necessary to establish a metric for validating the quality of spectral signatures. This has been an area of great discussion and debate in the spectral science community. This paper discusses a method that independently validates two different aspects of a spectral signature to arrive at a final qualitative assessment; the textual meta-data and numerical spectral data. Results associated with the spectral data stored in the Signature Database1 (SigDB) are proposed. The numerical data comprising a sample material's spectrum is validated based on statistical properties derived from an ideal population set. The quality of the test spectrum is ranked based on a spectral angle mapper (SAM) comparison to the mean spectrum derived from the population set. Additionally, the contextual data of a test spectrum is qualitatively analyzed using lexical analysis text mining. This technique analyzes to understand the syntax of the meta-data to provide local learning patterns and trends within the spectral data, indicative of the test spectrum's quality. Text mining applications have successfully been implemented for security2 (text encryption/decryption), biomedical3 , and marketing4 applications. The text mining lexical analysis algorithm is trained on the meta-data patterns of a subset of high and low quality spectra, in order to have a model to apply to the entire SigDB data set. The statistical and textual methods combine to assess the quality of a test spectrum existing in a database without the need of an expert user. This method has been compared to other validation methods accepted by the spectral science community, and has provided promising results when a baseline spectral signature is

  18. Voluntary Enhancement of Neural Signatures of Affiliative Emotion Using fMRI Neurofeedback

    Science.gov (United States)

    Moll, Jorge; Weingartner, Julie H.; Bado, Patricia; Basilio, Rodrigo; Sato, João R.; Melo, Bruno R.; Bramati, Ivanei E.; de Oliveira-Souza, Ricardo; Zahn, Roland

    2014-01-01

    In Ridley Scott’s film “Blade Runner”, empathy-detection devices are employed to measure affiliative emotions. Despite recent neurocomputational advances, it is unknown whether brain signatures of affiliative emotions, such as tenderness/affection, can be decoded and voluntarily modulated. Here, we employed multivariate voxel pattern analysis and real-time fMRI to address this question. We found that participants were able to use visual feedback based on decoded fMRI patterns as a neurofeedback signal to increase brain activation characteristic of tenderness/affection relative to pride, an equally complex control emotion. Such improvement was not observed in a control group performing the same fMRI task without neurofeedback. Furthermore, the neurofeedback-driven enhancement of tenderness/affection-related distributed patterns was associated with local fMRI responses in the septohypothalamic area and frontopolar cortex, regions previously implicated in affiliative emotion. This demonstrates that humans can voluntarily enhance brain signatures of tenderness/affection, unlocking new possibilities for promoting prosocial emotions and countering antisocial behavior. PMID:24847819

  19. Azo polymers with electronical push and pull structures prepared via RAFT polymerization and its photoinduced birefringence behavior

    Directory of Open Access Journals (Sweden)

    2008-08-01

    Full Text Available Two methacrylate monomers containing azo and electronical push and pull structure, e.g. 2-Methyl-acrylic-acid-2-{[4-(4-cyano-phenylazo-3-methyl-phenyl]-ethyl-amino-ethyl ester (MACP with cyano substituted and 2-Methylacrylic-acid-2-{ethyl-[4-(4-methoxy-phenylazo-3-methyl-phenyl]-amino}-ethyl ester (MAMP with methoxy substituted, were synthesized and polymerized using 2-cyanoprop-2-yl dithiobenzoate (CPDB as chain transfer agent and 2,2'-azobisisobutyronitrile (AIBN as initiator. The results showed that the polymerization displayed characteristics of ‘living’/controlled free radical polymerization. Thus, the obtained polymers, polyMACP (pMACP and polyMAMP (pMAMP, had controlled molecular weights and narrow molecular weights distribution. The chain extension experiments of pMACP and pMAMP using styrene as the second monomer were successfully carried out. The photo-induced trans-cis-trans isomerization kinetic of pMACP and pMAMP in chloroform solution were described. Marked differences in rate for the trans-cis and cis-trans isomerization of pMACP and pMAMP were observed in chloroform solution due to the different electronic effects in these two polymers. Photoinduced birefringence and surface relief grating (SRG of the pMACP and pMAMP were investigated in thin film state.

  20. Organic and Isotopic Signatures of Life: Lessons from the Early Earth

    Science.gov (United States)

    Freeman, K. H.; Eigenbrode, J. L.; House, C. H.

    2002-12-01

    In the study of life on earth, isotopic analyses of organic biomarkers provide essential insight to their biological and environmental provenance. Isotopic analyses of organic materials on other planets present a number of challenges, both analytical and interpretive. Prebiotic planetary organic materials can derive from condensation reactions and by delivery through meteorites or interplanetary dust, with the relative importance of each influenced by the oxidation state of the atmosphere. Material delivered to planets can have an interstellar origin, although it is dominated by compounds influenced by the formation of the solar system. Each of these processes impact molecular isotopic signatures and must be considered in life-detection strategies. Pronounced effects are observed for hydrogen isotopes, with smaller fractionations observed for other elements. Theoretical, laboratory and observational studies of non-terrean materials are essential to further understand molecular isotopic heterogeneity associated with these exclusively abiotic processes. Studies of Archean-aged samples provide an important resource for interpreting molecular isotopic patterns as signatures of life processes. Carbon assimilation and biomass synthesis from simple precursor compounds typically discriminate against 13C. This generality, however, is complicated by the observations of a wide range of fractionation factors associated with important microbial carbon-uptake processes. Metabolic processes further distribute isotopic signatures, such that wide isotopic heterogeneity is observed among cellular biochemical constituents. In addition, preservation/contamination concerns dominate studies of very ancient organic matter, as they likely will in life-detection studies. However, both biochemical heterogeneity and sample integrity can be addressed by considering patterns from different paleoenvironments. Molecular results demonstrate that Late Archean microbial life on this planet was

  1. Signatures of quantum radiation reaction in laser-electron-beam collisions

    International Nuclear Information System (INIS)

    Wang, H. Y.; Yan, X. Q.; Zepf, M.

    2015-01-01

    Electron dynamics in the collision of an electron beam with a high-intensity focused ultrashort laser pulse are investigated using three-dimensional QED particle-in-cell (PIC) simulations, and the results are compared with those calculated by classical Landau and Lifshitz PIC simulations. Significant differences are observed from the angular dependence of the electron energy distribution patterns for the two different approaches, because photon emission is no longer well approximated by a continuous process in the quantum radiation-dominated regime. The stochastic nature of photon emission results in strong signatures of quantum radiation-reaction effects under certain conditions. We show that the laser spot size and duration greatly influence these signatures due to the competition of QED effects and the ponderomotive force, which is well described in the classical approximation. The clearest signatures of quantum radiation reaction are found in the limit of large laser spots and few cycle pulse durations

  2. Natural variation for responsiveness to flg22, flgII-28, and csp22 and Pseudomonas syringae pv. tomato in heirloom tomatoes.

    Directory of Open Access Journals (Sweden)

    Selvakumar Veluchamy

    Full Text Available Tomato (Solanum lycopersicum L. is susceptible to many diseases including bacterial speck caused by Pseudomonas syringae pv. tomato. Bacterial speck disease is a serious problem worldwide in tomato production areas where moist conditions and cool temperatures occur. To enhance breeding of speck resistant fresh-market tomato cultivars we identified a race 0 field isolate, NC-C3, of P. s. pv. tomato in North Carolina and used it to screen a collection of heirloom tomato lines for speck resistance in the field. We observed statistically significant variation among the heirloom tomatoes for their response to P. s. pv. tomato NC-C3 with two lines showing resistance approaching a cultivar that expresses the Pto resistance gene, although none of the heirloom lines have Pto. Using an assay that measures microbe-associated molecular pattern (MAMP-induced production of reactive oxygen species (ROS, we investigated whether the heirloom lines showed differential responsiveness to three bacterial-derived peptide MAMPs: flg22 and flgII-28 (from flagellin and csp22 (from cold shock protein. Significant differences were observed for MAMP responsiveness among the lines, although these differences did not correlate strongly with resistance or susceptibility to bacterial speck disease. The identification of natural variation for MAMP responsiveness opens up the possibility of using a genetic approach to identify the underlying loci and to facilitate breeding of cultivars with enhanced disease resistance. Towards this goal, we discovered that responsiveness to csp22 segregates as a single locus in an F2 population of tomato.

  3. Soft sweeps III: the signature of positive selection from recurrent mutation.

    Directory of Open Access Journals (Sweden)

    Pleuni S Pennings

    2006-12-01

    Full Text Available Polymorphism data can be used to identify loci at which a beneficial allele has recently gone to fixation, given that an accurate description of the signature of selection is available. In the classical model that is used, a favored allele derives from a single mutational origin. This ignores the fact that beneficial alleles can enter a population recurrently by mutation during the selective phase. In this study, we present a combination of analytical and simulation results to demonstrate the effect of adaptation from recurrent mutation on summary statistics for polymorphism data from a linked neutral locus. We also analyze the power of standard neutrality tests based on the frequency spectrum or on linkage disequilibrium (LD under this scenario. For recurrent beneficial mutation at biologically realistic rates, we find substantial deviations from the classical pattern of a selective sweep from a single new mutation. Deviations from neutrality in the level of polymorphism and in the frequency spectrum are much less pronounced than in the classical sweep pattern. In contrast, for levels of LD, the signature is even stronger if recurrent beneficial mutation plays a role. We suggest a variant of existing LD tests that increases their power to detect this signature.

  4. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  5. Topographic Signatures of Meandering Rivers with Differences in Outer Bank Cohesion

    Science.gov (United States)

    Kelly, S. A.; Belmont, P.

    2014-12-01

    Within a given valley setting, interactions between river hydraulics, sediment, topography, and vegetation determine attributes of channel morphology, including planform, width and depth, slope, and bed and bank properties. These feedbacks also govern river behavior, including migration and avulsion. Bank cohesion, from the addition of fine sediment and/or vegetation has been recognized in flume experiments as a necessary component to create and maintain a meandering channel planform. Greater bank cohesion slows bank erosion, limiting the rate at which a river can adjust laterally and preventing so-called "runaway widening" to a braided state. Feedbacks of bank cohesion on channel hydraulics and sediment transport may thus produce distinct topographic signatures, or patterns in channel width, depth, and point bar transverse slope. We expect that in bends of greater outer bank cohesion the channel will be narrower, deeper, and bars will have greater transverse slopes. Only recently have we recognized that biotic processes may imprint distinct topographic signatures on the landscape. This study explores topographic signatures of three US rivers: the lower Minnesota River, near Mankato, MN, the Le Sueur River, south central MN, and the Fall River, Rocky Mountain National Park, CO. Each of these rivers has variability in outer bank cohesion, quantified based on geotechnical and vegetation properties, and in-channel topography, which was derived from rtkGPS and acoustic bathymetry surveys. We present methods for incorporating biophysical feedbacks into geomorphic transport laws so that models can better simulate the spatial patterns and variability of topographic signatures.

  6. Genetic signatures in the envelope glycoproteins of HIV-1 that associate with broadly neutralizing antibodies.

    Directory of Open Access Journals (Sweden)

    S Gnanakaran

    Full Text Available A steady increase in knowledge of the molecular and antigenic structure of the gp120 and gp41 HIV-1 envelope glycoproteins (Env is yielding important new insights for vaccine design, but it has been difficult to translate this information to an immunogen that elicits broadly neutralizing antibodies. To help bridge this gap, we used phylogenetically corrected statistical methods to identify amino acid signature patterns in Envs derived from people who have made potently neutralizing antibodies, with the hypothesis that these Envs may share common features that would be useful for incorporation in a vaccine immunogen. Before attempting this, essentially as a control, we explored the utility of our computational methods for defining signatures of complex neutralization phenotypes by analyzing Env sequences from 251 clonal viruses that were differentially sensitive to neutralization by the well-characterized gp120-specific monoclonal antibody, b12. We identified ten b12-neutralization signatures, including seven either in the b12-binding surface of gp120 or in the V2 region of gp120 that have been previously shown to impact b12 sensitivity. A simple algorithm based on the b12 signature pattern was predictive of b12 sensitivity/resistance in an additional blinded panel of 57 viruses. Upon obtaining these reassuring outcomes, we went on to apply these same computational methods to define signature patterns in Env from HIV-1 infected individuals who had potent, broadly neutralizing responses. We analyzed a checkerboard-style neutralization dataset with sera from 69 HIV-1-infected individuals tested against a panel of 25 different Envs. Distinct clusters of sera with high and low neutralization potencies were identified. Six signature positions in Env sequences obtained from the 69 samples were found to be strongly associated with either the high or low potency responses. Five sites were in the CD4-induced coreceptor binding site of gp120, suggesting an

  7. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    Science.gov (United States)

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  8. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  9. Glycoconjugates as elicitors or suppressors of plant innate immunity

    DEFF Research Database (Denmark)

    Silipo, Alba; Erbs, Gitte; Shinya, Tomonori

    2010-01-01

    Innate immunity is the first line of defense against invading microorganisms in vertebrates and the only line of defense in invertebrates and plants. Bacterial glyco-conjugates, such as lipopolysaccharides (LPS) from the outer membrane of Gram-negative bacteria and peptidoglycan (PGN) from the cell...... walls of both Gram-positive and Gram-negative bacteria, and fungal and oomycete glycoconjugates such as oligosaccharides derived from the cell wall components ß-glucan, chitin and chitosan, have been found to act as elicitors of plant innate immunity. These conserved indispensable microbe......-specific molecules are also referred to as microbe-associated molecular patterns (MAMPs). Other glyco-conjugates such as bacterial extracellular polysaccharides (EPS) and cyclic glucan have been shown to suppress innate immune responses, thus conversely promoting pathogenesis. MAMPs are recognized by the plant...

  10. Functionally redundant RXLR effectors from Phytophthora infestans act at different steps to suppress early flg22-triggered immunity.

    Directory of Open Access Journals (Sweden)

    Xiangzi Zheng

    2014-04-01

    Full Text Available Genome sequences of several economically important phytopathogenic oomycetes have revealed the presence of large families of so-called RXLR effectors. Functional screens have identified RXLR effector repertoires that either compromise or induce plant defense responses. However, limited information is available about the molecular mechanisms underlying the modes of action of these effectors in planta. The perception of highly conserved pathogen- or microbe-associated molecular patterns (PAMPs/MAMPs, such as flg22, triggers converging signaling pathways recruiting MAP kinase cascades and inducing transcriptional re-programming, yielding a generic anti-microbial response. We used a highly synchronizable, pathogen-free protoplast-based assay to identify a set of RXLR effectors from Phytophthora infestans (PiRXLRs, the causal agent of potato and tomato light blight that manipulate early stages of flg22-triggered signaling. Of thirty-three tested PiRXLR effector candidates, eight, called Suppressor of early Flg22-induced Immune response (SFI, significantly suppressed flg22-dependent activation of a reporter gene under control of a typical MAMP-inducible promoter (pFRK1-Luc in tomato protoplasts. We extended our analysis to Arabidopsis thaliana, a non-host plant species of P. infestans. From the aforementioned eight SFI effectors, three appeared to share similar functions in both Arabidopsis and tomato by suppressing transcriptional activation of flg22-induced marker genes downstream of post-translational MAP kinase activation. A further three effectors interfere with MAMP signaling at, or upstream of, the MAP kinase cascade in tomato, but not in Arabidopsis. Transient expression of the SFI effectors in Nicotiana benthamiana enhances susceptibility to P. infestans and, for the most potent effector, SFI1, nuclear localization is required for both suppression of MAMP signaling and virulence function. The present study provides a framework to decipher the

  11. The prognostic value of temporal in vitro and in vivo derived hypoxia gene-expression signatures in breast cancer

    International Nuclear Information System (INIS)

    Starmans, Maud H.W.; Chu, Kenneth C.; Haider, Syed; Nguyen, Francis; Seigneuric, Renaud; Magagnin, Michael G.; Koritzinsky, Marianne; Kasprzyk, Arek; Boutros, Paul C.; Wouters, Bradly G.

    2012-01-01

    Background and purpose: Recent data suggest that in vitro and in vivo derived hypoxia gene-expression signatures have prognostic power in breast and possibly other cancers. However, both tumour hypoxia and the biological adaptation to this stress are highly dynamic. Assessment of time-dependent gene-expression changes in response to hypoxia may thus provide additional biological insights and assist in predicting the impact of hypoxia on patient prognosis. Materials and methods: Transcriptome profiling was performed for three cell lines derived from diverse tumour-types after hypoxic exposure at eight time-points, which include a normoxic time-point. Time-dependent sets of co-regulated genes were identified from these data. Subsequently, gene ontology (GO) and pathway analyses were performed. The prognostic power of these novel signatures was assessed in parallel with previous in vitro and in vivo derived hypoxia signatures in a large breast cancer microarray meta-dataset (n = 2312). Results: We identified seven recurrent temporal and two general hypoxia signatures. GO and pathway analyses revealed regulation of both common and unique underlying biological processes within these signatures. None of the new or previously published in vitro signatures consisting of hypoxia-induced genes were prognostic in the large breast cancer dataset. In contrast, signatures of repressed genes, as well as the in vivo derived signatures of hypoxia-induced genes showed clear prognostic power. Conclusions: Only a subset of hypoxia-induced genes in vitro demonstrates prognostic value when evaluated in a large clinical dataset. Despite clear evidence of temporal patterns of gene-expression in vitro, the subset of prognostic hypoxia regulated genes cannot be identified based on temporal pattern alone. In vivo derived signatures appear to identify the prognostic hypoxia induced genes. The prognostic value of hypoxia-repressed genes is likely a surrogate for the known importance of

  12. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  13. Aequorin-based measurements of intracellular Ca2+-signatures in plant cells

    Directory of Open Access Journals (Sweden)

    Mithöfer Axel

    2002-01-01

    Full Text Available Due to the involvement of calcium as a main second messenger in the plant signaling pathway, increasing interest has been focused on the calcium signatures supposed to be involved in the patterning of the specific response associated to a given stimulus. In order to follow these signatures we described here the practical approach to use the non-invasive method based on the aequorin technology. Besides reviewing the advantages and disadvantages of this method we report on results showing the usefulness of aequorin to study the calcium response to biotic (elicitors and abiotic stimuli (osmotic shocks in various compartments of plant cells such as cytosol and nucleus.

  14. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  15. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  16. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  17. Salt-Marsh Landscapes and the Signatures of Biogeomorphic Feedbacks

    Science.gov (United States)

    D'Alpaos, A.; Marani, M.

    2014-12-01

    Salt marshes are coastal ecosystems which play a large role in the bio-geomorphological evolution of intertidal areas. The dense stands of halophytic plants which populate salt-marsh systems largely contribute to govern their dynamics, influencing marsh hydrodynamics and sediment transport through enhanced flow resistance and settling, and direct particle capture by plant stems. In addition, plants are known to increase vertical accretion through direct organic accretion. Looking across the salt-marsh landscape can one see the signatures of feedbacks between landscape and biota? Field evidence and the results of biomorphodynamic models indeed show that the interplay between physical and biological processes generates some striking biological and morphological patterns at different scales. One such pattern, vegetation zonation, consists in a mosaic of vegetation patches, of approximately uniform composition, displaying sharp transitions in the presence of extremely small topographic gradients. Here we extend the model proposed by Marani et al. (2013) to a two-dimensional framework, furthermore including the effect of direct capture of sediment particles by plant stems. This allows us to account for the effect of the drainage density of tidal networks on the observed biogeomorphic patterns and to model the coupled evolution of marsh platforms and channel networks cutting through them. A number of different scenarios have been modelled to analyze the changes induced in bio-geomorphic patterns by plants with different characteristics, within marshes characterized by different drainage densities, or subjected to changing environmental forcing such as rates of relative sea level rise and sediment supply. Model results emphasize that zonation patterns are a signature of bio-geomorphic feedbacks with vegetation acting as a landscape constructor which feeds back on, directly alters, and contributes to shape tidal environments. In addition, model results show that

  18. The plant pathogen Pseudomonas syringae pv. tomato is genetically monomorphic and under strong selection to evade tomato immunity.

    Directory of Open Access Journals (Sweden)

    Rongman Cai

    2011-08-01

    Full Text Available Recently, genome sequencing of many isolates of genetically monomorphic bacterial human pathogens has given new insights into pathogen microevolution and phylogeography. Here, we report a genome-based micro-evolutionary study of a bacterial plant pathogen, Pseudomonas syringae pv. tomato. Only 267 mutations were identified between five sequenced isolates in 3,543,009 nt of analyzed genome sequence, which suggests a recent evolutionary origin of this pathogen. Further analysis with genome-derived markers of 89 world-wide isolates showed that several genotypes exist in North America and in Europe indicating frequent pathogen movement between these world regions. Genome-derived markers and molecular analyses of key pathogen loci important for virulence and motility both suggest ongoing adaptation to the tomato host. A mutational hotspot was found in the type III-secreted effector gene hopM1. These mutations abolish the cell death triggering activity of the full-length protein indicating strong selection for loss of function of this effector, which was previously considered a virulence factor. Two non-synonymous mutations in the flagellin-encoding gene fliC allowed identifying a new microbe associated molecular pattern (MAMP in a region distinct from the known MAMP flg22. Interestingly, the ancestral allele of this MAMP induces a stronger tomato immune response than the derived alleles. The ancestral allele has largely disappeared from today's Pto populations suggesting that flagellin-triggered immunity limits pathogen fitness even in highly virulent pathogens. An additional non-synonymous mutation was identified in flg22 in South American isolates. Therefore, MAMPs are more variable than expected differing even between otherwise almost identical isolates of the same pathogen strain.

  19. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  20. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  1. A Sensitive and Specific Neural Signature for Picture-Induced Negative Affect.

    Directory of Open Access Journals (Sweden)

    Luke J Chang

    2015-06-01

    Full Text Available Neuroimaging has identified many correlates of emotion but has not yet yielded brain representations predictive of the intensity of emotional experiences in individuals. We used machine learning to identify a sensitive and specific signature of emotional responses to aversive images. This signature predicted the intensity of negative emotion in individual participants in cross validation (n =121 and test (n = 61 samples (high-low emotion = 93.5% accuracy. It was unresponsive to physical pain (emotion-pain = 92% discriminative accuracy, demonstrating that it is not a representation of generalized arousal or salience. The signature was comprised of mesoscale patterns spanning multiple cortical and subcortical systems, with no single system necessary or sufficient for predicting experience. Furthermore, it was not reducible to activity in traditional "emotion-related" regions (e.g., amygdala, insula or resting-state networks (e.g., "salience," "default mode". Overall, this work identifies differentiable neural components of negative emotion and pain, providing a basis for new, brain-based taxonomies of affective processes.

  2. Discrete Neural Signatures of Basic Emotions.

    Science.gov (United States)

    Saarimäki, Heini; Gotsopoulos, Athanasios; Jääskeläinen, Iiro P; Lampinen, Jouko; Vuilleumier, Patrik; Hari, Riitta; Sams, Mikko; Nummenmaa, Lauri

    2016-06-01

    Categorical models of emotions posit neurally and physiologically distinct human basic emotions. We tested this assumption by using multivariate pattern analysis (MVPA) to classify brain activity patterns of 6 basic emotions (disgust, fear, happiness, sadness, anger, and surprise) in 3 experiments. Emotions were induced with short movies or mental imagery during functional magnetic resonance imaging. MVPA accurately classified emotions induced by both methods, and the classification generalized from one induction condition to another and across individuals. Brain regions contributing most to the classification accuracy included medial and inferior lateral prefrontal cortices, frontal pole, precentral and postcentral gyri, precuneus, and posterior cingulate cortex. Thus, specific neural signatures across these regions hold representations of different emotional states in multimodal fashion, independently of how the emotions are induced. Similarity of subjective experiences between emotions was associated with similarity of neural patterns for the same emotions, suggesting a direct link between activity in these brain regions and the subjective emotional experience. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  3. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  4. Lipoteichoic acid is an important microbe-associated molecular pattern of Lactobacillus rhamnosus GG

    Directory of Open Access Journals (Sweden)

    Claes Ingmar JJ

    2012-12-01

    Full Text Available Abstract Background Probiotic bacteria are increasingly used as immunomodulatory agents. Yet detailed molecular knowledge on the immunomodulatory molecules of these bacteria is lagging behind. Lipoteichoic acid (LTA is considered a major microbe-associated molecular pattern (MAMP of Gram-positive bacteria. However, many details and quantitative data on its immune signalling capacity are still unknown, especially in beneficial bacteria. Recently, we have demonstrated that a dltD mutant of the model probiotic Lactobacillus rhamnosus GG (LGG, having modified LTA molecules, has an enhanced probiotic efficacy in a DSS-induced colitis model as compared to wild-type. Results In this study, the importance of D-alanylated and acylated LTA for the pro-inflammatory activity of LGG was studied in vitro. Purified native LTA of LGG wild-type exhibited a concentration-dependent activation of NF-κB signalling in HEK293T cells after interaction with TLR2/6, but not with TLR2 alone. Chemical deacylation of LTA interfered with the TLR2/6 interaction, while a moderate effect was observed with chemical dealanylation. Similarly, the dltD mutant of LGG exhibited a significantly reduced capacity to activate TLR2/6-dependent NF-κB signalling in a HEK293T reporter cell line compared to wild-type. In addition, the dltD mutant of LGG showed a reduced induction of mRNA of the chemokine IL-8 in the Caco-2 epithelial cell line compared to wild-type. Experiments with highly purified LTA of LGG confirmed that LTA is a crucial factor for IL-8 mRNA induction in Caco-2 epithelial cells. Chemical dealanylation and deacylation reduced IL-8 mRNA expression. Conclusions Taken together, our results indicate that LTA of LGG is a crucial MAMP with pro-inflammatory activities such as IL-8 induction in intestinal epithelial cells and NF-κB induction in HEK293T cells via TLR2/6 interaction. The lipid chains of LGG LTA are needed for these activities, while also the D-alanine substituents

  5. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  6. Towards software-based signature detection for intrusion prevention on the network card

    NARCIS (Netherlands)

    Bos, H.; Huang, Kaiming

    2006-01-01

    CardGuard is a signature detection system for intrusion detection and prevention that scans the entire payload of packets for suspicious patterns and is implemented in software on a network card equiped with an Intel IXP1200 network processor. One card can be used to protect either a single host, or

  7. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  8. Methods of extending signatures and training without ground information. [data processing, pattern recognition

    Science.gov (United States)

    Henderson, R. G.; Thomas, G. S.; Nalepka, R. F.

    1975-01-01

    Methods of performing signature extension, using LANDSAT-1 data, are explored. The emphasis is on improving the performance and cost-effectiveness of large area wheat surveys. Two methods were developed: ASC, and MASC. Two methods, Ratio, and RADIFF, previously used with aircraft data were adapted to and tested on LANDSAT-1 data. An investigation into the sources and nature of between scene data variations was included. Initial investigations into the selection of training fields without in situ ground truth were undertaken.

  9. Assessing signatures of selection through variation in linkage disequilibrium between taurine and indicine cattle

    Science.gov (United States)

    Signatures of selection are regions in the genome that have been preferentially maintained because of their functional importance in specific processes. These regions can be detected because of their lower genetic variability and specific regional linkage disequilibrium patterns. The varLD methodol...

  10. Observable Signatures of Energy Release in Braided Coronal Loops

    Energy Technology Data Exchange (ETDEWEB)

    Pontin, D. I. [University of Dundee, Nethergate, Dundee, DD1 4HN (United Kingdom); Janvier, M. [Institut d’Astrophysique Spatiale, CNRS, Univ. Paris-Sud, Université Paris-Saclay, Bât. 121, F-91405, Orsay Cedex (France); Tiwari, S. K.; Winebarger, A. R.; Cirtain, J. W. [NASA Marshall Space Flight Center, ZP 13, Huntsville, AL 35812 (United States); Galsgaard, K. [Niels Bohr Institute, Geological Museum Østervoldgade 5-7, DK-1350, Copenhagen K (Denmark)

    2017-03-10

    We examine the turbulent relaxation of solar coronal loops containing non-trivial field line braiding. Such field line tangling in the corona has long been postulated in the context of coronal heating models. We focus on the observational signatures of energy release in such braided magnetic structures using MHD simulations and forward modeling tools. The aim is to answer the following question: if energy release occurs in a coronal loop containing braided magnetic flux, should we expect a clearly observable signature in emissions? We demonstrate that the presence of braided magnetic field lines does not guarantee a braided appearance to the observed intensities. Observed intensities may—but need not necessarily—reveal the underlying braided nature of the magnetic field, depending on the degree and pattern of the field line tangling within the loop. However, in all cases considered, the evolution of the braided loop is accompanied by localized heating regions as the loop relaxes. Factors that may influence the observational signatures are discussed. Recent high-resolution observations from Hi-C have claimed the first direct evidence of braided magnetic fields in the corona. Here we show that both the Hi-C data and some of our simulations give the appearance of braiding at a range of scales.

  11. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  12. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  13. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  14. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  15. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  16. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  17. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  18. Criticality meets learning: Criticality signatures in a self-organizing recurrent neural network.

    Science.gov (United States)

    Del Papa, Bruno; Priesemann, Viola; Triesch, Jochen

    2017-01-01

    Many experiments have suggested that the brain operates close to a critical state, based on signatures of criticality such as power-law distributed neuronal avalanches. In neural network models, criticality is a dynamical state that maximizes information processing capacities, e.g. sensitivity to input, dynamical range and storage capacity, which makes it a favorable candidate state for brain function. Although models that self-organize towards a critical state have been proposed, the relation between criticality signatures and learning is still unclear. Here, we investigate signatures of criticality in a self-organizing recurrent neural network (SORN). Investigating criticality in the SORN is of particular interest because it has not been developed to show criticality. Instead, the SORN has been shown to exhibit spatio-temporal pattern learning through a combination of neural plasticity mechanisms and it reproduces a number of biological findings on neural variability and the statistics and fluctuations of synaptic efficacies. We show that, after a transient, the SORN spontaneously self-organizes into a dynamical state that shows criticality signatures comparable to those found in experiments. The plasticity mechanisms are necessary to attain that dynamical state, but not to maintain it. Furthermore, onset of external input transiently changes the slope of the avalanche distributions - matching recent experimental findings. Interestingly, the membrane noise level necessary for the occurrence of the criticality signatures reduces the model's performance in simple learning tasks. Overall, our work shows that the biologically inspired plasticity and homeostasis mechanisms responsible for the SORN's spatio-temporal learning abilities can give rise to criticality signatures in its activity when driven by random input, but these break down under the structured input of short repeating sequences.

  19. Global simulation of flux transfer events: Generation mechanism and spacecraft signatures

    Science.gov (United States)

    Raeder, J.

    We use global MHD simulations of Earth's magnetosphere to show that for southward IMF conditions: a) steady reconnection preferentially occurs without FTEs when the stagnation flow line nearly coincides with the X-line location, which requires small dipole tilt and nearly due southward IMF, b) FTEs occur when the flow/field symmetry is broken, which requires either a large dipole tilt and/or a substantial east-west component of the IMF, c) the predicted spacecraft signature and the repetition frequency of FTEs in the simulations agrees very well with typical observations, lending credibility to the the model, d) the fundamental process that leads to FTE formation is multiple X-line formation caused by the flow and field patterns in the magnetosheath and requires no intrinsic plasma property variations like variable resistivity, e) if the dipole tilt breaks the symmetry FTEs occur only in the winter hemisphere whereas the reconnection signatures in the summer hemisphere are steady with no bipolar FTE-like signatures, f) if the IMF east-west field component breaks the symmetry FTEs occur in both hemispheres but are least likely observed near the subsolar point, and g) FTE formation depends on sufficient resolution and low diffusion in the model. Too coarse resolution and/or too high diffusivity lead to flow-through reconnection signatures that appear unphysical given the frequent observation of FTEs.

  20. FATTY ACID SIGNATURES DIFFERENTIATE MARINE MACROPHYTES AT ORDINAL AND FAMILY RANKS(1).

    Science.gov (United States)

    Galloway, Aaron W E; Britton-Simmons, Kevin H; Duggins, David O; Gabrielson, Paul W; Brett, Michael T

    2012-08-01

    Primary productivity by plants and algae is the fundamental source of energy in virtually all food webs. Furthermore, photosynthetic organisms are the sole source for ω-3 and ω-6 essential fatty acids (EFA) to upper trophic levels. Because animals cannot synthesize EFA, these molecules may be useful as trophic markers for tracking sources of primary production through food webs if different primary producer groups have different EFA signatures. We tested the hypothesis that different marine macrophyte groups have distinct fatty acid (FA) signatures by conducting a phylogenetic survey of 40 marine macrophytes (seaweeds and seagrasses) representing 36 families, 21 orders, and four phyla in the San Juan Archipelago, WA, USA. We used multivariate statistics to show that FA composition differed significantly (P macrophytes confirmed that this pattern was robust on a global scale (P macrophyte taxa shows a clear relationship between macrophyte phylogeny and FA content and strongly suggests that FA signature analyses can offer a viable approach to clarifying fundamental questions about the contribution of different basal resources to food webs. Moreover, these results imply that taxa with commercially valuable EFA signatures will likely share such characteristics with other closely related taxa that have not yet been evaluated for FA content. © 2012 Phycological Society of America.

  1. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  2. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  3. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  4. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  5. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  6. Persistence of social signatures in human communication.

    Science.gov (United States)

    Saramäki, Jari; Leicht, E A; López, Eduardo; Roberts, Sam G B; Reed-Tsochas, Felix; Dunbar, Robin I M

    2014-01-21

    The social network maintained by a focal individual, or ego, is intrinsically dynamic and typically exhibits some turnover in membership over time as personal circumstances change. However, the consequences of such changes on the distribution of an ego's network ties are not well understood. Here we use a unique 18-mo dataset that combines mobile phone calls and survey data to track changes in the ego networks and communication patterns of students making the transition from school to university or work. Our analysis reveals that individuals display a distinctive and robust social signature, captured by how interactions are distributed across different alters. Notably, for a given ego, these social signatures tend to persist over time, despite considerable turnover in the identity of alters in the ego network. Thus, as new network members are added, some old network members either are replaced or receive fewer calls, preserving the overall distribution of calls across network members. This is likely to reflect the consequences of finite resources such as the time available for communication, the cognitive and emotional effort required to sustain close relationships, and the ability to make emotional investments.

  7. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  8. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  9. Gene Expression Deconvolution for Uncovering Molecular Signatures in Response to Therapy in Juvenile Idiopathic Arthritis.

    Directory of Open Access Journals (Sweden)

    Ang Cui

    Full Text Available Gene expression-based signatures help identify pathways relevant to diseases and treatments, but are challenging to construct when there is a diversity of disease mechanisms and treatments in patients with complex diseases. To overcome this challenge, we present a new application of an in silico gene expression deconvolution method, ISOpure-S1, and apply it to identify a common gene expression signature corresponding to response to treatment in 33 juvenile idiopathic arthritis (JIA patients. Using pre- and post-treatment gene expression profiles only, we found a gene expression signature that significantly correlated with a reduction in the number of joints with active arthritis, a measure of clinical outcome (Spearman rho = 0.44, p = 0.040, Bonferroni correction. This signature may be associated with a decrease in T-cells, monocytes, neutrophils and platelets. The products of most differentially expressed genes include known biomarkers for JIA such as major histocompatibility complexes and interleukins, as well as novel biomarkers including α-defensins. This method is readily applicable to expression datasets of other complex diseases to uncover shared mechanistic patterns in heterogeneous samples.

  10. Deriving a cardiac ageing signature to reveal MMP-9-dependent inflammatory signalling in senescence.

    Science.gov (United States)

    Ma, Yonggang; Chiao, Ying Ann; Clark, Ryan; Flynn, Elizabeth R; Yabluchanskiy, Andriy; Ghasemi, Omid; Zouein, Fouad; Lindsey, Merry L; Jin, Yu-Fang

    2015-06-01

    Cardiac ageing involves the progressive development of cardiac fibrosis and diastolic dysfunction coordinated by MMP-9. Here, we report a cardiac ageing signature that encompasses macrophage pro-inflammatory signalling in the left ventricle (LV) and distinguishes biological from chronological ageing. Young (6-9 months), middle-aged (12-15 months), old (18-24 months), and senescent (26-34 months) mice of both C57BL/6J wild type (WT) and MMP-9 null were evaluated. Using an identified inflammatory pattern, we were able to define individual mice based on their biological, rather than chronological, age. Bcl6, Ccl24, and Il4 were the strongest inflammatory markers of the cardiac ageing signature. The decline in early-to-late LV filling ratio was most strongly predicted by Bcl6, Il1r1, Ccl24, Crp, and Cxcl13 patterns, whereas LV wall thickness was most predicted by Abcf1, Tollip, Scye1, and Mif patterns. With age, there was a linear increase in cardiac M1 macrophages and a decrease in cardiac M2 macrophages in WT mice; of which, both were prevented by MMP-9 deletion. In vitro, MMP-9 directly activated young macrophage polarization to an M1/M2 mid-transition state. Our results define the cardiac ageing inflammatory signature and assign MMP-9 roles in mediating the inflammaging profile by indirectly and directly modifying macrophage polarization. Our results explain early mechanisms that stimulate ageing-induced cardiac fibrosis and diastolic dysfunction. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2015. For permissions please email: journals.permissions@oup.com.

  11. Imaging-based surrogate markers of transcriptome subclasses and signatures in hepatocellular carcinoma. Preliminary results

    Energy Technology Data Exchange (ETDEWEB)

    Taouli, Bachir [Icahn School of Medicine at Mount Sinai, Department of Radiology, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Hoshida, Yujin; Chen, Xintong; Sun, Xiaochen; Kojima, Kensuke; Toffanin, Sara; Hirschfield, Hadassa [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); Kakite, Suguru [Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Tottori University, Division of Radiology, Department of Pathophysiological and Therapeutic Science, Faculty of Medicine, Yonago City (Japan); Tan, Poh Seng [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); National University Health System, Division of Gastroenterology and Hepatology, University Medicine Cluster, Singapore (Singapore); Kihira, Shingo [Icahn School of Medicine at Mount Sinai, Department of Radiology, New York, NY (United States); Fiel, M.I. [Icahn School of Medicine at Mount Sinai, Department of Pathology, New York, NY (United States); Wagner, Mathilde [Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Sorbonne Universites, UPMC, Department of Radiology, Hopital Pitie-Salpetriere, Paris (France); Llovet, Josep M. [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); Universitat de Barcelona, HCC Translational Research Laboratory, Barcelona-Clinic Liver Cancer Group Institut d' Investigacions Biomediques August Pi i Sunyer (IDIBAPS), Hospital Clinic de Barcelona, Barcelona (Spain); Institucio Catalana de Recerca i Estudis Avancats, Barcelona (Spain)

    2017-11-15

    In this preliminary study, we examined whether imaging-based phenotypes are associated with reported predictive gene signatures in hepatocellular carcinoma (HCC). Thirty-eight patients (M/F 30/8, mean age 61 years) who underwent pre-operative CT or MR imaging before surgery as well as transcriptome profiling were included in this IRB-approved single-centre retrospective study. Eleven qualitative and four quantitative imaging traits (size, enhancement ratios, wash-out ratio, tumour-to-liver contrast ratios) were assessed by three observers and were correlated with 13 previously reported HCC gene signatures using logistic regression analysis. Thirty-nine HCC tumours (mean size 5.7 ± 3.2 cm) were assessed. Significant positive associations were observed between certain imaging traits and gene signatures of aggressive HCC phenotype (G3-Boyault, Proliferation-Chiang profiles, CK19-Villanueva, S1/S2-Hoshida) with odds ratios ranging from 4.44-12.73 (P <0.045). Infiltrative pattern at imaging was significantly associated with signatures of microvascular invasion and aggressive phenotype. Significant but weak associations were also observed between each enhancement ratio and tumour-to-liver contrast ratios and certain gene expression profiles. This preliminary study demonstrates a correlation between phenotypic imaging traits with gene signatures of aggressive HCC, which warrants further prospective validation to establish imaging-based surrogate markers of molecular phenotypes in HCC. (orig.)

  12. Imaging-based surrogate markers of transcriptome subclasses and signatures in hepatocellular carcinoma. Preliminary results

    International Nuclear Information System (INIS)

    Taouli, Bachir; Hoshida, Yujin; Chen, Xintong; Sun, Xiaochen; Kojima, Kensuke; Toffanin, Sara; Hirschfield, Hadassa; Kakite, Suguru; Tan, Poh Seng; Kihira, Shingo; Fiel, M.I.; Wagner, Mathilde; Llovet, Josep M.

    2017-01-01

    In this preliminary study, we examined whether imaging-based phenotypes are associated with reported predictive gene signatures in hepatocellular carcinoma (HCC). Thirty-eight patients (M/F 30/8, mean age 61 years) who underwent pre-operative CT or MR imaging before surgery as well as transcriptome profiling were included in this IRB-approved single-centre retrospective study. Eleven qualitative and four quantitative imaging traits (size, enhancement ratios, wash-out ratio, tumour-to-liver contrast ratios) were assessed by three observers and were correlated with 13 previously reported HCC gene signatures using logistic regression analysis. Thirty-nine HCC tumours (mean size 5.7 ± 3.2 cm) were assessed. Significant positive associations were observed between certain imaging traits and gene signatures of aggressive HCC phenotype (G3-Boyault, Proliferation-Chiang profiles, CK19-Villanueva, S1/S2-Hoshida) with odds ratios ranging from 4.44-12.73 (P <0.045). Infiltrative pattern at imaging was significantly associated with signatures of microvascular invasion and aggressive phenotype. Significant but weak associations were also observed between each enhancement ratio and tumour-to-liver contrast ratios and certain gene expression profiles. This preliminary study demonstrates a correlation between phenotypic imaging traits with gene signatures of aggressive HCC, which warrants further prospective validation to establish imaging-based surrogate markers of molecular phenotypes in HCC. (orig.)

  13. Investigating the Role of the Arabidopsis Homologue of the Human G3BP in RNA Metabolism, Cellular Stress Responses and Innate Immunity

    KAUST Repository

    Abulfaraj, Aala A.

    2018-04-01

    Mitogen-activated protein kinases (MAPKs) belong to the most conserved signaling pathways and are found in all eukaryotes, including humans where they play important roles in various diseases and cancer. Stimulation of this signal transduction pathway by microbe-associated molecular patterns (MAMP) results in a multitude of events to regulate innate immune responses in Arabidopsis thaliana stimulating large-scale changes in gene expression. Starting from a phosphoproteomic screen in Arabidopsis thaliana wild type and mpk3, mpk4 and mpk6 mutants following microbe-associated molecular pattern (MAMP) treatment, several novel chromatin-associated proteins were identified that are differentially phosphorylated by stress-induced protein kinases. Arabidopsis Ras GTPase-activating protein SH3-domain-binding protein (AtG3BP-1) is a downstream putative substrate of the MAMP-stimulated MAPK pathway that is phosphorylated by MPK3, 4 and 6 in in vitro kinase assays. AtG3BP1 belongs to a highly conserved family of RNA-binding proteins in eukaryotes that link kinase receptormediated signaling to RNA metabolism. Here, we report the characterization of the Arabidopsis homolog of human G3BP1 in plant innate immunity. AtG3BP1 negatively regulates plant immunity and defense immune responses. Atg3bp1 mutant lines show constitutive stomata closure, expression of a number of key defense marker genes, and accumulate salicylic acid but not jasmonic acid. Furthermore, Atg3bp1 plants exhibit enhanced resistance to the biotrophic pathogen Pseudomonas syringae pv. tomato. Pathogen resistance was mediated by stomatal and apoplastic immunity in Atg3bp1. More generally, our data reinforce that AtG3BP1 is a key mediator of plant defense responses and transient expression of AtG3BP1 delivered striking disease resistance in the absence of yield penalty, highlighting a potential application of this gene in crop protection.

  14. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  15. Importance of correlation between gene expression levels: application to the type I interferon signature in rheumatoid arthritis.

    Science.gov (United States)

    Reynier, Frédéric; Petit, Fabien; Paye, Malick; Turrel-Davin, Fanny; Imbert, Pierre-Emmanuel; Hot, Arnaud; Mougin, Bruno; Miossec, Pierre

    2011-01-01

    The analysis of gene expression data shows that many genes display similarity in their expression profiles suggesting some co-regulation. Here, we investigated the co-expression patterns in gene expression data and proposed a correlation-based research method to stratify individuals. Using blood from rheumatoid arthritis (RA) patients, we investigated the gene expression profiles from whole blood using Affymetrix microarray technology. Co-expressed genes were analyzed by a biclustering method, followed by gene ontology analysis of the relevant biclusters. Taking the type I interferon (IFN) pathway as an example, a classification algorithm was developed from the 102 RA patients and extended to 10 systemic lupus erythematosus (SLE) patients and 100 healthy volunteers to further characterize individuals. We developed a correlation-based algorithm referred to as Classification Algorithm Based on a Biological Signature (CABS), an alternative to other approaches focused specifically on the expression levels. This algorithm applied to the expression of 35 IFN-related genes showed that the IFN signature presented a heterogeneous expression between RA, SLE and healthy controls which could reflect the level of global IFN signature activation. Moreover, the monitoring of the IFN-related genes during the anti-TNF treatment identified changes in type I IFN gene activity induced in RA patients. In conclusion, we have proposed an original method to analyze genes sharing an expression pattern and a biological function showing that the activation levels of a biological signature could be characterized by its overall state of correlation.

  16. Global transcriptional profiling of the toxic dinoflagellate Alexandrium fundyense using Massively Parallel Signature Sequencing

    Directory of Open Access Journals (Sweden)

    Anderson Donald M

    2006-04-01

    Full Text Available Abstract Background Dinoflagellates are one of the most important classes of marine and freshwater algae, notable both for their functional diversity and ecological significance. They occur naturally as free-living cells, as endosymbionts of marine invertebrates and are well known for their involvement in "red tides". Dinoflagellates are also notable for their unusual genome content and structure, which suggests that the organization and regulation of dinoflagellate genes may be very different from that of most eukaryotes. To investigate the content and regulation of the dinoflagellate genome, we performed a global analysis of the transcriptome of the toxic dinoflagellate Alexandrium fundyense under nitrate- and phosphate-limited conditions using Massively Parallel Signature Sequencing (MPSS. Results Data from the two MPSS libraries showed that the number of unique signatures found in A. fundyense cells is similar to that of humans and Arabidopsis thaliana, two eukaryotes that have been extensively analyzed using this method. The general distribution, abundance and expression patterns of the A. fundyense signatures were also quite similar to other eukaryotes, and at least 10% of the A. fundyense signatures were differentially expressed between the two conditions. RACE amplification and sequencing of a subset of signatures showed that multiple signatures arose from sequence variants of a single gene. Single signatures also mapped to different sequence variants of the same gene. Conclusion The MPSS data presented here provide a quantitative view of the transcriptome and its regulation in these unusual single-celled eukaryotes. The observed signature abundance and distribution in Alexandrium is similar to that of other eukaryotes that have been analyzed using MPSS. Results of signature mapping via RACE indicate that many signatures result from sequence variants of individual genes. These data add to the growing body of evidence for widespread gene

  17. Longitudinal Changes in Young Children’s 0-100 to 0-1000 Number-Line Error Signatures

    Directory of Open Access Journals (Sweden)

    Robert A. Reeve

    2015-05-01

    Full Text Available We use a latent difference score (LDS model to examine changes in young children’s number-line (NL error signatures (errors marking numbers on a NL over 18 months. A LDS model (1 overcomes some of the inference limitations of analytic models used in previous research, and in particular (2 provides a more reliable test of hypotheses about the meaning and significance of changes in NL error signatures over time and task. The NL error signatures of 217 6-year-olds’ (on test occasion one were assessed three times over 18 months, along with their math ability on two occasions. On the first occasion (T1 children completed a 0–100 NL task; on the second (T2 a 0–100 NL and a 0–1000 NL task; on the third (T3 occasion a 0–1000 NL task. On the third and fourth occasions (T3 and T4, children completed mental calculation tasks. Although NL error signatures changed over time, these were predictable from other NL task error signatures, and predicted calculation accuracy at T3, as well as changes in calculation between T3 and T4. Multiple indirect effects (change parameters showed that associations between initial NL error signatures (0–100 NL and later mental calculation ability were mediated by error signatures on the 0–1000 NL task. The pattern of findings from the LDS model highlight the value of identifying direct and indirect effects in characterizing changing relationships in cognitive representations over task and time. Substantively, they support the claim that children’s NL error signatures generalize over task and time and thus can be used to predict math ability.

  18. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  19. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  20. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  1. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  2. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  3. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  4. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  5. Winter in the Ouachitas--a severe winter storm signature in Pinus echinata in the Ouachita Mountains of Oklahoma and Arkansas, USA

    Science.gov (United States)

    Douglas J. Stevenson; Thomas B. Lynch; Pradip Saud; Robert Heineman; Randal Holeman; Dennis Wilson; Keith Anderson; Chris Cerny; James M. Guldin

    2016-01-01

    Each year severe winter storms (≈ice storms) damage trees throughout the southern USA. Arkansas and Oklahoma have a history of severe winter storms. To extend that history back beyond the reach of written records, a distinctive tree ring pattern or signature is needed. Storm-caused breakage, branch loss and bending stress provide that signature. We found a severe storm...

  6. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  7. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  8. Migration signatures across the decades: Net migration by age in U.S. counties, 1950-2010

    Directory of Open Access Journals (Sweden)

    Richelle L. Winkler

    2015-05-01

    Full Text Available Background: Migration is the primary population redistribution process in the United States. Selective migration by age, race/ethnic group, and spatial location governs population integration, affects community and economic development, contributes to land use change, and structures service needs. Objective: Delineate historical net migration patterns by age, race/ethnic, and rural-urban dimensions for United States counties. Methods: Net migration rates by age for all US counties are aggregated from 1950−2010, summarized by rural-urban location and compared to explore differential race/ethnic patterns of age-specific net migration over time. Results: We identify distinct age-specific net migration 'signatures' that are consistent over time within county types, but different by rural-urban location and race/ethnic group. There is evidence of moderate population deconcentration and diminished racial segregation between 1990 and 2010. This includes a net outflow of Blacks from large urban core counties to suburban and smaller metropolitan counties, continued Hispanic deconcentration, and a slowdown in White counterurbanization. Conclusions: This paper contributes to a fuller understanding of the complex patterns of migration that have redistributed the U.S. population over the past six decades. It documents the variability in county age-specific net migration patterns both temporally and spatially, as well as the longitudinal consistency in migration signatures among county types and race/ethnic groups.

  9. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  10. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  11. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  12. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  13. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  14. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  15. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  16. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  17. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  18. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  19. Proteomics goes forensic: Detection and mapping of blood signatures in fingermarks.

    Science.gov (United States)

    Deininger, Lisa; Patel, Ekta; Clench, Malcolm R; Sears, Vaughn; Sammon, Chris; Francese, Simona

    2016-06-01

    A bottom up in situ proteomic method has been developed enabling the mapping of multiple blood signatures on the intact ridges of blood fingermarks by Matrix Assisted Laser Desorption Mass Spectrometry Imaging (MALDI-MSI). This method, at a proof of concept stage, builds upon recently published work demonstrating the opportunity to profile and identify multiple blood signatures in bloodstains via a bottom up proteomic approach. The present protocol addresses the limitation of the previously developed profiling method with respect to destructivity; destructivity should be avoided for evidence such as blood fingermarks, where the ridge detail must be preserved in order to provide the associative link between the biometric information and the events of bloodshed. Using a blood mark reference model, trypsin concentration and spraying conditions have been optimised within the technical constraints of the depositor eventually employed; the application of MALDI-MSI and Ion Mobility MS have enabled the detection, confirmation and visualisation of blood signatures directly onto the ridge pattern. These results are to be considered a first insight into a method eventually informing investigations (and judicial debates) of violent crimes in which the reliable and non-destructive detection and mapping of blood in fingermarks is paramount to reconstruct the events of bloodshed. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  1. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  2. Signatures of natural selection among lineages and habitats in Oncorhynchus mykiss

    DEFF Research Database (Denmark)

    Limborg, Morten; Blankenship, S.; Young, S.

    2012-01-01

    lineage. Overall patterns of variation affirmed clear distinctions between lineages and in most instances, isolation by distance within them. Evidence for divergent selection at eight candidate loci included significant landscape correlations, particularly with temperature. High diversity of two...... nonsynonymous mutations within the peptide-binding region of the major histocompatibility complex (MHC) class II (DAB) gene provided signatures of balancing selection. Weak signals for potential selection between sympatric resident and anadromous populations were revealed from genome scans and allele frequency...

  3. Implementing Signature Neural Networks with Spiking Neurons.

    Science.gov (United States)

    Carrillo-Medina, José Luis; Latorre, Roberto

    2016-01-01

    Spiking Neural Networks constitute the most promising approach to develop realistic Artificial Neural Networks (ANNs). Unlike traditional firing rate-based paradigms, information coding in spiking models is based on the precise timing of individual spikes. It has been demonstrated that spiking ANNs can be successfully and efficiently applied to multiple realistic problems solvable with traditional strategies (e.g., data classification or pattern recognition). In recent years, major breakthroughs in neuroscience research have discovered new relevant computational principles in different living neural systems. Could ANNs benefit from some of these recent findings providing novel elements of inspiration? This is an intriguing question for the research community and the development of spiking ANNs including novel bio-inspired information coding and processing strategies is gaining attention. From this perspective, in this work, we adapt the core concepts of the recently proposed Signature Neural Network paradigm-i.e., neural signatures to identify each unit in the network, local information contextualization during the processing, and multicoding strategies for information propagation regarding the origin and the content of the data-to be employed in a spiking neural network. To the best of our knowledge, none of these mechanisms have been used yet in the context of ANNs of spiking neurons. This paper provides a proof-of-concept for their applicability in such networks. Computer simulations show that a simple network model like the discussed here exhibits complex self-organizing properties. The combination of multiple simultaneous encoding schemes allows the network to generate coexisting spatio-temporal patterns of activity encoding information in different spatio-temporal spaces. As a function of the network and/or intra-unit parameters shaping the corresponding encoding modality, different forms of competition among the evoked patterns can emerge even in the absence

  4. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  5. The intestinal complement system in inflammatory bowel disease: Shaping intestinal barrier function.

    Science.gov (United States)

    Sina, Christian; Kemper, Claudia; Derer, Stefanie

    2018-06-01

    The complement system is part of innate sensor and effector systems such as the Toll-like receptors (TLRs). It recognizes and quickly systemically and/or locally respond to microbial-associated molecular patterns (MAMPs) with a tailored defense reaction. MAMP recognition by intestinal epithelial cells (IECs) and appropriate immune responses are of major importance for the maintenance of intestinal barrier function. Enterocytes highly express various complement components that are suggested to be pivotal for proper IEC function. Appropriate activation of the intestinal complement system seems to play an important role in the resolution of chronic intestinal inflammation, while over-activation and/or dysregulation may worsen intestinal inflammation. Mice deficient for single complement components suffer from enhanced intestinal inflammation mimicking the phenotype of patients with chronic inflammatory bowel disease (IBD) such as Crohn's disease (CD) or ulcerative colitis (UC). However, the mechanisms leading to complement expression in IECs seem to differ markedly between UC and CD patients. Hence, how IECs, intestinal bacteria and epithelial cell expressed complement components interact in the course of IBD still remains to be mostly elucidated to define potential unique patterns contributing to the distinct subtypes of intestinal inflammation observed in CD and UC. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  7. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  8. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  9. Molecular subsets in the gene expression signatures of scleroderma skin.

    Directory of Open Access Journals (Sweden)

    Ausra Milano

    2008-07-01

    Full Text Available Scleroderma is a clinically heterogeneous disease with a complex phenotype. The disease is characterized by vascular dysfunction, tissue fibrosis, internal organ dysfunction, and immune dysfunction resulting in autoantibody production.We analyzed the genome-wide patterns of gene expression with DNA microarrays in skin biopsies from distinct scleroderma subsets including 17 patients with systemic sclerosis (SSc with diffuse scleroderma (dSSc, 7 patients with SSc with limited scleroderma (lSSc, 3 patients with morphea, and 6 healthy controls. 61 skin biopsies were analyzed in a total of 75 microarray hybridizations. Analysis by hierarchical clustering demonstrates nearly identical patterns of gene expression in 17 out of 22 of the forearm and back skin pairs of SSc patients. Using this property of the gene expression, we selected a set of 'intrinsic' genes and analyzed the inherent data-driven groupings. Distinct patterns of gene expression separate patients with dSSc from those with lSSc and both are easily distinguished from normal controls. Our data show three distinct patient groups among the patients with dSSc and two groups among patients with lSSc. Each group can be distinguished by unique gene expression signatures indicative of proliferating cells, immune infiltrates and a fibrotic program. The intrinsic groups are statistically significant (p<0.001 and each has been mapped to clinical covariates of modified Rodnan skin score, interstitial lung disease, gastrointestinal involvement, digital ulcers, Raynaud's phenomenon and disease duration. We report a 177-gene signature that is associated with severity of skin disease in dSSc.Genome-wide gene expression profiling of skin biopsies demonstrates that the heterogeneity in scleroderma can be measured quantitatively with DNA microarrays. The diversity in gene expression demonstrates multiple distinct gene expression programs in the skin of patients with scleroderma.

  10. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  11. Application of micro-attenuated total reflectance Fourier transform infrared spectroscopy to ink examination in signatures written with ballpoint pen on questioned documents.

    Science.gov (United States)

    Nam, Yun Sik; Park, Jin Sook; Lee, Yeonhee; Lee, Kang-Bong

    2014-05-01

    Questioned documents examined in a forensic laboratory sometimes contain signatures written with ballpoint pen inks; these signatures were examined to assess the feasibility of micro-attenuated total reflectance (ATR) Fourier transform infrared (FTIR) spectroscopy as a forensic tool. Micro-ATR FTIR spectra for signatures written with 63 ballpoint pens available commercially in Korea were obtained and used to construct an FTIR spectral database. A library-searching program was utilized to identify the manufacturer, blend, and model of each black ballpoint pen ink based upon their FTIR peak intensities, positions, and patterns in the spectral database. This FTIR technique was also successfully used in determining the sequence of homogeneous line intersections from the crossing lines of two ballpoint pen signatures. We have demonstrated with a set of sample documents that micro-ATR FTIR is a viable nondestructive analytical method that can be used to identify the origin of the ballpoint pen ink used to mark signatures. © 2014 American Academy of Forensic Sciences.

  12. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  13. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  14. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  15. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  16. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  17. Global modeling of flux transfer events: generation mechanism and spacecraft signatures

    Science.gov (United States)

    Raeder, J.

    2003-04-01

    Magnetic reconnection is a fundamental mode of energy and momentum transfer from the solar wind to the magnetosphere. It is known to occur in different forms depending on solar wind and magnetospheric conditions. In particular, steady reconnection can be distinguished from pulse-like reconnection events which are also known as Flux Transfer Events (FTEs). The formation mechanism of FTEs and their contolling factors remain controversial. We use global MHD simulations of Earth's magnetosphere to show that for southward IMF conditions: a) steady reconnection preferentially occurs without FTEs when the stagnation flow line nearly coincides with the X-line location, which requires small dipole tilt and nearly due southward IMF, b) FTEs occur when the flow/field symmetry is broken, which requires either a large dipole tilt and/or a substantial east-west component of the IMF, c) the predicted spacecraft signature and the repetition frequency of FTEs in the simulations agrees very well with typical observations, lending credibility to the the model, d) the fundamental process that leads to FTE formation is multiple X-line formation caused by the flow and field patterns in the magnetosheath and requires no intrinsic plasma property variations like variable resistivity, e) if the dipole tilt breaks the symmetry FTEs occur only in the winter hemisphere whereas the reconnection signatures in the summer hemisphere are steady with no bipolar FTE-like signatures, f) if the IMF east-west field component breaks the symmetry FTEs occur in both hemispheres, and g) FTE formation depends on sufficient resolution and low diffusion in the model -- coarse resolution and/or high diffusivity lead to flow-through reconnection signatures that appear unphysical given the frequent observation of FTEs.

  18. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  19. GESearch: An Interactive GUI Tool for Identifying Gene Expression Signature

    Directory of Open Access Journals (Sweden)

    Ning Ye

    2015-01-01

    Full Text Available The huge amount of gene expression data generated by microarray and next-generation sequencing technologies present challenges to exploit their biological meanings. When searching for the coexpression genes, the data mining process is largely affected by selection of algorithms. Thus, it is highly desirable to provide multiple options of algorithms in the user-friendly analytical toolkit to explore the gene expression signatures. For this purpose, we developed GESearch, an interactive graphical user interface (GUI toolkit, which is written in MATLAB and supports a variety of gene expression data files. This analytical toolkit provides four models, including the mean, the regression, the delegate, and the ensemble models, to identify the coexpression genes, and enables the users to filter data and to select gene expression patterns by browsing the display window or by importing knowledge-based genes. Subsequently, the utility of this analytical toolkit is demonstrated by analyzing two sets of real-life microarray datasets from cell-cycle experiments. Overall, we have developed an interactive GUI toolkit that allows for choosing multiple algorithms for analyzing the gene expression signatures.

  20. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  1. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  2. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  3. Molecular signatures associated with HCV-induced hepatocellular carcinoma and liver metastasis.

    Directory of Open Access Journals (Sweden)

    Valeria De Giorgi

    Full Text Available Hepatocellular carcinomas (HCCs are a heterogeneous group of tumors that differ in risk factors and genetic alterations. In Italy, particularly Southern Italy, chronic hepatitis C virus (HCV infection represents the main cause of HCC. Using high-density oligoarrays, we identified consistent differences in gene-expression between HCC and normal liver tissue. Expression patterns in HCC were also readily distinguishable from those associated with liver metastases. To characterize molecular events relevant to hepatocarcinogenesis and identify biomarkers for early HCC detection, gene expression profiling of 71 liver biopsies from HCV-related primary HCC and corresponding HCV-positive non-HCC hepatic tissue, as well as gastrointestinal liver metastases paired with the apparently normal peri-tumoral liver tissue, were compared to 6 liver biopsies from healthy individuals. Characteristic gene signatures were identified when normal tissue was compared with HCV-related primary HCC, corresponding HCV-positive non-HCC as well as gastrointestinal liver metastases. Pathway analysis classified the cellular and biological functions of the genes differentially expressed as related to regulation of gene expression and post-translational modification in HCV-related primary HCC; cellular Growth and Proliferation, and Cell-To-Cell Signaling and Interaction in HCV-related non HCC samples; Cellular Growth and Proliferation and Cell Cycle in metastasis. Also characteristic gene signatures were identified of HCV-HCC progression for early HCC diagnosis.A diagnostic molecular signature complementing conventional pathologic assessment was identified.

  4. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  5. Molecular Aging of Human Liver: An Epigenetic/Transcriptomic Signature.

    Science.gov (United States)

    Bacalini, Maria Giulia; Franceschi, Claudio; Gentilini, Davide; Ravaioli, Francesco; Zhou, Xiaoyuan; Remondini, Daniel; Pirazzini, Chiara; Giuliani, Cristina; Marasco, Elena; Gensous, Noémie; Di Blasio, Anna Maria; Ellis, Ewa; Gramignoli, Roberto; Castellani, Gastone; Capri, Miriam; Strom, Stephen; Nardini, Christine; Cescon, Matteo; Grazi, Gian Luca; Garagnani, Paolo

    2018-03-15

    The feasibility of liver transplantation from old healthy donors suggests that this organ is able to preserve its functionality during aging. To explore the biological basis of this phenomenon, we characterized the epigenetic profile of liver biopsies collected from 45 healthy liver donors ranging from 13 to 90 years old using the Infinium HumanMethylation450 BeadChip. The analysis indicates that a large remodeling in DNA methylation patterns occurs, with 8823 age-associated differentially methylated CpG probes. Notably, these age-associated changes tended to level off after the age of 60, as confirmed by Horvath's clock. Using stringent selection criteria we further identified a DNA methylation signature of aging liver including 75 genomic regions. We demonstrated that this signature is specific for liver compared to other tissues and that it is able to detect biological age-acceleration effects associated with obesity. Finally we combined DNA methylation measurements with available expression data. Although the intersection between the two omic characterizations was low, both approaches suggested a previously unappreciated role of epithelial-mesenchymal transition and Wnt signaling pathways in the aging of human liver.

  6. Rotation, scale, and translation invariant pattern recognition using feature extraction

    Science.gov (United States)

    Prevost, Donald; Doucet, Michel; Bergeron, Alain; Veilleux, Luc; Chevrette, Paul C.; Gingras, Denis J.

    1997-03-01

    A rotation, scale and translation invariant pattern recognition technique is proposed.It is based on Fourier- Mellin Descriptors (FMD). Each FMD is taken as an independent feature of the object, and a set of those features forms a signature. FMDs are naturally rotation invariant. Translation invariance is achieved through pre- processing. A proper normalization of the FMDs gives the scale invariance property. This approach offers the double advantage of providing invariant signatures of the objects, and a dramatic reduction of the amount of data to process. The compressed invariant feature signature is next presented to a multi-layered perceptron neural network. This final step provides some robustness to the classification of the signatures, enabling good recognition behavior under anamorphically scaled distortion. We also present an original feature extraction technique, adapted to optical calculation of the FMDs. A prototype optical set-up was built, and experimental results are presented.

  7. Geographic patterns of networks derived from extreme precipitation over the Indian subcontinent

    Science.gov (United States)

    Stolbova, Veronika; Bookhagen, Bodo; Marwan, Norbert; Kurths, Juergen

    2014-05-01

    Complex networks (CN) and event synchronization (ES) methods have been applied to study a number of climate phenomena such as Indian Summer Monsoon (ISM), South-American Monsoon, and African Monsoon. These methods proved to be powerful tools to infer interdependencies in climate dynamics between geographical sites, spatial structures, and key regions of the considered climate phenomenon. Here, we use these methods to study the spatial temporal variability of the extreme rainfall over the Indian subcontinent, in order to filter the data by coarse-graining the network, and to identify geographic patterns that are signature features (spatial signatures) of the ISM. We find four main geographic patterns of networks derived from extreme precipitation over the Indian subcontinent using up-to-date satellite-derived, and high temporal and spatial resolution rain-gauge interpolated daily rainfall datasets. In order to prove that our results are also relevant for other climatic variables like pressure and temperature, we use re-analysis data provided by the National Center for Environmental Prediction and National Center for Atmospheric Research (NCEP/NCAR). We find that two of the patterns revealed from the CN extreme rainfall analysis coincide with those obtained for the pressure and temperature fields, and all four above mentioned patterns can be explained by topography, winds, and monsoon circulation. CN and ES enable to select the most informative regions for the ISM, providing realistic description of the ISM dynamics with fewer data, and also help to infer geographic pattern that are spatial signatures of the ISM. These patterns deserve a special attention for the meteorologists and can be used as markers of the ISM variability.

  8. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  9. Flow-Signature Analysis of Water Consumption in Nonresidential Building Water Networks Using High-Resolution and Medium-Resolution Smart Meter Data: Two Case Studies

    Science.gov (United States)

    Clifford, Eoghan; Mulligan, Sean; Comer, Joanne; Hannon, Louise

    2018-01-01

    Real-time monitoring of water consumption activities can be an effective mechanism to achieve efficient water network management. This approach, largely enabled by the advent of smart metering technologies, is gradually being practiced in domestic and industrial contexts. In particular, identifying water consumption habits from flow-signatures, i.e., the specific end-usage patterns, is being investigated as a means for conservation in both the residential and nonresidential context. However, the quality of meter data is bivariate (dependent on number of meters and data temporal resolution) and as a result, planning a smart metering scheme is relatively difficult with no generic design approach available. In this study, a comprehensive medium-resolution to high-resolution smart metering program was implemented at two nonresidential trial sites to evaluate the effect of spatial and temporal data aggregation. It was found that medium-resolution water meter data were capable of exposing regular, continuous, peak use, and diurnal patterns which reflect group wide end-usage characteristics. The high-resolution meter data permitted flow-signature at a personal end-use level. Through this unique opportunity to observe water usage characteristics via flow-signature patterns, newly defined hydraulic-based design coefficients determined from Poisson rectangular pulse were developed to intuitively aid in the process of pattern discovery with implications for automated activity recognition applications. A smart meter classification and siting index was introduced which categorizes meter resolution in terms of their suitable application.

  10. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  11. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  12. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  13. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  14. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  15. ChromaSig: a probabilistic approach to finding common chromatin signatures in the human genome.

    Directory of Open Access Journals (Sweden)

    Gary Hon

    2008-10-01

    Full Text Available Computational methods to identify functional genomic elements using genetic information have been very successful in determining gene structure and in identifying a handful of cis-regulatory elements. But the vast majority of regulatory elements have yet to be discovered, and it has become increasingly apparent that their discovery will not come from using genetic information alone. Recently, high-throughput technologies have enabled the creation of information-rich epigenetic maps, most notably for histone modifications. However, tools that search for functional elements using this epigenetic information have been lacking. Here, we describe an unsupervised learning method called ChromaSig to find, in an unbiased fashion, commonly occurring chromatin signatures in both tiling microarray and sequencing data. Applying this algorithm to nine chromatin marks across a 1% sampling of the human genome in HeLa cells, we recover eight clusters of distinct chromatin signatures, five of which correspond to known patterns associated with transcriptional promoters and enhancers. Interestingly, we observe that the distinct chromatin signatures found at enhancers mark distinct functional classes of enhancers in terms of transcription factor and coactivator binding. In addition, we identify three clusters of novel chromatin signatures that contain evolutionarily conserved sequences and potential cis-regulatory elements. Applying ChromaSig to a panel of 21 chromatin marks mapped genomewide by ChIP-Seq reveals 16 classes of genomic elements marked by distinct chromatin signatures. Interestingly, four classes containing enrichment for repressive histone modifications appear to be locally heterochromatic sites and are enriched in quickly evolving regions of the genome. The utility of this approach in uncovering novel, functionally significant genomic elements will aid future efforts of genome annotation via chromatin modifications.

  16. EEG signatures of arm isometric exertions in preparation, planning and execution.

    Science.gov (United States)

    Nasseroleslami, Bahman; Lakany, Heba; Conway, Bernard A

    2014-04-15

    The electroencephalographic (EEG) activity patterns in humans during motor behaviour provide insight into normal motor control processes and for diagnostic and rehabilitation applications. While the patterns preceding brisk voluntary movements, and especially movement execution, are well described, there are few EEG studies that address the cortical activation patterns seen in isometric exertions and their planning. In this paper, we report on time and time-frequency EEG signatures in experiments in normal subjects (n=8), using multichannel EEG during motor preparation, planning and execution of directional centre-out arm isometric exertions performed at the wrist in the horizontal plane, in response to instruction-delay visual cues. Our observations suggest that isometric force exertions are accompanied by transient and sustained event-related potentials (ERP) and event-related (de-)synchronisations (ERD/ERS), comparable to those of a movement task. Furthermore, the ERPs and ERD/ERS are also observed during preparation and planning of the isometric task. Comparison of ear-lobe-referenced and surface Laplacian ERPs indicates the contribution of superficial sources in supplementary and pre-motor (FC(z)), parietal (CP(z)) and primary motor cortical areas (C₁ and FC₁) to ERPs (primarily negative peaks in frontal and positive peaks in parietal areas), but contribution of deep sources to sustained time-domain potentials (negativity in planning and positivity in execution). Transient and sustained ERD patterns in μ and β frequency bands of ear-lobe-referenced and surface Laplacian EEG indicate the contribution of both superficial and deep sources to ERD/ERS. As no physical displacement happens during the task, we can infer that the underlying mechanisms of motor-related ERPs and ERD/ERS patterns do not only depend on change in limb coordinate or muscle-length-dependent ascending sensory information and are primary generated by motor preparation, direction

  17. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  18. Modeling Multi-Mobile Agents System Based on Coalition Signature Mechanism Using UML

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; HUANGHaiping; WANGRuchuan

    2004-01-01

    With the development of electronic commerce and agent techniques, multi-mobile agents cooperation can not only improve the efficiency of electronic business trade, but more importantly, it has a comprehensive applicative value in solving the security issues of mobile agent system. This paper firstly describes the mechanism of multi-mobile agents coalition signature aiming at the system security. Subsequently it brings forward a basic architecture of Multi-mobile agents system (MMAS) based on the design pattern of multi-mobile agents. The paper uses the diagrs_rn of UML, such as use case diagram, class diagram and sequence diagram to build the detailed model of the coalition signature and multi-mobile agents cooperation results. Through security analysis, we find that multimobile agents cooperation and interaction can solve some security problems of mobile agents in transfer, and also it can improve the efficiency of business trade. These results indicate that MMAS has a high security performance and can be widely used in E-commerce trade.

  19. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  20. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  1. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  2. Magnetic resonance imaging-based cerebral tissue classification reveals distinct spatiotemporal patterns of changes after stroke in non-human primates.

    Science.gov (United States)

    Bouts, Mark J R J; Westmoreland, Susan V; de Crespigny, Alex J; Liu, Yutong; Vangel, Mark; Dijkhuizen, Rick M; Wu, Ona; D'Arceuil, Helen E

    2015-12-15

    Spatial and temporal changes in brain tissue after acute ischemic stroke are still poorly understood. Aims of this study were three-fold: (1) to determine unique temporal magnetic resonance imaging (MRI) patterns at the acute, subacute and chronic stages after stroke in macaques by combining quantitative T2 and diffusion MRI indices into MRI 'tissue signatures', (2) to evaluate temporal differences in these signatures between transient (n = 2) and permanent (n = 2) middle cerebral artery occlusion, and (3) to correlate histopathology findings in the chronic stroke period to the acute and subacute MRI derived tissue signatures. An improved iterative self-organizing data analysis algorithm was used to combine T2, apparent diffusion coefficient (ADC), and fractional anisotropy (FA) maps across seven successive timepoints (1, 2, 3, 24, 72, 144, 240 h) which revealed five temporal MRI signatures, that were different from the normal tissue pattern (P MRI signatures associated with specific tissue fates may further aid in assessing and monitoring the efficacy of novel pharmaceutical treatments for stroke in a pre-clinical and clinical setting.

  3. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  4. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  5. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  6. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  7. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  8. Modeling and inferring cleavage patterns in proliferating epithelia.

    Directory of Open Access Journals (Sweden)

    Ankit B Patel

    2009-06-01

    Full Text Available The regulation of cleavage plane orientation is one of the key mechanisms driving epithelial morphogenesis. Still, many aspects of the relationship between local cleavage patterns and tissue-level properties remain poorly understood. Here we develop a topological model that simulates the dynamics of a 2D proliferating epithelium from generation to generation, enabling the exploration of a wide variety of biologically plausible cleavage patterns. We investigate a spectrum of models that incorporate the spatial impact of neighboring cells and the temporal influence of parent cells on the choice of cleavage plane. Our findings show that cleavage patterns generate "signature" equilibrium distributions of polygonal cell shapes. These signatures enable the inference of local cleavage parameters such as neighbor impact, maternal influence, and division symmetry from global observations of the distribution of cell shape. Applying these insights to the proliferating epithelia of five diverse organisms, we find that strong division symmetry and moderate neighbor/maternal influence are required to reproduce the predominance of hexagonal cells and low variability in cell shape seen empirically. Furthermore, we present two distinct cleavage pattern models, one stochastic and one deterministic, that can reproduce the empirical distribution of cell shapes. Although the proliferating epithelia of the five diverse organisms show a highly conserved cell shape distribution, there are multiple plausible cleavage patterns that can generate this distribution, and experimental evidence suggests that indeed plants and fruitflies use distinct division mechanisms.

  9. Groundwater flow pattern in the Ruataniwha Plains as derived from the isotope and chemistry signature of the water

    International Nuclear Information System (INIS)

    Morgenstern, U.; van der Raaij, R.; Baalousha, H.

    2012-01-01

    recharge in addition to recharge by rain. Hydrochemistry data for the Ruataniwha Basin show high variability in space and time, consistent with the complicated hydrogeological setting, which consists of multi-layered aquifer systems in different lithologic strata and pockets of gravels. The use of a combination of water isotopes ( 18 O and 2 H), dissolved gases (Ar and N2), and hierarchical cluster analysis of the hydrochemistry parameters allowed characterisation of the recharge source for most of the groundwater samples. Only groundwaters in the vicinity of the large rivers (Waipawa and Tukituki) show river recharge source a signature, indicating gravel deposits connecting the present river bed to the deep groundwater flow system along these rivers. River-recharged groundwater is observed only in the lower reaches of these rivers, downstream from losing stretches of the rivers. Oxic groundwater is present only in the vicinity of the Waipawa River, indicating that only this river has deposited relatively clean gravel aquifers (without organic matter that would otherwise deplete the oxygen). All the groundwaters in the southern part of the basin in the vicinity of small rivers and streams show a pure rain recharge signature. This indicates that there is little connection of rivers and streams there to the deep groundwater system in this area. All samples follow similar and consistent trends of hydrochemistry versus age, indicating that, despite the complex structure of the groundwater system with localised heterogeneity at basin-wide scale, groundwater in the basin overall has a homogenous flow pattern. (author). 44 refs., 21 figs., 7 tabs.

  10. Thermodynamic signatures of fragment binding: Validation of direct versus displacement ITC titrations.

    Science.gov (United States)

    Rühmann, Eggert; Betz, Michael; Fricke, Marie; Heine, Andreas; Schäfer, Martina; Klebe, Gerhard

    2015-04-01

    Detailed characterization of the thermodynamic signature of weak binding fragments to proteins is essential to support the decision making process which fragments to take further for the hit-to-lead optimization. Isothermal titration calorimetry (ITC) is the method of choice to record thermodynamic data, however, weak binding ligands such as fragments require the development of meaningful and reliable measuring protocols as usually sigmoidal titration curves are hardly possible to record due to limited solubility. Fragments can be titrated either directly under low c-value conditions (no sigmoidal curve) or indirectly by use of a strong binding ligand displacing the pre-incubated weak fragment from the protein. The determination of Gibbs free energy is reliable and rather independent of the applied titration protocol. Even though the displacement method achieves higher accuracy, the obtained enthalpy-entropy profile depends on the properties of the used displacement ligand. The relative enthalpy differences across different displacement experiments reveal a constant signature and can serve as a thermodynamic fingerprint for fragments. Low c-value titrations are only reliable if the final concentration of the fragment in the sample cell exceeds 2-10 fold its K(D) value. Limited solubility often prevents this strategy. The present study suggests an applicable protocol to characterize the thermodynamic signature of protein-fragment binding. It shows however, that such measurements are limited by protein and fragment solubility. Deviating profiles obtained by use of different displacement ligands indicate that changes in the solvation pattern and protein dynamics most likely take influence on the resulting overall binding signature. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  12. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  13. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  14. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  15. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  16. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  17. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  18. Fluvial signatures of modern and paleo orographic rainfall gradients

    Science.gov (United States)

    Schildgen, Taylor; Strecker, Manfred

    2016-04-01

    The morphology of river profiles is intimately linked to both climate and tectonic forcing. While much interest recently has focused on how river profiles can be inverted to derive uplift histories, here we show how in regions of strong orographic rainfall gradients, rivers may primarily record spatial patterns of precipitation. As a case study, we examine the eastern margin of the Andean plateau in NW Argentina, where the outward (eastward) growth of a broken foreland has led to a eastward shift in the main orographic rainfall gradient over the last several million years. Rivers influenced by the modern rainfall gradient are characterized by normalized river steepness values in tributary valleys that closely track spatial variations in rainfall, with higher steepness values in drier areas and lower steepness values in wetter areas. The same river steepness pattern has been predicted in landscape evolution models that apply a spatial gradient in rainfall to a region of uniform erosivity and uplift rate (e.g., Han et al., 2015). Also, chi plots from river networks on individual ranges affected by the modern orographic rainfall reveal patterns consistent with assymmetric precipitation across the range: the largest channels on the windward slopes are characterized by capture, while the longest channels on the leeward slopes are dominated by beheadings. Because basins on the windward side both lengthen and widen, tributary channels in the lengthening basins are characterized by capture, while tributary channels from neighboring basins on the windward side are dominated by beheadings. These patterns from the rivers influenced by the modern orographic rainfall gradient provide a guide for identifying river morphometric signatures of paleo orographic rainfall gradients. Mountain ranges to the west of the modern orographic rainfall have been interpreted to mark the location of orographic rainfall in the past, but these ranges are now in spatially near-uniform semi-arid to

  19. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  20. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  1. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  2. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  3. The ionospheric signature of Pi 2 pulsations observed by STARE

    International Nuclear Information System (INIS)

    Sutcliffe, P.R.; Nielsen, E.

    1992-01-01

    This study extends the work of Sutcliffe and Nielsen (1990) in which a classical Pi 2 pulsation was first isolated in Scandinavian Twin Auroral Radar Experiment (STARE) data. A high-pass-filtering technique is used to remove the background electric field in the STARE data and so reveal the spatial and temporal ionospheric signatures of the Pi 2 pulsation electric fields. A number of events are identified and examples presented in which pulsation electric fields up to 50 mV/m are observed. Magnetic field oscillations computed from the filtered STARE data using the Biot-Savart law correlate well with pulsation magnetometer data. A 180 degree phase difference is observed between high- and low-altitude X component pulsations. The ionospheric signature of a Pi 2 is located slightly poleward of the core of the auroral breakup region where the southward, westward, and northward directed background electric fields coverage; the strongest pulsation fields occur in the region of equatorward directed electric fields. The ionospheric electric field patterns of the Pi 2 pulsations determined from the STARE data correlate well with those modeled for a transverse Alfven wave incident on an east-west aligned high-conductivity strip in the ionosphere

  4. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  5. Neural signatures of attention: insights from decoding population activity patterns.

    Science.gov (United States)

    Sapountzis, Panagiotis; Gregoriou, Georgia G

    2018-01-01

    Understanding brain function and the computations that individual neurons and neuronal ensembles carry out during cognitive functions is one of the biggest challenges in neuroscientific research. To this end, invasive electrophysiological studies have provided important insights by recording the activity of single neurons in behaving animals. To average out noise, responses are typically averaged across repetitions and across neurons that are usually recorded on different days. However, the brain makes decisions on short time scales based on limited exposure to sensory stimulation by interpreting responses of populations of neurons on a moment to moment basis. Recent studies have employed machine-learning algorithms in attention and other cognitive tasks to decode the information content of distributed activity patterns across neuronal ensembles on a single trial basis. Here, we review results from studies that have used pattern-classification decoding approaches to explore the population representation of cognitive functions. These studies have offered significant insights into population coding mechanisms. Moreover, we discuss how such advances can aid the development of cognitive brain-computer interfaces.

  6. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  7. Identification of Signatures to Detect Undeclared Nuclear Activities at the Front-end of the Fuel Cycle

    International Nuclear Information System (INIS)

    Varga, Z.; Mayer, K.; Krajko, J.; Ho, D.; Wallenius, M.; )

    2015-01-01

    Several parameters of the nuclear materials can be used to verify their sources and the declared origin for safeguards purposes, such as chemical composition, nuclear material content, impurities or the isotopic compositions of major or trace-level constituents. Combining these parameters (also known as signatures) enables the verification of the safeguarded materials at high confidence, and also allows detecting the use of undeclared nuclear materials. Moreover, several signatures can be used not only as a comparative indicator against another samples or datasets, but also permits to reveal the possible origin of the undeclared feed material without any prior knowledge on the provenance. The measurable signatures, however, have different strength and require diverse analytical techniques, thus the knowledge of their variations throughout the complex production processes is of vital importance to use them for safeguards. The aim of the present study is to investigate the behaviour and relevance of as many signatures for safeguards as possible in a respective uranium ore concentrate production process. Within the framework of the European Commission Support Programme A 1753 the production of uranium ore concentrate from uranium ore was followed and sampled at each stage. By the comprehensive analysis of the samples (major and minor constituents, molecular structure, morphology, rare-earth elemental pattern, trace-level organic residues, age measurement, isotopic study of S, Pb, Sr, Nd and Th), together with the process information, the role and applicability of the various signatures can be assessed. By this means the appropriate and relevant safeguards parameters can be identified, their advantages and limitations can be revealed. (author)

  8. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  9. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  10. Global patterns of amphibian phylogenetic diversity

    DEFF Research Database (Denmark)

    Fritz, Susanne; Rahbek, Carsten

    2012-01-01

    Aim  Phylogenetic diversity can provide insight into how evolutionary processes may have shaped contemporary patterns of species richness. Here, we aim to test for the influence of phylogenetic history on global patterns of amphibian species richness, and to identify areas where macroevolutionary...... processes such as diversification and dispersal have left strong signatures on contemporary species richness. Location  Global; equal-area grid cells of approximately 10,000 km2. Methods  We generated an amphibian global supertree (6111 species) and repeated analyses with the largest available molecular...... phylogeny (2792 species). We combined each tree with global species distributions to map four indices of phylogenetic diversity. To investigate congruence between global spatial patterns of amphibian species richness and phylogenetic diversity, we selected Faith’s phylogenetic diversity (PD) index...

  11. Effects Of Hydrothermal Alteration On Magnetic Properties And Magnetic Signatures - Implications For Predictive Magnetic Exploration Models

    Science.gov (United States)

    Clark, D.

    2012-12-01

    Magnetics is the most widely used geophysical method in hard rock exploration and magnetic surveys are an integral part of exploration programs for many types of mineral deposit, including porphyry Cu, intrusive-related gold, volcanic-hosted epithermal Au, IOCG, VMS, and Ni sulfide deposits. However, the magnetic signatures of ore deposits and their associated mineralized systems are extremely variable and exploration that is based simply on searching for signatures that resemble those of known deposits and systems is rarely successful. Predictive magnetic exploration models are based upon well-established geological models, combined with magnetic property measurements and geological information from well-studied deposits, and guided by magnetic petrological understanding of the processes that create, destroy and modify magnetic minerals in rocks. These models are designed to guide exploration by predicting magnetic signatures that are appropriate to specific geological settings, taking into account factors such as tectonic province; protolith composition; post-formation tilting/faulting/ burial/ exhumation and partial erosion; and metamorphism. Patterns of zoned hydrothermal alteration are important indicators of potentially mineralized systems and, if properly interpreted, can provided vectors to ore. Magnetic signatures associated with these patterns at a range of scales can provide valuable information on prospectivity and can guide drilling, provided they are correctly interpreted in geological terms. This presentation reviews effects of the important types of hydrothermal alteration on magnetic properties within mineralized systems, with particular reference to porphyry copper and IOCG deposits. For example, an unmodified gold-rich porphyry copper system, emplaced into mafic-intermediate volcanic host rocks (such as Bajo de la Alumbrera, Argentina) exhibits an inner potassic zone that is strongly mineralized and magnetite-rich, which is surrounded by an outer

  12. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  13. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  14. Detection of discriminative sequence patterns in the neighborhood of proline cis peptide bonds and their functional annotation

    Directory of Open Access Journals (Sweden)

    Papaloukas Costas

    2009-04-01

    Full Text Available Abstract Background Polypeptides are composed of amino acids covalently bonded via a peptide bond. The majority of peptide bonds in proteins is found to occur in the trans conformation. In spite of their infrequent occurrence, cis peptide bonds play a key role in the protein structure and function, as well as in many significant biological processes. Results We perform a systematic analysis of regions in protein sequences that contain a proline cis peptide bond in order to discover non-random associations between the primary sequence and the nature of proline cis/trans isomerization. For this purpose an efficient pattern discovery algorithm is employed which discovers regular expression-type patterns that are overrepresented (i.e. appear frequently repeated in a set of sequences. Four types of pattern discovery are performed: i exact pattern discovery, ii pattern discovery using a chemical equivalency set, iii pattern discovery using a structural equivalency set and iv pattern discovery using certain amino acids' physicochemical properties. The extracted patterns are carefully validated using a specially implemented scoring function and a significance measure (i.e. log-probability estimate indicative of their specificity. The score threshold for the first three types of pattern discovery is 0.90 while for the last type of pattern discovery 0.80. Regarding the significance measure, all patterns yielded values in the range [-9, -31] which ensure that the derived patterns are highly unlikely to have emerged by chance. Among the highest scoring patterns, most of them are consistent with previous investigations concerning the neighborhood of cis proline peptide bonds, and many new ones are identified. Finally, the extracted patterns are systematically compared against the PROSITE database, in order to gain insight into the functional implications of cis prolyl bonds. Conclusion Cis patterns with matches in the PROSITE database fell mostly into two

  15. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  16. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  17. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  18. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  19. Signatures of Biogeomorphic Feedbacks in Salt-Marsh Systems

    Science.gov (United States)

    D'Alpaos, Andrea; Marani, Marco

    2015-04-01

    Salt-marsh ecosystems which play a large role in the bio-geomorphological evolution of intertidal areas. Dense stands of halophytic vegetations which populate salt marshes largely control the dynamics of these ecosystems influencing marsh hydrodynamics and sediment transport through enhanced flow resistance and settling, and direct particle capture by plant stems. Moreover, plants are also known to increase vertical accretion through direct organic accretion. Field evidence and the results of biomorphodynamic models indeed show that the interplay between physical and biological processes generates some striking biological and morphological patterns at different scales. One such pattern, vegetation zonation, consists in a mosaic of vegetation patches, of approximately uniform composition, displaying sharp transitions in the presence of extremely small topographic gradients. Here we develop a two-dimensional model which describes the mutual interaction and adjustment between tidal flows, sediment transport and morphology mediated by vegetation influence. The model allows us describe the coupled evolution of marsh platforms and channel networks cutting through them. A number of different scenarios were modelled to analyze the changes induced in bio-geomorphic patterns by plants with different characteristics, within marshes characterized by different drainage densities, or subjected to changing environmental forcing such as rates of relative sea level rise and sediment supply. Model results emphasize that zonation patterns are a signature of bio-geomorphic feedbacks with vegetation acting as a landscape constructor which feeds back on, directly alters, and contributes to shape tidal environments. In addition, model results show that biogeomorphic feedbacks critically affect the response and the resilience of salt-marsh landscapes to changes in the environmental forcing.

  20. IAR signatures in the ionosphere: Modeling and observations at the Chibis-M microsatellite

    Science.gov (United States)

    Pilipenko, V.; Dudkin, D.; Fedorov, E.; Korepanov, V.; Klimov, S.

    2017-02-01

    A peculiar feature of geomagnetic variations at middle/low latitudes in the ULF band, just below the fundamental tone of the Schumann resonance, is the occurrence of a multi-band spectral resonant structure, observed by high-sensitivity induction magnetometers during nighttime. The occurrence of such spectral structure was commonly attributed to the Ionospheric Alfvén Resonator (IAR) in the upper ionosphere. Rather surprisingly, while ground observations of the IAR are ubiquitous, there are practically no reports on the IAR signatures from space missions. According to the new paradigm, the multi-band spectral structure excited by a lightning discharge is in fact produced by a regular sequence of an original pulse from a stroke and echo-pulses reflected from the IAR upper boundary. Upon the interaction of initial lightning-generated pulse with the anisotropic lower ionosphere, it partially penetrates into the ionosphere, travels up the ionosphere as an Alfvén pulse, and reflects back from the upper IAR boundary. The superposition of the initial pulse and echo-pulses produces spectra with multiple spectral peaks. Our modeling of Alfvénic pulse propagation in a system with the altitude profile of Alfven velocity modeling the realistic ionosphere has shown that IAR spectral signatures are to be evident only on the ground and above the IAR. Inside the IAR, the superposition of upward and downward propagating pulses produces a more complicated spectral pattern and the IAR spectral signatures deteriorate. We have used electric field data from the low-orbit Chibis-M microsatellite to search for IAR signatures in the ionosphere. We found evidence that the multi-band structure revealed by spectral analysis in the frequency range of interest is indeed the result of a sequence of lightning-produced pulses. According to the proposed conception it seems possible to comprehend why the IAR signatures are less evident in the ionosphere than on the ground.

  1. Gene expression patterns in blood leukocytes discriminate patients with acute infections

    Science.gov (United States)

    Allman, Windy; Chung, Wendy; Mejias, Asuncion; Ardura, Monica; Glaser, Casey; Wittkowski, Knut M.; Piqueras, Bernard; Banchereau, Jacques; Palucka, A. Karolina; Chaussabel, Damien

    2007-01-01

    Each infectious agent represents a unique combination of pathogen-associated molecular patterns that interact with specific pattern-recognition receptors expressed on immune cells. Therefore, we surmised that the blood immune cells of individuals with different infections might bear discriminative transcriptional signatures. Gene expression profiles were obtained for 131 peripheral blood samples from pediatric patients with acute infections caused by influenza A virus, Gram-negative (Escherichia coli) or Gram-positive (Staphylococcus aureus and Streptococcus pneumoniae) bacteria. Thirty-five genes were identified that best discriminate patients with influenza A virus infection from patients with either E coli or S pneumoniae infection. These genes classified with 95% accuracy (35 of 37 samples) an independent set of patients with either influenza A, E coli, or S pneumoniae infection. A different signature discriminated patients with E coli versus S aureus infections with 85% accuracy (34 of 40). Furthermore, distinctive gene expression patterns were observed in patients presenting with respiratory infections of different etiologies. Thus, microarray analyses of patient peripheral blood leukocytes might assist in the differential diagnosis of infectious diseases. PMID:17105821

  2. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  3. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  4. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  5. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  6. Nature's chemical signatures in human olfaction: a foodborne perspective for future biotechnology.

    Science.gov (United States)

    Dunkel, Andreas; Steinhaus, Martin; Kotthoff, Matthias; Nowak, Bettina; Krautwurst, Dietmar; Schieberle, Peter; Hofmann, Thomas

    2014-07-07

    The biocatalytic production of flavor naturals that determine chemosensory percepts of foods and beverages is an ever challenging target for academic and industrial research. Advances in chemical trace analysis and post-genomic progress at the chemistry-biology interface revealed odor qualities of nature's chemosensory entities to be defined by odorant-induced olfactory receptor activity patterns. Beyond traditional views, this review and meta-analysis now shows characteristic ratios of only about 3 to 40 genuine key odorants for each food, from a group of about 230 out of circa 10 000 food volatiles. This suggests the foodborn stimulus space has co-evolved with, and roughly match our circa 400 olfactory receptors as best natural agonists. This perspective gives insight into nature's chemical signatures of smell, provides the chemical odor codes of more than 220 food samples, and beyond addresses industrial implications for producing recombinants that fully reconstruct the natural odor signatures for use in flavors and fragrances, fully immersive interactive virtual environments, or humanoid bioelectronic noses. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  8. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  9. Autoantibody signature differentiates Wilms tumor patients from neuroblastoma patients.

    Directory of Open Access Journals (Sweden)

    Jana Schmitt

    Full Text Available Several studies report autoantibody signatures in cancer. The majority of these studies analyzed adult tumors and compared the seroreactivity pattern of tumor patients with the pattern in healthy controls. Here, we compared the autoimmune response in patients with neuroblastoma and patients with Wilms tumor representing two different childhood tumors. We were able to differentiate untreated neuroblastoma patients from untreated Wilms tumor patients with an accuracy of 86.8%, a sensitivity of 87.0% and a specificity of 86.7%. The separation of treated neuroblastoma patients from treated Wilms tumor patients' yielded comparable results with an accuracy of 83.8%. We furthermore identified the antigens that contribute most to the differentiation between both tumor types. The analysis of these antigens revealed that neuroblastoma was considerably more immunogenic than Wilms tumor. The reported antigens have not been found to be relevant for comparative analyses between other tumors and controls. In summary, neuroblastoma appears as a highly immunogenic tumor as demonstrated by the extended number of antigens that separate this tumor from Wilms tumor.

  10. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  11. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  12. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  13. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  14. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  15. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  16. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  17. Observation of the human body thermoregulation and extraction of its vein signature using NIR and MWIR imaging

    Science.gov (United States)

    Bouzida, Nabila; Bendada, Abdelhakim; Maldague, Xavier P.

    2009-05-01

    The article aims first to present a new study on the thermal regulatory response of the human skin surface while exposed to a cold environment. Our work has shown that when a cold stress is applied to the left hand, thermal infrared imaging (MWIR spectral band: 3-5 μm) allows a clear observation of a temperature rise on the right hand. Moreover, a frequency analysis was also carried out upon selected vein pixels of the images monitored during the same cold stress experiment. The objective was to identify the specific frequencies that could be linked to some physiological mechanisms of the human body. This kind of study could be very useful for the characterization of possible thermo-physiological pathologies. Besides thermoregulation, we also present in this article some results on the extraction of the hand vein pattern. Firstly, we show some vein extraction results obtained after image processing of the thermal images recorded in the thermal band (MWIR), then we compare this vein pattern to the signature obtained with a camera operating in the NIR spectral band (0.85-1.7 μm). This method could be used as a complementary means for finger print signatures in biometrics.

  18. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  19. Identification of a transcriptional signature for the wound healing continuum

    Science.gov (United States)

    Peake, Matthew A; Caley, Mathew; Giles, Peter J; Wall, Ivan; Enoch, Stuart; Davies, Lindsay C; Kipling, David; Thomas, David W; Stephens, Phil

    2014-01-01

    There is a spectrum/continuum of adult human wound healing outcomes ranging from the enhanced (nearly scarless) healing observed in oral mucosa to scarring within skin and the nonhealing of chronic skin wounds. Central to these outcomes is the role of the fibroblast. Global gene expression profiling utilizing microarrays is starting to give insight into the role of such cells during the healing process, but no studies to date have produced a gene signature for this wound healing continuum. Microarray analysis of adult oral mucosal fibroblast (OMF), normal skin fibroblast (NF), and chronic wound fibroblast (CWF) at 0 and 6 hours post-serum stimulation was performed. Genes whose expression increases following serum exposure in the order OMF healing phenotype (the dysfunctional healing group), whereas genes with the converse pattern are potentially associated with a positive/preferential healing phenotype (the enhanced healing group). Sixty-six genes in the enhanced healing group and 38 genes in the dysfunctional healing group were identified. Overrepresentation analysis revealed pathways directly and indirectly associated with wound healing and aging and additional categories associated with differentiation, development, and morphogenesis. Knowledge of this wound healing continuum gene signature may in turn assist in the therapeutic assessment/treatment of a patient's wounds. PMID:24844339

  20. Th-2 signature in chronic airway diseases: towards the extinction of asthma-COPD overlap syndrome?

    Science.gov (United States)

    Cosío, Borja G; Pérez de Llano, Luis; Lopez Viña, Antolin; Torrego, Alfons; Lopez-Campos, Jose Luis; Soriano, Joan B; Martinez Moragon, Eva; Izquierdo, Jose Luis; Bobolea, Irina; Callejas, Javier; Plaza, Vicente; Miravitlles, Marc; Soler-Catalunya, Juan Jose

    2017-05-01

    We aimed to describe the differences and similarities between patients with chronic obstructive airway disease classified on the basis of classical diagnostic labels (asthma, chronic obstructive pulmonary disease (COPD), or asthma-COPD overlap (ACOS)) or according to the underlying inflammatory pattern (Th-2 signature, either Th-2-high or Th-2-low).We performed a cross-sectional study of patients aged ≥40 years and with a post-bronchodilator forced expiratory volume in 1 s to forced vital capacity ratio ≤0.7 with a previous diagnosis of asthma (non-smoking asthmatics (NSA)), COPD or ACOS, the latter including both smoking asthmatics (SA) and patients with eosinophilic COPD (COPD-e). Clinical, functional and inflammatory parameters (blood eosinophil count, IgE and exhaled nitric oxide fraction ( F eNO )) were compared between groups. Th-2 signature was defined by a blood eosinophil count ≥300 cells·μL -1 and/or a sputum eosinophil count ≥3%.Overall, 292 patients were included in the study: 89 with COPD, 94 NSA and 109 with ACOS (44 SA and 65 with COPD-e). No differences in symptoms or exacerbation rate were found between the three groups. With regards the underlying inflammatory pattern, 94 patients (32.2%) were characterised as Th-2-high and 198 (67.8%) as Th-2-low. The Th-2 signature was found in 49% of NSA, 3.3% of patients with COPD, 30% of SA and 49.3% of patients with COPD-e. This classification yielded significant differences in demographic, functional and inflammatory characteristics.We conclude that a classification based upon the inflammatory profile, irrespective of the taxonomy, provides a more clear distinction of patients with chronic obstructive airway disease. Copyright ©ERS 2017.

  1. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  2. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  3. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  4. Enhanced Arabidopsis pattern-triggered immunity by overexpression of cysteine-rich receptor-like kinases.

    Science.gov (United States)

    Yeh, Yu-Hung; Chang, Yu-Hsien; Huang, Pin-Yao; Huang, Jing-Bo; Zimmerli, Laurent

    2015-01-01

    Upon recognition of microbe-associated molecular patterns (MAMPs) such as the bacterial flagellin (or the derived peptide flg22) by pattern-recognition receptors (PRRs) such as the FLAGELLIN SENSING2 (FLS2), plants activate the pattern-triggered immunity (PTI) response. The L-type lectin receptor kinase-VI.2 (LecRK-VI.2) is a positive regulator of Arabidopsis thaliana PTI. Cysteine-rich receptor-like kinases (CRKs) possess two copies of the C-X8-C-X2-C (DUF26) motif in their extracellular domains and are thought to be involved in plant stress resistance, but data about CRK functions are scarce. Here, we show that Arabidopsis overexpressing the LecRK-VI.2-responsive CRK4, CRK6, and CRK36 demonstrated an enhanced PTI response and were resistant to virulent bacteria Pseudomonas syringae pv. tomato DC3000. Notably, the flg22-triggered oxidative burst was primed in CRK4, CRK6, and CRK36 transgenics and up-regulation of the PTI-responsive gene FLG22-INDUCED RECEPTOR-LIKE 1 (FRK1) was potentiated upon flg22 treatment in CRK4 and CRK6 overexpression lines or constitutively increased by CRK36 overexpression. PTI-mediated callose deposition was not affected by overexpression of CRK4 and CRK6, while CRK36 overexpression lines demonstrated constitutive accumulation of callose. In addition, Pst DC3000-mediated stomatal reopening was blocked in CRK4 and CRK36 overexpression lines, while overexpression of CRK6 induced constitutive stomatal closure suggesting a strengthening of stomatal immunity. Finally, bimolecular fluorescence complementation and co-immunoprecipitation analyses in Arabidopsis protoplasts suggested that the plasma membrane localized CRK4, CRK6, and CRK36 associate with the PRR FLS2. Association with FLS2 and the observation that overexpression of CRK4, CRK6, and CRK36 boosts specific PTI outputs and resistance to bacteria suggest a role for these CRKs in Arabidopsis innate immunity.

  5. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  6. The Effect of Aging on Muscular Dynamics Underlying Movement Patterns Changes.

    Science.gov (United States)

    Vernooij, Carlijn A; Rao, Guillaume; Berton, Eric; Retornaz, Frédérique; Temprado, Jean-Jacques

    2016-01-01

    Introduction: Aging leads to alterations not only within the complex subsystems of the neuro-musculo-skeletal system, but also in the coupling between them. Here, we studied how aging affects functional reorganizations that occur both within and between the behavioral and muscular levels, which must be coordinated to produce goal-directed movements. Using unimanual reciprocal Fitts' task, we examined the behavioral and muscular dynamics of older adults (74.4 ± 3.7 years) and compared them to those found for younger adults (23.2 ± 2.0 years). Methods: To achieve this objective, we manipulated the target size to trigger a phase transition in the behavioral regime and searched for concomitant signatures of a phase transition in the muscular coordination. Here, muscular coordination was derived by using the method of muscular synergy extraction. With this technique, we obtained functional muscular patterns through non-negative matrix factorization of the muscular signals followed by clustering the resulting synergies. Results: Older adults showed a phase transition in behavioral regime, although, in contrast to young participants, their kinematic profiles did not show a discontinuity. In parallel, muscular coordination displayed two typical signatures of a phase transition, that is, increased variability of coordination patterns and a reorganization of muscular synergies. Both signatures confirmed the existence of muscular reorganization in older adults, which is coupled with change in dynamical regime at behavioral level. However, relative to young adults, transition occurred at lower index of difficulty (ID) in older participants and the reorganization of muscular patterns lasted longer (over multiple IDs). Discussion: This implies that consistent changes occur in coordination processes across behavior and muscle. Furthermore, the repertoire of muscular patterns was reduced and somewhat modified for older adults, relative to young participants. This suggests that

  7. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  8. PSA response signatures - a powerful new prognostic indicator after radiation for prostate cancer?

    International Nuclear Information System (INIS)

    Denham, James W.; Lamb, David S.; Joseph, David; Matthews, John; Atkinson, Chris; Spry, Nigel A.; Duchesne, Gillian; Ebert, Martin; Steigler, Allison; D'Este, Catherine

    2009-01-01

    Background: We sought to determine whether inter-patient variations in pattern of PSA changes after radiation exist and, if so, are they prognostically significant. Methods: In the Trans-Tasman Radiation Oncology Group (TROG) 96.01 randomized controlled trial, patients with T2b,c,3,4 N0 prostate cancer (PC) were randomised to 0, 3 or 6 months maximal androgen deprivation prior to 66 Gy to the prostate and seminal vesicles (XRT). Patterns of anatomical site of failure were one of the trial endpoints. Serial serum PSA's were mandated at all follow-up visits. Pattern recognition software was developed to characterize PSA response 'signatures' (PRS) after therapy in individual patients. Results: By 2000, 270 eligible patients were randomised to radiation alone. Individual patient PSA values were observed to descend after radiation according to one of two characteristic 'signatures': single exponential (PRS Type 1), non-exponential (PRS Type 2). Compared to PRS Type 1, men with PRS Type 2 (50% of the group) had lower PSA nadir (nPSA) levels (p < .0001), longer doubling times on relapse (p = .006) and significantly lower rates of local (hazard ratio [HR]: 0.47, 95% confidence interval [0.30-0.75], p = .0014) and distant failure (HR: 0.25[0.13-0.46], p < .0001), death due to PC (HR: 0.20[0.10-0.42], p < .0001) and death due to any cause (HR: 0.37 [0.23-0.60], p < .0001). PRS retained its powerful prognostic significance in Cox models that incorporated all key pre-treatment covariates and nPSA. Conclusions: PRS reflect the presence of tumor phenotypes that vary substantially in their clinical behavior and response to XRT. Molecular characterization is now necessary

  9. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  10. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  11. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  12. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  13. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  14. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  15. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  16. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  17. Strain Pattern in Supercooled Liquids

    Science.gov (United States)

    Illing, Bernd; Fritschi, Sebastian; Hajnal, David; Klix, Christian; Keim, Peter; Fuchs, Matthias

    2016-11-01

    Investigations of strain correlations at the glass transition reveal unexpected phenomena. The shear strain fluctuations show an Eshelby-strain pattern [˜cos (4 θ ) /r2 ], characteristic of elastic response, even in liquids, at long times. We address this using a mode-coupling theory for the strain fluctuations in supercooled liquids and data from both video microscopy of a two-dimensional colloidal glass former and simulations of Brownian hard disks. We show that the long-ranged and long-lived strain signatures follow a scaling law valid close to the glass transition. For large enough viscosities, the Eshelby-strain pattern is visible even on time scales longer than the structural relaxation time τ and after the shear modulus has relaxed to zero.

  18. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  19. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  20. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  1. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  2. Multiwaveband simulation-based signature analysis of camouflaged human dismounts in cluttered environments with TAIThermIR and MuSES

    Science.gov (United States)

    Packard, Corey D.; Klein, Mark D.; Viola, Timothy S.; Hepokoski, Mark A.

    2016-10-01

    The ability to predict electro-optical (EO) signatures of diverse targets against cluttered backgrounds is paramount for signature evaluation and/or management. Knowledge of target and background signatures is essential for a variety of defense-related applications. While there is no substitute for measured target and background signatures to determine contrast and detection probability, the capability to simulate any mission scenario with desired environmental conditions is a tremendous asset for defense agencies. In this paper, a systematic process for the thermal and visible-through-infrared simulation of camouflaged human dismounts in cluttered outdoor environments is presented. This process, utilizing the thermal and EO/IR radiance simulation tool TAIThermIR (and MuSES), provides a repeatable and accurate approach for analyzing contrast, signature and detectability of humans in multiple wavebands. The engineering workflow required to combine natural weather boundary conditions and the human thermoregulatory module developed by ThermoAnalytics is summarized. The procedure includes human geometry creation, human segmental physiology description and transient physical temperature prediction using environmental boundary conditions and active thermoregulation. Radiance renderings, which use Sandford-Robertson BRDF optical surface property descriptions and are coupled with MODTRAN for the calculation of atmospheric effects, are demonstrated. Sensor effects such as optical blurring and photon noise can be optionally included, increasing the accuracy of detection probability outputs that accompany each rendering. This virtual evaluation procedure has been extensively validated and provides a flexible evaluation process that minimizes the difficulties inherent in human-subject field testing. Defense applications such as detection probability assessment, camouflage pattern evaluation, conspicuity tests and automatic target recognition are discussed.

  3. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  4. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  5. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  6. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  7. North Atlantic teleconnection patterns signature on sea level from satellite altimetry

    Science.gov (United States)

    Iglesias, Isabel; Lázaro, Clara; Joana Fernandes, M.; Bastos, Luísa

    2015-04-01

    Presently, satellite altimetry record is long enough to appropriately study inter-annual signals in sea level anomaly and ocean surface circulation, allowing the association of teleconnection patterns of low-frequency variability with the response of sea level. The variability of the Atlantic Ocean at basin-scale is known to be complex in space and time, with the dominant mode occurring on annual timescales. However, interannual and decadal variability have already been documented in sea surface temperature. Both modes are believed to be linked and are known to influence sea level along coastal regions. The analysis of the sea level multiannual variability is thus essential to understand the present climate and its long-term variability. While in the open-ocean sea level anomaly from satellite altimetry currently possesses centimetre-level accuracy, satellite altimetry measurements become invalid or of lower accuracy along the coast due to the invalidity of the wet tropospheric correction (WTC) derived from on-board microwave radiometers. In order to adequately analyse long-term changes in sea level in the coastal regions, satellite altimetry measurements can be recovered by using an improved WTC computed from recent algorithms that combine wet path delays from all available observations (remote sensing scanning imaging radiometers, GNSS stations, microwave radiometers on-board satellite altimetry missions and numerical weather models). In this study, a 20-year (1993-2013) time series of multi-mission satellite altimetry (TOPEX/Poseidon, Jason-1, OSTM/Jason-2, ERS-1/2, ENVISAT, CryoSat-2 and SARAL), are used to characterize the North Atlantic (NA) long-term variability on sea level at basin-scale and analyse its response to several atmospheric teleconnections known to operate on the NA. The altimetry record was generated using an improved coastal WTC computed from either the GNSS-derived path Delay or the Data Combination methodologies developed by University of

  8. The rapamycin-regulated gene expression signature determines prognosis for breast cancer

    Directory of Open Access Journals (Sweden)

    Tsavachidis Spiridon

    2009-09-01

    Full Text Available Abstract Background Mammalian target of rapamycin (mTOR is a serine/threonine kinase involved in multiple intracellular signaling pathways promoting tumor growth. mTOR is aberrantly activated in a significant portion of breast cancers and is a promising target for treatment. Rapamycin and its analogues are in clinical trials for breast cancer treatment. Patterns of gene expression (metagenes may also be used to simulate a biologic process or effects of a drug treatment. In this study, we tested the hypothesis that the gene-expression signature regulated by rapamycin could predict disease outcome for patients with breast cancer. Results Colony formation and sulforhodamine B (IC50 in vitro and in vivo gene expression data identified a signature, termed rapamycin metagene index (RMI, of 31 genes upregulated by rapamycin treatment in vitro as well as in vivo (false discovery rate of 10%. In the Miller dataset, RMI did not correlate with tumor size or lymph node status. High (>75th percentile RMI was significantly associated with longer survival (P = 0.015. On multivariate analysis, RMI (P = 0.029, tumor size (P = 0.015 and lymph node status (P = 0.001 were prognostic. In van 't Veer study, RMI was not associated with the time to develop distant metastasis (P = 0.41. In the Wang dataset, RMI predicted time to disease relapse (P = 0.009. Conclusion Rapamycin-regulated gene expression signature predicts clinical outcome in breast cancer. This supports the central role of mTOR signaling in breast cancer biology and provides further impetus to pursue mTOR-targeted therapies for breast cancer treatment.

  9. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  10. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  11. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  12. Genomic Signatures of Sexual Conflict.

    Science.gov (United States)

    Kasimatis, Katja R; Nelson, Thomas C; Phillips, Patrick C

    2017-10-30

    Sexual conflict is a specific class of intergenomic conflict that describes the reciprocal sex-specific fitness costs generated by antagonistic reproductive interactions. The potential for sexual conflict is an inherent property of having a shared genome between the sexes and, therefore, is an extreme form of an environment-dependent fitness effect. In this way, many of the predictions from environment-dependent selection can be used to formulate expected patterns of genome evolution under sexual conflict. However, the pleiotropic and transmission constraints inherent to having alleles move across sex-specific backgrounds from generation to generation further modulate the anticipated signatures of selection. We outline methods for detecting candidate sexual conflict loci both across and within populations. Additionally, we consider the ability of genome scans to identify sexually antagonistic loci by modeling allele frequency changes within males and females due to a single generation of selection. In particular, we highlight the need to integrate genotype, phenotype, and functional information to truly distinguish sexual conflict from other forms of sexual differentiation. © The American Genetic Association 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. Identification system by eye retinal pattern

    International Nuclear Information System (INIS)

    Sunagawa, Takahisa; Shibata, Susumu

    1987-01-01

    Identification system by eye retinal pattern is introduced from the view-point of history of R and D, measurement, apparatus, evaluation tests, safety and application. According to our evaluation tests, enrolling time is approximately less than 1 min, verification time is a few seconds and false accept rate is 0 %. Evaluation tests at Sandia National Laboratories in USA show the comparison data of false accept rates such as 0 % for eye retinal pattern, 10.5 % for finger-print, 5.8 % for signature dynamics and 17.7 % for speaker voice. The identification system by eye retinal pattern has only three applications in Japan, but there has been a number of experience in USA. This fact suggests that the system will become an important means for physical protections not only in nuclear field but also in other industrial fields in Japan. (author)

  14. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  15. Regulation of T cell immunity in atopic dermatitis by microbes: The Yin and Yang of cutaneous inflammation

    Directory of Open Access Journals (Sweden)

    Tilo eBiedermann

    2015-07-01

    Full Text Available Atopic dermatitis (AD is a chronic inflammatory skin disease predominantly mediated by T helper cells. While numerous adaptive immune mechanisms in AD pathophysiology have been elucidated in detail, deciphering the impact of innate immunity in AD pathogenesis has made substantial progress in recent years and is currently a fast evolving field. As innate and adaptive immunity are intimately linked cross-talks between these two branches of the immune system are critically influencing the resulting immune response and disease. Innate immune recognition of the cutaneous microbiota was identified to substantially contribute to immune homeostasis and shaping of protective adaptive immunity in the absence of inflammation. Disturbances in the composition of the skin microbiome with reduced microbial diversity and overabundance of Staphylococcus spp. have been shown to be associated with AD inflammation. Distinct S. aureus associated microbial associated molecular patterns (MAMPs binding to TLR2 heterodimers could be identified to initiate long lasting cutaneous inflammation driven by T helper cells and consecutively local immune suppression by induction of myeloid derived suppressor cells (MDSC further favoring secondary skin infections as often seen in AD patients. Moreover dissecting cellular and molecular mechanisms in cutaneous innate immune sensing in AD pathogenesis paved the way for exploiting regulatory and anti-inflammatory pathways to attenuate skin inflammation. Activation of the innate immune system by MAMPs of non-pathogenic bacteria on AD skin alleviated cutaneous inflammation. The induction of tolerogenic dendritic cells, Interleukin-10 expression and regulatory Tr1 cells were shown to mediate this beneficial effect. Thus, activation of innate immunity by MAMPs of non-pathogenic bacteria for induction of regulatory T cell phenotypes seems to be a promising strategy for treatment of inflammatory skin disorders as atopic dermatitis. These

  16. Functional analysis of Arabidopsis immune-related MAPKs uncovers a role for MPK3 as negative regulator of inducible defences

    KAUST Repository

    Frei dit Frey, Nicolas

    2014-06-30

    Background Mitogen-activated protein kinases (MAPKs) are key regulators of immune responses in animals and plants. In Arabidopsis, perception of microbe-associated molecular patterns (MAMPs) activates the MAPKs MPK3, MPK4 and MPK6. Increasing information depicts the molecular events activated by MAMPs in plants, but the specific and cooperative contributions of the MAPKs in these signalling events are largely unclear. Results In this work, we analyse the behaviour of MPK3, MPK4 and MPK6 mutants in early and late immune responses triggered by the MAMP flg22 from bacterial flagellin. A genome-wide transcriptome analysis reveals that 36% of the flg22-upregulated genes and 68% of the flg22-downregulated genes are affected in at least one MAPK mutant. So far MPK4 was considered as a negative regulator of immunity, whereas MPK3 and MPK6 were believed to play partially redundant positive functions in defence. Our work reveals that MPK4 is required for the regulation of approximately 50% of flg22-induced genes and we identify a negative role for MPK3 in regulating defence gene expression, flg22-induced salicylic acid accumulation and disease resistance to Pseudomonas syringae. Among the MAPK-dependent genes, 27% of flg22-upregulated genes and 76% of flg22-downregulated genes require two or three MAPKs for their regulation. The flg22-induced MAPK activities are differentially regulated in MPK3 and MPK6 mutants, both in amplitude and duration, revealing a highly interdependent network. Conclusions These data reveal a new set of distinct functions for MPK3, MPK4 and MPK6 and indicate that the plant immune signalling network is choreographed through the interplay of these three interwoven MAPK pathways.

  17. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  18. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  19. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  20. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  1. 37 CFR 1.4 - Nature of correspondence and signature requirements.

    Science.gov (United States)

    2010-07-01

    ... signature requirements. 1.4 Section 1.4 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... General Information and Correspondence § 1.4 Nature of correspondence and signature requirements. (a...) Handwritten signature. Each piece of correspondence, except as provided in paragraphs (d)(2), (d)(3), (e) and...

  2. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  3. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  4. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  5. Treatment-independent miRNA signature in blood of wilms tumor patients

    Directory of Open Access Journals (Sweden)

    Schmitt Jana

    2012-08-01

    Full Text Available Abstract Background Blood-born miRNA signatures have recently been reported for various tumor diseases. Here, we compared the miRNA signature in Wilms tumor patients prior and after preoperative chemotherapy according to SIOP protocol 2001. Results We did not find a significant difference between miRNA signature of both groups. However both, Wilms tumor patients prior and after chemotherapy showed a miRNA signature different from healthy controls. The signature of Wilms tumor patients prior to chemotherapy showed an accuracy of 97.5% and of patients after chemotherapy an accuracy of 97.0%, each as compared to healthy controls. Conclusion Our results provide evidence for a blood-born Wilms tumor miRNA signature largely independent of four weeks preoperative chemotherapy treatment.

  6. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  7. 46 CFR 2.01-30 - Delegation of OCMI signature authority.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Delegation of OCMI signature authority. 2.01-30 Section... VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-30 Delegation of OCMI signature authority. The Officer in Charge, Marine Inspection, may redelegate signature authority for documents issued...

  8. Blood plasma lipidomic signature of epicardial fat in healthy obese women.

    Science.gov (United States)

    Scherer, Max; Montoliu, Ivan; Qanadli, Salah D; Collino, Sebastiano; Rezzi, Serge; Kussmann, Martin; Giusti, Vittorio; Martin, François-Pierre J

    2015-01-01

    A lipidomic approach was employed in a clinically well-defined cohort of healthy obese women to explore blood lipidome phenotype ascribed to body fat deposition, with emphasis on epicardial adipose tissue (EAT). The present investigation delivered a lipidomics signature of epicardial adiposity under healthy clinical conditions using a cohort of 40 obese females (age: 25-45 years, BMI: 28-40 kg/m(2) ) not showing any metabolic disease traits. Lipidomics analysis of blood plasma was employed in combination with in vivo quantitation of mediastinal fat depots by computerized tomography. All cardiac fat depots correlated to indicators of hepatic dysfunctions (ALAT and ASAT), which describe physiological connections between hepatic and cardiac steatosis. Plasma lipidomics encompassed overall levels of lipid classes, fatty acid profiles, and individual lipid species. EAT and visceral fat associated with diacylglycerols (DAG), triglycerides, and distinct phospholipid and sphingolipid species. A pattern of DAG and phosphoglycerols was specific to EAT. Human blood plasma lipidomics appears to be a promising clinical and potentially diagnostic readout for patient stratification and monitoring. Association of blood lipidomics signature to regio-specific mediastinal and visceral adiposity under healthy clinical conditions may help provide more biological insights into obese patient stratification for cardiovascular disease risks. © 2014 The Obesity Society.

  9. 7 CFR 1956.68 - Compromise or adjustment without debtor's signature.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Compromise or adjustment without debtor's signature... Loan Programs and Multi-Family Housing § 1956.68 Compromise or adjustment without debtor's signature... made to obtain the debtor's signature and the date(s) of such effort. (c) The specific reasons why it...

  10. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  11. Methyl-CpG island-associated genome signature tags

    Science.gov (United States)

    Dunn, John J

    2014-05-20

    Disclosed is a method for analyzing the organismic complexity of a sample through analysis of the nucleic acid in the sample. In the disclosed method, through a series of steps, including digestion with a type II restriction enzyme, ligation of capture adapters and linkers and digestion with a type IIS restriction enzyme, genome signature tags are produced. The sequences of a statistically significant number of the signature tags are determined and the sequences are used to identify and quantify the organisms in the sample. Various embodiments of the invention described herein include methods for using single point genome signature tags to analyze the related families present in a sample, methods for analyzing sequences associated with hyper- and hypo-methylated CpG islands, methods for visualizing organismic complexity change in a sampling location over time and methods for generating the genome signature tag profile of a sample of fragmented DNA.

  12. Identification of a transcriptional signature for the wound healing continuum.

    Science.gov (United States)

    Peake, Matthew A; Caley, Mathew; Giles, Peter J; Wall, Ivan; Enoch, Stuart; Davies, Lindsay C; Kipling, David; Thomas, David W; Stephens, Phil

    2014-01-01

    There is a spectrum/continuum of adult human wound healing outcomes ranging from the enhanced (nearly scarless) healing observed in oral mucosa to scarring within skin and the nonhealing of chronic skin wounds. Central to these outcomes is the role of the fibroblast. Global gene expression profiling utilizing microarrays is starting to give insight into the role of such cells during the healing process, but no studies to date have produced a gene signature for this wound healing continuum. Microarray analysis of adult oral mucosal fibroblast (OMF), normal skin fibroblast (NF), and chronic wound fibroblast (CWF) at 0 and 6 hours post-serum stimulation was performed. Genes whose expression increases following serum exposure in the order OMF healing phenotype (the dysfunctional healing group), whereas genes with the converse pattern are potentially associated with a positive/preferential healing phenotype (the enhanced healing group). Sixty-six genes in the enhanced healing group and 38 genes in the dysfunctional healing group were identified. Overrepresentation analysis revealed pathways directly and indirectly associated with wound healing and aging and additional categories associated with differentiation, development, and morphogenesis. Knowledge of this wound healing continuum gene signature may in turn assist in the therapeutic assessment/treatment of a patient's wounds. © 2014 The Authors. Wound Repair and Regeneration published by Wiley Periodicals, Inc. on behalf of Wound Healing Society.

  13. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  14. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  15. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  16. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  17. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  18. Signature Pedagogies for E-Learning in Higher Education and Beyond

    Science.gov (United States)

    Eaton, Sarah Elaine; Brown, Barbara; Schroeder, Meadow; Lock, Jennifer; Jacobsen, Michele

    2017-01-01

    Purpose: This report explores the notion of signature pedagogies within the field of e-learning for higher education. Methodology: We build on previous work that examined signature pedagogies in education, linking the concepts of signature pedagogies, the profession of education and e-learning as a means to help educators develop their practice…

  19. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  20. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  1. Identification of E-cadherin signature motifs functioning as cleavage sites for Helicobacter pylori HtrA

    Science.gov (United States)

    Schmidt, Thomas P.; Perna, Anna M.; Fugmann, Tim; Böhm, Manja; Jan Hiss; Haller, Sarah; Götz, Camilla; Tegtmeyer, Nicole; Hoy, Benjamin; Rau, Tilman T.; Neri, Dario; Backert, Steffen; Schneider, Gisbert; Wessler, Silja

    2016-03-01

    The cell adhesion protein and tumour suppressor E-cadherin exhibits important functions in the prevention of gastric cancer. As a class-I carcinogen, Helicobacter pylori (H. pylori) has developed a unique strategy to interfere with E-cadherin functions. In previous studies, we have demonstrated that H. pylori secretes the protease high temperature requirement A (HtrA) which cleaves off the E-cadherin ectodomain (NTF) on epithelial cells. This opens cell-to-cell junctions, allowing bacterial transmigration across the polarised epithelium. Here, we investigated the molecular mechanism of the HtrA-E-cadherin interaction and identified E-cadherin cleavage sites for HtrA. Mass-spectrometry-based proteomics and Edman degradation revealed three signature motifs containing the [VITA]-[VITA]-x-x-D-[DN] sequence pattern, which were preferentially cleaved by HtrA. Based on these sites, we developed a substrate-derived peptide inhibitor that selectively bound and inhibited HtrA, thereby blocking transmigration of H. pylori. The discovery of HtrA-targeted signature sites might further explain why we detected a stable 90 kDa NTF fragment during H. pylori infection, but also additional E-cadherin fragments ranging from 105 kDa to 48 kDa in in vitro cleavage experiments. In conclusion, HtrA targets E-cadherin signature sites that are accessible in in vitro reactions, but might be partially masked on epithelial cells through functional homophilic E-cadherin interactions.

  2. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  3. Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target

    Science.gov (United States)

    2016-06-01

    AWARD NUMBER: W81XWH-14-1-0107 TITLE: Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target PRINCIPAL...AND SUBTITLE Tumor Microenvironment Gene Signature as a 5a. CONTRACT NUMBER W81XWH-14-1-0107 Prognostic Classifier and Therapeutic Target 5b...gene signature that correlates with poor survival in ovarian cancer patients. We are refining this gene signature to develop biomarkers for the

  4. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  5. Extraction of human gait signatures: an inverse kinematic approach using Groebner basis theory applied to gait cycle analysis

    Science.gov (United States)

    Barki, Anum; Kendricks, Kimberly; Tuttle, Ronald F.; Bunker, David J.; Borel, Christoph C.

    2013-05-01

    This research highlights the results obtained from applying the method of inverse kinematics, using Groebner basis theory, to the human gait cycle to extract and identify lower extremity gait signatures. The increased threat from suicide bombers and the force protection issues of today have motivated a team at Air Force Institute of Technology (AFIT) to research pattern recognition in the human gait cycle. The purpose of this research is to identify gait signatures of human subjects and distinguish between subjects carrying a load to those subjects without a load. These signatures were investigated via a model of the lower extremities based on motion capture observations, in particular, foot placement and the joint angles for subjects affected by carrying extra load on the body. The human gait cycle was captured and analyzed using a developed toolkit consisting of an inverse kinematic motion model of the lower extremity and a graphical user interface. Hip, knee, and ankle angles were analyzed to identify gait angle variance and range of motion. Female subjects exhibited the most knee angle variance and produced a proportional correlation between knee flexion and load carriage.

  6. Patterns of brain structural connectivity differentiate normal weight from overweight subjects.

    Science.gov (United States)

    Gupta, Arpana; Mayer, Emeran A; Sanmiguel, Claudia P; Van Horn, John D; Woodworth, Davis; Ellingson, Benjamin M; Fling, Connor; Love, Aubrey; Tillisch, Kirsten; Labus, Jennifer S

    2015-01-01

    Alterations in the hedonic component of ingestive behaviors have been implicated as a possible risk factor in the pathophysiology of overweight and obese individuals. Neuroimaging evidence from individuals with increasing body mass index suggests structural, functional, and neurochemical alterations in the extended reward network and associated networks. To apply a multivariate pattern analysis to distinguish normal weight and overweight subjects based on gray and white-matter measurements. Structural images (N = 120, overweight N = 63) and diffusion tensor images (DTI) (N = 60, overweight N = 30) were obtained from healthy control subjects. For the total sample the mean age for the overweight group (females = 32, males = 31) was 28.77 years (SD = 9.76) and for the normal weight group (females = 32, males = 25) was 27.13 years (SD = 9.62). Regional segmentation and parcellation of the brain images was performed using Freesurfer. Deterministic tractography was performed to measure the normalized fiber density between regions. A multivariate pattern analysis approach was used to examine whether brain measures can distinguish overweight from normal weight individuals. 1. White-matter classification: The classification algorithm, based on 2 signatures with 17 regional connections, achieved 97% accuracy in discriminating overweight individuals from normal weight individuals. For both brain signatures, greater connectivity as indexed by increased fiber density was observed in overweight compared to normal weight between the reward network regions and regions of the executive control, emotional arousal, and somatosensory networks. In contrast, the opposite pattern (decreased fiber density) was found between ventromedial prefrontal cortex and the anterior insula, and between thalamus and executive control network regions. 2. Gray-matter classification: The classification algorithm, based on 2 signatures with 42 morphological features, achieved 69

  7. Patterns of brain structural connectivity differentiate normal weight from overweight subjects

    Science.gov (United States)

    Gupta, Arpana; Mayer, Emeran A.; Sanmiguel, Claudia P.; Van Horn, John D.; Woodworth, Davis; Ellingson, Benjamin M.; Fling, Connor; Love, Aubrey; Tillisch, Kirsten; Labus, Jennifer S.

    2015-01-01

    Background Alterations in the hedonic component of ingestive behaviors have been implicated as a possible risk factor in the pathophysiology of overweight and obese individuals. Neuroimaging evidence from individuals with increasing body mass index suggests structural, functional, and neurochemical alterations in the extended reward network and associated networks. Aim To apply a multivariate pattern analysis to distinguish normal weight and overweight subjects based on gray and white-matter measurements. Methods Structural images (N = 120, overweight N = 63) and diffusion tensor images (DTI) (N = 60, overweight N = 30) were obtained from healthy control subjects. For the total sample the mean age for the overweight group (females = 32, males = 31) was 28.77 years (SD = 9.76) and for the normal weight group (females = 32, males = 25) was 27.13 years (SD = 9.62). Regional segmentation and parcellation of the brain images was performed using Freesurfer. Deterministic tractography was performed to measure the normalized fiber density between regions. A multivariate pattern analysis approach was used to examine whether brain measures can distinguish overweight from normal weight individuals. Results 1. White-matter classification: The classification algorithm, based on 2 signatures with 17 regional connections, achieved 97% accuracy in discriminating overweight individuals from normal weight individuals. For both brain signatures, greater connectivity as indexed by increased fiber density was observed in overweight compared to normal weight between the reward network regions and regions of the executive control, emotional arousal, and somatosensory networks. In contrast, the opposite pattern (decreased fiber density) was found between ventromedial prefrontal cortex and the anterior insula, and between thalamus and executive control network regions. 2. Gray-matter classification: The classification algorithm, based on 2 signatures with 42

  8. A signature of attractor dynamics in the CA3 region of the hippocampus.

    Directory of Open Access Journals (Sweden)

    César Rennó-Costa

    2014-05-01

    Full Text Available The notion of attractor networks is the leading hypothesis for how associative memories are stored and recalled. A defining anatomical feature of such networks is excitatory recurrent connections. These "attract" the firing pattern of the network to a stored pattern, even when the external input is incomplete (pattern completion. The CA3 region of the hippocampus has been postulated to be such an attractor network; however, the experimental evidence has been ambiguous, leading to the suggestion that CA3 is not an attractor network. In order to resolve this controversy and to better understand how CA3 functions, we simulated CA3 and its input structures. In our simulation, we could reproduce critical experimental results and establish the criteria for identifying attractor properties. Notably, under conditions in which there is continuous input, the output should be "attracted" to a stored pattern. However, contrary to previous expectations, as a pattern is gradually "morphed" from one stored pattern to another, a sharp transition between output patterns is not expected. The observed firing patterns of CA3 meet these criteria and can be quantitatively accounted for by our model. Notably, as morphing proceeds, the activity pattern in the dentate gyrus changes; in contrast, the activity pattern in the downstream CA3 network is attracted to a stored pattern and thus undergoes little change. We furthermore show that other aspects of the observed firing patterns can be explained by learning that occurs during behavioral testing. The CA3 thus displays both the learning and recall signatures of an attractor network. These observations, taken together with existing anatomical and behavioral evidence, make the strong case that CA3 constructs associative memories based on attractor dynamics.

  9. Thermal Signature Measurements for Ammonium Nitrate/Fuel Mixtures by Laser Heating.

    Science.gov (United States)

    Nazarian, Ashot; Presser, Cary

    2016-01-10

    Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how the sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal response of each ANF mixture was found to be different, which was based on the mixture composition and the thermal behavior of each mixture constituent.

  10. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  11. CoverageAnalyzer (CAn: A Tool for Inspection of Modification Signatures in RNA Sequencing Profiles

    Directory of Open Access Journals (Sweden)

    Ralf Hauenschild

    2016-11-01

    Full Text Available Combination of reverse transcription (RT and deep sequencing has emerged as a powerful instrument for the detection of RNA modifications, a field that has seen a recent surge in activity because of its importance in gene regulation. Recent studies yielded high-resolution RT signatures of modified ribonucleotides relying on both sequence-dependent mismatch patterns and reverse transcription arrests. Common alignment viewers lack specialized functionality, such as filtering, tailored visualization, image export and differential analysis. Consequently, the community will profit from a platform seamlessly connecting detailed visual inspection of RT signatures and automated screening for modification candidates. CoverageAnalyzer (CAn was developed in response to the demand for a powerful inspection tool. It is freely available for all three main operating systems. With SAM file format as standard input, CAn is an intuitive and user-friendly tool that is generally applicable to the large community of biomedical users, starting from simple visualization of RNA sequencing (RNA-Seq data, up to sophisticated modification analysis with significance-based modification candidate calling.

  12. Compendium of Immune Signatures Identifies Conserved and Species-Specific Biology in Response to Inflammation.

    Science.gov (United States)

    Godec, Jernej; Tan, Yan; Liberzon, Arthur; Tamayo, Pablo; Bhattacharya, Sanchita; Butte, Atul J; Mesirov, Jill P; Haining, W Nicholas

    2016-01-19

    Gene-expression profiling has become a mainstay in immunology, but subtle changes in gene networks related to biological processes are hard to discern when comparing various datasets. For instance, conservation of the transcriptional response to sepsis in mouse models and human disease remains controversial. To improve transcriptional analysis in immunology, we created ImmuneSigDB: a manually annotated compendium of ∼5,000 gene-sets from diverse cell states, experimental manipulations, and genetic perturbations in immunology. Analysis using ImmuneSigDB identified signatures induced in activated myeloid cells and differentiating lymphocytes that were highly conserved between humans and mice. Sepsis triggered conserved patterns of gene expression in humans and mouse models. However, we also identified species-specific biological processes in the sepsis transcriptional response: although both species upregulated phagocytosis-related genes, a mitosis signature was specific to humans. ImmuneSigDB enables granular analysis of transcriptomic data to improve biological understanding of immune processes of the human and mouse immune systems. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Genome-wide scans between two honeybee populations reveal putative signatures of human-mediated selection.

    Science.gov (United States)

    Parejo, M; Wragg, D; Henriques, D; Vignal, A; Neuditschko, M

    2017-12-01

    Human-mediated selection has left signatures in the genomes of many domesticated animals, including the European dark honeybee, Apis mellifera mellifera, which has been selected by apiculturists for centuries. Using whole-genome sequence information, we investigated selection signatures in spatially separated honeybee subpopulations (Switzerland, n = 39 and France, n = 17). Three different test statistics were calculated in windows of 2 kb (fixation index, cross-population extended haplotype homozygosity and cross-population composite likelihood ratio) and combined into a recently developed composite selection score. Applying a stringent false discovery rate of 0.01, we identified six significant selective sweeps distributed across five chromosomes covering eight genes. These genes are associated with multiple molecular and biological functions, including regulation of transcription, receptor binding and signal transduction. Of particular interest is a selection signature on chromosome 1, which corresponds to the WNT4 gene, the family of which is conserved across the animal kingdom with a variety of functions. In Drosophila melanogaster, WNT4 alleles have been associated with differential wing, cross vein and abdominal phenotypes. Defining phenotypic characteristics of different Apis mellifera ssp., which are typically used as selection criteria, include colour and wing venation pattern. This signal is therefore likely to be a good candidate for human mediated-selection arising from different applied breeding practices in the two managed populations. © 2017 The Authors. Animal Genetics published by John Wiley & Sons Ltd on behalf of Stichting International Foundation for Animal Genetics.

  14. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  15. Early signatures of regime shifts in gene expression dynamics

    Science.gov (United States)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-06-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence.

  16. Spatially Resolved Isotopic Source Signatures of Wetland Methane Emissions

    Science.gov (United States)

    Ganesan, A. L.; Stell, A. C.; Gedney, N.; Comyn-Platt, E.; Hayman, G.; Rigby, M.; Poulter, B.; Hornibrook, E. R. C.

    2018-04-01

    We present the first spatially resolved wetland δ13C(CH4) source signature map based on data characterizing wetland ecosystems and demonstrate good agreement with wetland signatures derived from atmospheric observations. The source signature map resolves a latitudinal difference of 10‰ between northern high-latitude (mean -67.8‰) and tropical (mean -56.7‰) wetlands and shows significant regional variations on top of the latitudinal gradient. We assess the errors in inverse modeling studies aiming to separate CH4 sources and sinks by comparing atmospheric δ13C(CH4) derived using our spatially resolved map against the common assumption of globally uniform wetland δ13C(CH4) signature. We find a larger interhemispheric gradient, a larger high-latitude seasonal cycle, and smaller trend over the period 2000-2012. The implication is that erroneous CH4 fluxes would be derived to compensate for the biases imposed by not utilizing spatially resolved signatures for the largest source of CH4 emissions. These biases are significant when compared to the size of observed signals.

  17. Early signatures of regime shifts in gene expression dynamics

    International Nuclear Information System (INIS)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-01-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence. (paper)

  18. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  19. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  20. A signature of epithelial-mesenchymal plasticity and stromal activation in primary tumor modulates late recurrence in breast cancer independent of disease subtype.

    Science.gov (United States)

    Cheng, Qing; Chang, Jeffrey T; Gwin, William R; Zhu, Jun; Ambs, Stefan; Geradts, Joseph; Lyerly, H Kim

    2014-07-25

    Despite improvements in adjuvant therapy, late systemic recurrences remain a lethal consequence of both early- and late-stage breast cancer. A delayed recurrence is thought to arise from a state of tumor dormancy, but the mechanisms that govern tumor dormancy remain poorly understood. To address the features of breast tumors associated with late recurrence, but not confounded by variations in systemic treatment, we compiled breast tumor gene expression data from 4,767 patients and established a discovery cohort consisting of 743 lymph node-negative patients who did not receive systemic neoadjuvant or adjuvant therapy. We interrogated the gene expression profiles of the 743 tumors and identified gene expression patterns that were associated with early and late disease recurrence among these patients. We applied this classification to a subset of 46 patients for whom expression data from microdissected tumor epithelium and stroma was available, and identified a distinct gene signature in the stroma and also a corresponding tumor epithelium signature that predicted disease recurrence in the discovery cohort. This tumor epithelium signature was then validated as a predictor for late disease recurrence in the entire cohort of 4,767 patients. We identified a novel 51-gene signature from microdissected tumor epithelium associated with late disease recurrence in breast cancer independent of the molecular disease subtype. This signature correlated with gene expression alterations in the adjacent tumor stroma and describes a process of epithelial to mesenchymal transition (EMT) and tumor-stroma interactions. Our findings suggest that an EMT-related gene signature in the tumor epithelium is related to both stromal activation and escape from disease dormancy in breast cancer. The presence of a late recurrence gene signature in the primary tumor also suggests that intrinsic features of this tumor regulate the transition of disseminated tumor cells into a dormant phenotype with

  1. Invariance Signatures: Characterizing contours by their departures from invariance

    OpenAIRE

    Squire, David; Caelli, Terry M.

    1997-01-01

    In this paper, a new invariant feature of two-dimensional contours is reported: the Invariance Signature. The Invariance Signature is a measure of the degree to which a contour is invariant under a variety of transformations, derived from the theory of Lie transformation groups. It is shown that the Invariance Signature is itself invariant under shift, rotation and scaling of the contour. Since it is derived from local properties of the contour, it is well-suited to a neural network implement...

  2. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  3. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng, R.R.; Luo, X.D.; Timar, J.; Sohler, S.; Nyako, B.M.; Zolnai, L.; Paul, E.S.

    2004-01-01

    Complete text of publication follows. Signature inversion in the A ∼ 100 region has been reported earlier only in the case of the odd-odd 98 Rh nucleus. Our studies on the 100-103 Rh isotopes and a close inspection of the known πg 9/2 νh 11/ 2 bands of the Rh (Z = 45) and Ag (Z = 47) isotopes revealed that the signature splitting effects, earlier considered as quenchings of signature splitting, are not only quenchings but signature inversions. Indeed, the energetically favored signature at low spins in these πg 9/2 νh 11/2 bands is the α = 1 branch (odd spins) instead of the expected α = 0 branch (even spins). The systematic occurrence of signature inversion in this mass region is discussed in Refs. together with attempts to understand its behavior qualitatively. Among many attempts for interpreting the mechanism of signature inversion in odd-odd nuclei, a model using an axially symmetric rotor plus two quasi-particles has already been successfully applied to describe the observed signature inversions in the A ∼ 80 and A ∼ 160 mass regions. According to this model the signature inversion is caused by the competition between the Coriolis and the proton-neutron residual interactions in low K space. Such calculations have been also successfully applied to the π g9/2 νh 11/2 bands in the odd-odd 98 Rh and 102 Rh nuclei. Recent observations of chiral band structures in the nearby Rh nuclei suggest a possibility of triaxiality in these nuclei, too. In the present work we examined the possible influence of triaxiality on the signature inversion using a triaxial rotor plus two-quasiparticle model and compared the results with the experimental data of 98 Rh and 102 Rh. The calculations provided a better agreement with the experiment than the axially symmetric calculations. Compared to the axially symmetric case, the triaxiality applied in the Hamiltonian enlarges the amplitudes of high-spin signature zigzags at small triaxial deformation and might push the

  4. Comparison of transcriptomic signature of post-Chernobyl and postradiotherapy thyroid tumors.

    Science.gov (United States)

    Ory, Catherine; Ugolin, Nicolas; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A; Chevillard, Sylvie

    2013-11-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and postradiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression deregulations and molecular features/pathways, and (ii) to test the capacity of the postradiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the postradiotherapy-induced tumors. We now explored if postradiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the postradiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the postradiotherapy series (15 sporadic and 12 postradiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the postradiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of postradiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each postradiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  5. Spinors, superalgebras and the signature of space-time

    CERN Document Server

    Ferrara, S.

    2001-01-01

    Superconformal algebras embedding space-time in any dimension and signature are considered. Different real forms of the $R$-symmetries arise both for usual space-time signature (one time) and for Euclidean or exotic signatures (more than one times). Application of these superalgebras are found in the context of supergravities with 32 supersymmetries, in any dimension $D \\leq 11$. These theories are related to $D = 11, M, M^*$ and $M^\\prime$ theories or $D = 10$, IIB, IIB$^*$ theories when compactified on Lorentzian tori. All dimensionally reduced theories fall in three distinct phases specified by the number of (128 bosonic) positive and negative norm states: $(n^+,n^-) = (128,0), (64,64), (72,56)$.

  6. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  7. Observation of a 27-day solar signature in noctilucent cloud altitude

    Science.gov (United States)

    Köhnke, Merlin C.; von Savigny, Christian; Robert, Charles E.

    2018-05-01

    Previous studies have identified solar 27-day signatures in several parameters in the Mesosphere/Lower thermosphere region, including temperature and Noctilucent cloud (NLC) occurrence frequency. In this study we report on a solar 27-day signature in NLC altitude with peak-to-peak variations of about 400 m. We use SCIAMACHY limb-scatter observations from 2002 to 2012 to detect NLCs. The superposed epoch analysis method is applied to extract solar 27-day signatures. A 27-day signature in NLC altitude can be identified in both hemispheres in the SCIAMACHY dataset, but the signature is more pronounced in the northern hemisphere. The solar signature in NLC altitude is found to be in phase with solar activity and temperature for latitudes ≳ 70 ° N. We provide a qualitative explanation for the positive correlation between solar activity and NLC altitude based on published model simulations.

  8. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  9. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng Renrong; Zhu Shunquan; Luo Xiangdong; Gizon, A.; Gizon, J.; Paul, E.S.

    2004-01-01

    The nature of signature inversion in the πg 9/2 νh 11/2 bands of odd-odd 98,102 Rh nuclei is studied. Calculations are performed by using a triaxial rotor plus two-quasiparticle model and are compared with the experimentally observed signature inversions. The calculations reproduce well the observations and suggest that, in these bands, the signature inversion can be interpreted mainly as a competition between the Coriolis and the proton-neutron residual interactions in low K space. The triaxiality applied in the Hamiltonian enlarges the amplitudes of high spin signature zigzags at small triaxial deformation and might push the signature inversion point to higher spin at large triaxial deformation

  10. L1000FWD: Fireworks visualization of drug-induced transcriptomic signatures.

    Science.gov (United States)

    Wang, Zichen; Lachmann, Alexander; Keenan, Alexandra B; Ma'ayan, Avi

    2018-02-06

    As part of the NIH Library of Integrated Network-based Cellular Signatures (LINCS) program, hundreds of thousands of transcriptomic signatures were generated with the L1000 technology, profiling the response of human cell lines to over 20,000 small molecule compounds. This effort is a promising approach toward revealing the mechanisms-of-action (MOA) for marketed drugs and other less studied potential therapeutic compounds. L1000 fireworks display (L1000FWD) is a web application that provides interactive visualization of over 16,000 drug and small-molecule induced gene expression signatures. L1000FWD enables coloring of signatures by different attributes such as cell type, time point, concentration, as well as drug attributes such as MOA and clinical phase. Signature similarity search is implemented to enable the search for mimicking or opposing signatures given as input of up and down gene sets. Each point on the L1000FWD interactive map is linked to a signature landing page, which provides multifaceted knowledge from various sources about the signature and the drug. Notably such information includes most frequent diagnoses, co-prescribed drugs and age distribution of prescriptions as extracted from the Mount Sinai Health System electronic medical records (EMR). Overall, L1000FWD serves as a platform for identifying functions for novel small molecules using unsupervised clustering, as well as for exploring drug MOA. L1000FWD is freely accessible at: http://amp.pharm.mssm.edu/L1000FWD. avi.maayan@mssm.edu. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  11. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  12. Effect of External Vibration on PZT Impedance Signature

    Directory of Open Access Journals (Sweden)

    Yaowen Yang

    2008-11-01

    Full Text Available Piezoelectric ceramic Lead Zirconate Titanate (PZT transducers, working on the principle of electromechanical impedance (EMI, are increasingly applied for structural health monitoring (SHM in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  13. Effect of External Vibration on PZT Impedance Signature.

    Science.gov (United States)

    Yang, Yaowen; Miao, Aiwei

    2008-11-01

    Piezoelectric ceramic Lead Zirconate Titanate (PZT) transducers, working on the principle of electromechanical impedance (EMI), are increasingly applied for structural health monitoring (SHM) in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI) signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  14. 17 CFR 201.140 - Commission orders and decisions: Signature and availability.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission orders and decisions: Signature and availability. 201.140 Section 201.140 Commodity and Securities Exchanges SECURITIES... and decisions: Signature and availability. (a) Signature required. All orders and decisions of the...

  15. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  16. Passive Infrared Signature Augmentation of Full-Scale Plastic Targets

    National Research Council Canada - National Science Library

    Gebus, Lisa M; Sanders, Jeffrey S

    2002-01-01

    ... (IR), and radar signatures of threat systems. To address this need, a program was initiated by TMO to augment an existing full-scale, vacuum-formed plastic target with sufficient signature fidelity to adequately stress U.S...

  17. A signature correlation study of ground target VHF/UHF ISAR imagery

    Science.gov (United States)

    Gatesman, Andrew J.; Beaudoin, Christopher J.; Giles, Robert H.; Kersey, William T.; Waldman, Jerry; Carter, Steve; Nixon, William E.

    2003-09-01

    VV and HH-polarized radar signatures of several ground targets were acquired in the VHF/UHF band (171-342 MHz) by using 1/35th scale models and an indoor radar range operating from 6 to 12 GHz. Data were processed into medianized radar cross sections as well as focused, ISAR imagery. Measurement validation was confirmed by comparing the radar cross section of a test object with a method of moments radar cross section prediction code. The signatures of several vehicles from three vehicle classes (tanks, trunks, and TELs) were measured and a signature cross-correlation study was performed. The VHF/UHF band is currently being exploited for its foliage penetration ability, however, the coarse image resolution which results from the relatively long radar wavelengths suggests a more challenging target recognition problem. One of the study's goals was to determine the amount of unique signature content in VHF/UHF ISAR imagery of military ground vehicles. Open-field signatures are compared with each other as well as with simplified shapes of similar size. Signatures were also acquired on one vehicle in a variety of configurations to determine the impact of monitor target variations on the signature content at these frequencies.

  18. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  19. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  20. Directed assembly of functional light harvesting antenna complexes onto chemically patterned surfaces

    International Nuclear Information System (INIS)

    Escalante, Maryana; Maury, Pascale; Bruinink, Christiaan M; Werf, Kees van der; Olsen, John D; Timney, John A; Huskens, Jurriaan; Hunter, C Neil; Subramaniam, Vinod; Otto, Cees

    2008-01-01

    We report the directed assembly of the photosynthetic membrane proteins LH1 and LH2 isolated from the purple bacterium Rhodobacter sphaeroides onto chemically patterned substrates. Nanoimprint lithography was used to pattern discrete regions of amino- and fluoro-terminated or poly(ethylene glycol) self-assembled monolayers onto a glass substrate. Densely packed layers of assembled protein complexes were observed with atomic force microscopy. The protein complexes attached selectively to the amino-terminated regions by electrostatic interactions. Spectral images generated with a hybrid scanning probe and fluorescence microscope confirmed that the patterned proteins retained their native optical signatures

  1. Directed assembly of functional light harvesting antenna complexes onto chemically patterned surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Escalante, Maryana [Biophysical Engineering Group, MESA and Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede (Netherlands); Maury, Pascale [Molecular Nanofabrication Group, MESA and Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede (Netherlands); Bruinink, Christiaan M [Molecular Nanofabrication Group, MESA and Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede (Netherlands); Werf, Kees van der [Biophysical Engineering Group, MESA and Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede (Netherlands); Olsen, John D [Department of Molecular Biology and Biotechnology, University of Sheffield, Sheffield S10 2TN (United Kingdom); Timney, John A [Department of Molecular Biology and Biotechnology, University of Sheffield, Sheffield S10 2TN (United Kingdom); Huskens, Jurriaan [Molecular Nanofabrication Group, MESA and Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede (Netherlands); Hunter, C Neil [Department of Molecular Biology and Biotechnology, University of Sheffield, Sheffield S10 2TN (United Kingdom); Subramaniam, Vinod [Biophysical Engineering Group, MESA and Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede (Netherlands); Otto, Cees [Biophysical Engineering Group, MESA and Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede (Netherlands)

    2008-01-16

    We report the directed assembly of the photosynthetic membrane proteins LH1 and LH2 isolated from the purple bacterium Rhodobacter sphaeroides onto chemically patterned substrates. Nanoimprint lithography was used to pattern discrete regions of amino- and fluoro-terminated or poly(ethylene glycol) self-assembled monolayers onto a glass substrate. Densely packed layers of assembled protein complexes were observed with atomic force microscopy. The protein complexes attached selectively to the amino-terminated regions by electrostatic interactions. Spectral images generated with a hybrid scanning probe and fluorescence microscope confirmed that the patterned proteins retained their native optical signatures.

  2. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  3. Extending the similarity-based XML multicast approach with digital signatures

    DEFF Research Database (Denmark)

    Azzini, Antonia; Marrara, Stefania; Jensen, Meiko

    2009-01-01

    This paper investigates the interplay between similarity-based SOAP message aggregation and digital signature application. An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided....... Depending on the intersection between similarity-aggregated and signed SOAP message parts, the paper discusses three different cases of signature application, and sketches their applicability and performance implications....

  4. Phenylpropanoid Defences in Nicotiana tabacum Cells: Overlapping Metabolomes Indicate Common Aspects to Priming Responses Induced by Lipopolysaccharides, Chitosan and Flagellin-22.

    Directory of Open Access Journals (Sweden)

    Msizi I Mhlongo

    Full Text Available Plants have evolved both constitutive and inducible defence strategies to cope with different biotic stimuli and stresses. Exposure of a plant to a challenging stress can lead to a primed state that allows it to launch a more rapid and stronger defence. Here we applied a metabolomic approach to study and compare the responses induced in Nicotiana tabacum cells by microbe-associated molecular pattern (MAMP molecules, namely lipopolysaccharides (LPS, chitosan (CHT and flagellin-22 (FLG22. Early response metabolites, extracted with methanol, were analysed by UHPLC-MS/MS. Using multivariate statistical tools the metabolic profiles induced by these elicitors were analysed. In the metabolic fingerprint of these agents a total of 19 cinnamic acid derivatives conjugated to quinic acids (chlorogenic acids, shikimic acid, tyramine, polyamines or glucose were found as discriminant biomarkers. In addition, treatment with the phytohormones salicylic acid (SA, methyljasmonic acid (MJ and abscisic acid (ABA resulted in differentially-induced phenylpropanoid pathway metabolites. The results indicate that the phenylpropanoid pathway is activated by these elicitors while hydroxycinnamic acid derivatives are commonly associated with the metabolic response to the MAMPs, and that the activated responses are modulated by both SA and MJ, with ABA not playing a role.

  5. 24 CFR 1710.117 - Cost sheet, signature of Senior Executive Officer.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Cost sheet, signature of Senior... REGISTRATION Reporting Requirements § 1710.117 Cost sheet, signature of Senior Executive Officer. (a) Cost... description of our subdivision and development plans. Signature of Senior Executive Officer (2) Cost sheet...

  6. Signature splitting in nuclear rotational bands: Neutron i13/2 systematics

    International Nuclear Information System (INIS)

    Mueller, W.F.; Jensen, H.J.; Reviol, W.; Riedinger, L.L.; Yu, C.; Zhang, J.; Nazarewicz, W.; Wyss, R.

    1994-01-01

    Experimental values of signature splitting in νi 13/2 rotational bands in odd-N even-Z nuclei in the Z=62--78 region are collected and presented. A procedure is introduced to calculate signature splitting within the cranked deformed Woods-Saxon model. In the theoretical treatment, deformation parameters are obtained by minimizing the total Routhians of individual νi 13/2 bands, and the procedure accounts for the possibility that the two signatures have different deformations and pairing gaps. Experimental signature splitting data for νi 13/2 bands in Dy, Er, Yb, Hf, W, and Os nuclei are compared with calculated values. The sensitivity of calculated signature splitting to changes in deformation, pairing, and other model parameters is presented

  7. Behavioral patterns associated with chemotherapy-induced emesis: A potential signature for nausea in musk shrews

    Directory of Open Access Journals (Sweden)

    Charles Christopher Horn

    2011-07-01

    Full Text Available Nausea and vomiting are common symptoms in patients with many diseases, including cancer and its treatments. Although the neurological basis of vomiting is reasonably well known, an understanding of the physiology of nausea is lacking. The primary barrier to mechanistic research on the nausea system is the lack of an animal model. Indeed investigating the effects of anti-nausea drugs in preclinical models is difficult because the primary readout is often emesis. It is known that animals show a behavioral profile of sickness, associated with reduced feeding and movement, and possibly these general measures are signs of nausea. Studies attempting to relate the occurrence of additional behaviors to emesis have produced mixed results. Here we applied a statistical method, t-pattern (temporal pattern analysis, to determine patterns of behavior associated with emesis. Musk shrews were injected with the chemotherapy agent cisplatin (a gold standard in emesis research to induce acute (< 24 h and delayed (> 24 h emesis. Emesis and other behaviors were coded and tracked from video files. T-pattern analysis revealed hundreds of non-random patterns of behavior associated with emesis, including sniffing, changes in body contraction, and locomotion. There was little evidence that locomotion was inhibited by the occurrence of emesis. Eating and drinking, and other larger body movements including rearing, grooming, and body rotation, were significantly less common in emesis-related behavioral patterns in real versus randomized data. These results lend preliminary evidence for the expression of emesis-related behavioral patterns, including reduced ingestive behavior, grooming and exploratory behaviors. In summary, this statistical approach to behavioral analysis in a pre-clinical emesis research model could be used to assess the more global effects and limitations of drugs used to control nausea and its potential correlates, including reduced feeding and

  8. Search for non-standard SUSY signatures in CMS

    International Nuclear Information System (INIS)

    Teyssier, Daniel

    2008-01-01

    New studies of the CMS collaboration are presented on the sensitivity to searches for non-standard signatures of particular SUSY scenarios. These signatures include non-pointing photons as well as pairs of prompt photons as expected GMSB SUSY models, as well as heavy stable charged particles produced in split supersymmetry models, long lived staus from GMSB SUSY and long lived stops in other SUSY scenarios. Detailed detector simulation is used for the study, and all relevant Standard Model background and detector effects that can mimic these special signatures are included. It is shown that with already with less than 100 pb -1 the CMS sensitivity will probe an interesting as yet by data unexplored parameter range of these models.

  9. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  10. The Source Signature Estimator - System Improvements and Applications

    Energy Technology Data Exchange (ETDEWEB)

    Sabel, Per; Brink, Mundy; Eidsvig, Seija; Jensen, Lars

    1998-12-31

    This presentation relates briefly to the first part of the joint project on post-survey analysis of shot-by-shot based source signature estimation. The improvements of a Source Signature Estimator system are analysed. The notional source method can give suboptimal results when not inputting the real array geometry, i.e. actual separations between the sub-arrays of an air gun array, to the notional source algorithm. This constraint has been addressed herein and was implemented for the first time in the field in summer 1997. The second part of this study will show the potential advantages for interpretation when the signature estimates are then to be applied in the data processing. 5 refs., 1 fig.

  11. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  12. Development of Gene Expression Signatures for Practical Radiation Biodosimetry

    International Nuclear Information System (INIS)

    Paul, Sunirmal; Amundson, Sally A.

    2008-01-01

    Purpose: In a large-scale radiologic emergency, estimates of exposure doses and radiation injury would be required for individuals without physical dosimeters. Current methods are inadequate for the task, so we are developing gene expression profiles for radiation biodosimetry. This approach could provide both an estimate of physical radiation dose and an indication of the extent of individual injury or future risk. Methods and Materials: We used whole genome microarray expression profiling as a discovery platform to identify genes with the potential to predict radiation dose across an exposure range relevant for medical decision making in a radiologic emergency. Human peripheral blood from 10 healthy donors was irradiated ex vivo, and global gene expression was measured both 6 and 24 h after exposure. Results: A 74-gene signature was identified that distinguishes between four radiation doses (0.5, 2, 5, and 8 Gy) and controls. More than one third of these genes are regulated by TP53. A nearest centroid classifier using these same 74 genes correctly predicted 98% of samples taken either 6 h or 24 h after treatment as unexposed, exposed to 0.5, 2, or ≥5 Gy. Expression patterns of five genes (CDKN1A, FDXR, SESN1, BBC3, and PHPT1) from this signature were also confirmed by real-time polymerase chain reaction. Conclusion: The ability of a single gene set to predict radiation dose throughout a window of time without need for individual pre-exposure controls represents an important advance in the development of gene expression for biodosimetry

  13. Gene expression patterns associated with p53 status in breast cancer

    International Nuclear Information System (INIS)

    Troester, Melissa A; Herschkowitz, Jason I; Oh, Daniel S; He, Xiaping; Hoadley, Katherine A; Barbier, Claire S; Perou, Charles M

    2006-01-01

    Breast cancer subtypes identified in genomic studies have different underlying genetic defects. Mutations in the tumor suppressor p53 occur more frequently in estrogen receptor (ER) negative, basal-like and HER2-amplified tumors than in luminal, ER positive tumors. Thus, because p53 mutation status is tightly linked to other characteristics of prognostic importance, it is difficult to identify p53's independent prognostic effects. The relation between p53 status and subtype can be better studied by combining data from primary tumors with data from isogenic cell line pairs (with and without p53 function). The p53-dependent gene expression signatures of four cell lines (MCF-7, ZR-75-1, and two immortalized human mammary epithelial cell lines) were identified by comparing p53-RNAi transduced cell lines to their parent cell lines. Cell lines were treated with vehicle only or doxorubicin to identify p53 responses in both non-induced and induced states. The cell line signatures were compared with p53-mutation associated genes in breast tumors. Each cell line displayed distinct patterns of p53-dependent gene expression, but cell type specific (basal vs. luminal) commonalities were evident. Further, a common gene expression signature associated with p53 loss across all four cell lines was identified. This signature showed overlap with the signature of p53 loss/mutation status in primary breast tumors. Moreover, the common cell-line tumor signature excluded genes that were breast cancer subtype-associated, but not downstream of p53. To validate the biological relevance of the common signature, we demonstrated that this gene set predicted relapse-free, disease-specific, and overall survival in independent test data. In the presence of breast cancer heterogeneity, experimental and biologically-based methods for assessing gene expression in relation to p53 status provide prognostic and biologically-relevant gene lists. Our biologically-based refinements excluded genes

  14. Comparing performance of standard and iterative linear unmixing methods for hyperspectral signatures

    Science.gov (United States)

    Gault, Travis R.; Jansen, Melissa E.; DeCoster, Mallory E.; Jansing, E. David; Rodriguez, Benjamin M.

    2016-05-01

    Linear unmixing is a method of decomposing a mixed signature to determine the component materials that are present in sensor's field of view, along with the abundances at which they occur. Linear unmixing assumes that energy from the materials in the field of view is mixed in a linear fashion across the spectrum of interest. Traditional unmixing methods can take advantage of adjacent pixels in the decomposition algorithm, but is not the case for point sensors. This paper explores several iterative and non-iterative methods for linear unmixing, and examines their effectiveness at identifying the individual signatures that make up simulated single pixel mixed signatures, along with their corresponding abundances. The major hurdle addressed in the proposed method is that no neighboring pixel information is available for the spectral signature of interest. Testing is performed using two collections of spectral signatures from the Johns Hopkins University Applied Physics Laboratory's Signatures Database software (SigDB): a hand-selected small dataset of 25 distinct signatures from a larger dataset of approximately 1600 pure visible/near-infrared/short-wave-infrared (VIS/NIR/SWIR) spectra. Simulated spectra are created with three and four material mixtures randomly drawn from a dataset originating from SigDB, where the abundance of one material is swept in 10% increments from 10% to 90%with the abundances of the other materials equally divided amongst the remainder. For the smaller dataset of 25 signatures, all combinations of three or four materials are used to create simulated spectra, from which the accuracy of materials returned, as well as the correctness of the abundances, is compared to the inputs. The experiment is expanded to include the signatures from the larger dataset of almost 1600 signatures evaluated using a Monte Carlo scheme with 5000 draws of three or four materials to create the simulated mixed signatures. The spectral similarity of the inputs to the

  15. The curse of namespaces in the domain of XML signature

    DEFF Research Database (Denmark)

    Jensen, Meiko; Liao, Lijun; Schwenk, Jörg

    2009-01-01

    The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....

  16. Studying the variability in the Raman signature of writing pen inks.

    Science.gov (United States)

    Braz, André; López-López, María; García-Ruiz, Carmen

    2014-12-01

    This manuscript aims to study the inter and intra brand, model and batch variability in the Raman spectral signature among modern pen inks that will help forensic document examiners during the interpretation process. Results showed that most oil-based samples have similar Raman signatures that are characteristic of the Crystal Violet dye, independently of the brand. Exception was the Pilot samples that use Victoria Pure Blue BO instead. This small inter-brand variability makes oil-based pens difficult to discriminate by brand. On the contrary, gel and liquid-based samples use different colorants such as Rhodamine B, Copper Phthalocyanine, Ethyl Violet and Victoria Blue B. No particular pattern was observed regarding the colorants used by each brand, except the Pilot samples that were the only brand using the Victoria Blue B dye, which is a clear distinct feature. Additionally, the intra-brand variability was also large among gel-based Pilot samples. The small spectral differences observed among several batches of Bic Crystal Medium samples demonstrated that changes were introduced in their chemical formula over the years. The intra-batch variability was small and no spectral differences were observed within batches. This manuscript demonstrates the potential of Raman spectroscopy for discriminating pens inks from different brands and models and even, batches. Additionally, the main colorants used in modern pens were also identified. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  17. PARP-1 cleavage fragments: signatures of cell-death proteases in neurodegeneration

    Directory of Open Access Journals (Sweden)

    Alexander Jonathan S

    2010-12-01

    Full Text Available Abstract The normal function of poly (ADP-ribose polymerase-1 (PARP-1 is the routine repair of DNA damage by adding poly (ADP ribose polymers in response to a variety of cellular stresses. Recently, it has become widely appreciated that PARP-1 also participates in diverse physiological and pathological functions from cell survival to several forms of cell death and has been implicated in gene transcription, immune responses, inflammation, learning, memory, synaptic functions, angiogenesis and aging. In the CNS, PARP inhibition attenuates injury in pathologies like cerebral ischemia, trauma and excitotoxicity demonstrating a central role of PARP-1 in these pathologies. PARP-1 is also a preferred substrate for several 'suicidal' proteases and the proteolytic action of suicidal proteases (caspases, calpains, cathepsins, granzymes and matrix metalloproteinases (MMPs on PARP-1 produces several specific proteolytic cleavage fragments with different molecular weights. These PARP-1 signature fragments are recognized biomarkers for specific patterns of protease activity in unique cell death programs. This review focuses on specific suicidal proteases active towards PARP-1 to generate signature PARP-1 fragments that can identify key proteases and particular forms of cell death involved in pathophysiology. The roles played by some of the PARP-1 fragments and their associated binding partners in the control of different forms of cell death are also discussed.

  18. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature.

    Directory of Open Access Journals (Sweden)

    Vincent M Tutino

    Full Text Available Unruptured intracranial aneurysms (IAs are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs.Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts.Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (p<0.05, fold-change ≥2. This signature was able to separate patients with and without IAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5 and controls (n = 5, the 82 transcripts separated 9 of 10 patients into their respective groups.Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs.

  19. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  20. Cyclic lipopeptides from Bacillus subtilis activate distinct patterns of defence responses in grapevine.

    Science.gov (United States)

    Farace, Giovanni; Fernandez, Olivier; Jacquens, Lucile; Coutte, François; Krier, François; Jacques, Philippe; Clément, Christophe; Barka, Essaid Ait; Jacquard, Cédric; Dorey, Stéphan

    2015-02-01

    Non-self-recognition of microorganisms partly relies on the perception of microbe-associated molecular patterns (MAMPs) and leads to the activation of an innate immune response. Bacillus subtilis produces three main families of cyclic lipopeptides (LPs), namely surfactins, iturins and fengycins. Although LPs are involved in induced systemic resistance (ISR) activation, little is known about defence responses induced by these molecules and their involvement in local resistance to fungi. Here, we showed that purified surfactin, mycosubtilin (iturin family) and plipastatin (fengycin family) are perceived by grapevine plant cells. Although surfactin and mycosubtilin stimulated grapevine innate immune responses, they differentially activated early signalling pathways and defence gene expression. By contrast, plipastatin perception by grapevine cells only resulted in early signalling activation. Gene expression analysis suggested that mycosubtilin activated salicylic acid (SA) and jasmonic acid (JA) signalling pathways, whereas surfactin mainly induced an SA-regulated response. Although mycosubtilin and plipastatin displayed direct antifungal activity, only surfactin and mycosubtilin treatments resulted in a local long-lasting enhanced tolerance to the necrotrophic fungus Botrytis cinerea in grapevine leaves. Moreover, challenge with specific strains overproducing surfactin and mycosubtilin led to a slightly enhanced stimulation of the defence response compared with the LP-non-producing strain of B. subtilis. Altogether, our results provide the first comprehensive view of the involvement of LPs from B. subtilis in grapevine plant defence and local resistance against the necrotrophic pathogen Bo. cinerea. Moreover, this work is the first to highlight the ability of mycosubtilin to trigger an immune response in plants. © 2014 BSPP AND JOHN WILEY & SONS LTD.

  1. Single-Cell Analysis of Human Pancreas Reveals Transcriptional Signatures of Aging and Somatic Mutation Patterns.

    Science.gov (United States)

    Enge, Martin; Arda, H Efsun; Mignardi, Marco; Beausang, John; Bottino, Rita; Kim, Seung K; Quake, Stephen R

    2017-10-05

    As organisms age, cells accumulate genetic and epigenetic errors that eventually lead to impaired organ function or catastrophic transformation such as cancer. Because aging reflects a stochastic process of increasing disorder, cells in an organ will be individually affected in different ways, thus rendering bulk analyses of postmitotic adult cells difficult to interpret. Here, we directly measure the effects of aging in human tissue by performing single-cell transcriptome analysis of 2,544 human pancreas cells from eight donors spanning six decades of life. We find that islet endocrine cells from older donors display increased levels of transcriptional noise and potential fate drift. By determining the mutational history of individual cells, we uncover a novel mutational signature in healthy aging endocrine cells. Our results demonstrate the feasibility of using single-cell RNA sequencing (RNA-seq) data from primary cells to derive insights into genetic and transcriptional processes that operate on aging human tissue. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. 76 FR 75461 - Express Mail Domestic Postage Refund Policy and Waiver of Signature

    Science.gov (United States)

    2011-12-02

    ... POSTAL SERVICE 39 CFR Part 111 Express Mail Domestic Postage Refund Policy and Waiver of Signature... to 30 days after the date of mailing, and to change the Express Mail ``waiver of signature'' standard for domestic items by obtaining an addressee's signature only when the mailer selects the ``signature...

  3. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  4. Air-gun signature modelling considering the influence of mechanical structure factors

    International Nuclear Information System (INIS)

    Li, Guofa; Liu, Zhao; Wang, Jianhua; Cao, Mingqiang

    2014-01-01

    In marine seismic prospecting, as the air-gun array is usually composed of different types of air-guns, the signature modelling of different air-guns is particularly important to the array design. Different types of air-guns have different mechanical structures, which directly or indirectly affect the signatures. In order to simulate the influence of the mechanical structure, five parameters—the throttling constant, throttling power law exponent, mass release efficiency, fluid viscosity and heat transfer coefficient—are used in signature modelling. Through minimizing the energy relative error between the simulated and the measured signatures by the simulated annealing method, the five optimal parameters can be estimated. The method is tested in a field experiment, and the consistency between the simulated and the measured signatures is improved with the optimal parameters. (paper)

  5. An evolutionarily conserved sexual signature in the primate brain.

    Directory of Open Access Journals (Sweden)

    Björn Reinius

    2008-06-01

    Full Text Available The question of a potential biological sexual signature in the human brain is a heavily disputed subject. In order to provide further insight into this issue, we used an evolutionary approach to identify genes with sex differences in brain expression level among primates. We reasoned that expression patterns important to uphold key male and female characteristics may be conserved during evolution. We selected cortex for our studies because this specific brain region is responsible for many higher behavioral functions. We compared gene expression profiles in the occipital cortex of male and female humans (Homo sapiens, a great ape and cynomolgus macaques (Macaca fascicularis, an old world monkey, two catarrhine species that show abundant morphological sexual dimorphism, as well as in common marmosets (Callithrix Jacchus, a new world monkey which are relatively sexually monomorphic. We identified hundreds of genes with sex-biased expression patterns in humans and macaques, while fewer than ten were differentially expressed between the sexes in marmosets. In primates, a general rule is that many of the morphological and behavioral sexual dimorphisms seen in polygamous species, such as macaques, are typically less pronounced in monogamous species such as the marmosets. Our observations suggest that this correlation may also be reflected in the extent of sex-biased gene expression in the brain. We identified 85 genes with common sex-biased expression, in both human and macaque and 2 genes, X inactivation-specific transcript (XIST and Heat shock factor binding protein 1 (HSBP1, that were consistently sex-biased in the female direction in human, macaque, and marmoset. These observations imply a conserved signature of sexual gene expression dimorphism in cortex of primates. Further, we found that the coding region of female-biased genes is more evolutionarily constrained compared to the coding region of both male-biased and non sex-biased brain

  6. 7 CFR Appendix B to Subpart E of... - Certificate of Incumbency and Signature

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Certificate of Incumbency and Signature B Appendix B... Signature U.S. Department of Agriculture—Farmers Home Administration or its successor agency under Public... successor agency under Public Law 103-354 and that the signature appearing below and that the signatures...

  7. Effect of reserpine on the brain uptake of carbon II methamphetamine and its N-propagyl derivative, deprenyl

    International Nuclear Information System (INIS)

    Inoue, Osamu; Axelsson, S.; Laangstroem, B.; Lundqvist, H.; Oreland, L.

    1990-01-01

    The enantiomers of methamphetamine (MAMP) and its N-propagyl derivative, deprenyl, were labelled with 11 C, and the tissue distribution of these labelled compounds in mice was studied. Both enantiomers of 11 C-MAMP rapidly entered into the brain and then disappeared according to a single exponential curve. The enantiomers of 11 C-deprenyl were also rapidly distributed to various organs in the same manner. With regard to elimination, however, a stereoselective, long-term retention of radioactivity in the brain, heart and lung, due to its irreversible binding with monoamine oxidase B, was observed for L- 11 C-deprenyl. In reserpinized mice, the initial brain uptake of both the L and D forms of 11 C-MAMP was significantly decreased. On the other hand, the brain uptake of both enantiomers of 11 C-deprenyl was slightly increased by pretreatment with reserpine. A significant and non-stereoselective elevation of the lung uptake of 11 C-deprenyl was also seen in reserpinized mice. In addition, both the relative tissue distribution and ratios of radioactivity in the brain compared with blood or heart at 1 and 5 min after the injection of 11 C-labelled methanol in mice were not changed by reserpine. These results indicate that the transport or binding processes of these amines rather than the blood flow might be altered by reserpine. There would be an important role of the pK a values of amines in both processes. The reduction of brain uptake as well as the change in ratio between brain and heart of L- 11 C-MAMP in reserpinized mice 1 min after injection were reversed by treatment with amphetamine in a dose-related manner. D-Amphetamine was found to be several times more potent than the corresponding L-form in this regard. The present results reveal some possibility that the transport or binding processes of MAMP in the brain may be regulated by cathecholaminergic neurotransmission. (orig.)

  8. Linking foraging strategies of marine calanoid copepods to patterns of nitrogen stable isotope signatures in a mesocosm study

    DEFF Research Database (Denmark)

    Sommer, Frank; Saage, A.; Santer, B.

    2005-01-01

    foraging mode and, further, with its nitrogen stable isotope signature (delta(15)N). This is because a more carnivorous diet may be expected to result in a higher delta(15)N. We tested this hypothesis in a mesocosm study using a density gradient (0 to 80 ind. 1(-1)) of calanoid copepods. We expected......The foraging modes of calanoid copepods differ in that stationary suspension-feeding is more easily detected by prey with strong escape responses (ciliates) than is 'cruising' or 'ambushing' feeding. Thus, the ability of a copepod to include heterotrophic prey in its diet may be associated with its...

  9. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  10. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  11. The 82-plex plasma protein signature that predicts increasing inflammation

    DEFF Research Database (Denmark)

    Tepel, Martin; Beck, Hans C; Tan, Qihua

    2015-01-01

    The objective of the study was to define the specific plasma protein signature that predicts the increase of the inflammation marker C-reactive protein from index day to next-day using proteome analysis and novel bioinformatics tools. We performed a prospective study of 91 incident kidney....... The prediction model selected and validated 82 plasma proteins which determined increased next-day C-reactive protein (area under receiver-operator-characteristics curve, 0.772; 95% confidence interval, 0.669 to 0.876; P signature (P ....001) was associated with observed increased next-day C-reactive protein. The 82-plex protein signature outperformed routine clinical procedures. The category-free net reclassification index improved with 82-plex plasma protein signature (total net reclassification index, 88.3%). Using the 82-plex plasma protein...

  12. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  13. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  14. A species-specific nucleosomal signature defines a periodic distribution of amino acids in proteins.

    Science.gov (United States)

    Quintales, Luis; Soriano, Ignacio; Vázquez, Enrique; Segurado, Mónica; Antequera, Francisco

    2015-04-01

    Nucleosomes are the basic structural units of chromatin. Most of the yeast genome is organized in a pattern of positioned nucleosomes that is stably maintained under a wide range of physiological conditions. In this work, we have searched for sequence determinants associated with positioned nucleosomes in four species of fission and budding yeasts. We show that mononucleosomal DNA follows a highly structured base composition pattern, which differs among species despite the high degree of histone conservation. These nucleosomal signatures are present in transcribed and non-transcribed regions across the genome. In the case of open reading frames, they correctly predict the relative distribution of codons on mononucleosomal DNA, and they also determine a periodicity in the average distribution of amino acids along the proteins. These results establish a direct and species-specific connection between the position of each codon around the histone octamer and protein composition.

  15. Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers

    International Nuclear Information System (INIS)

    Yang Yuguang; Wang Yuan; Teng Yiwei; Chai Haiping; Wen Qiaoyan

    2010-01-01

    Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. (general)

  16. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  17. Polarization signatures for abandoned agricultural fields in the Manix Basin area of the Mojave Desert

    Science.gov (United States)

    Ray, Terrill W.; Farr, Tom G.; Vanzyl, Jakob J.

    1991-01-01

    Polarimetric signatures from abandoned circular alfalfa fields in the Manix Basin area of the Mojave desert show systematic changes with length of abandonment. The obliteration of circular planting rows by surface processes could account for the disappearance of bright 'spokes', which seems to be reflection patterns from remnants of the planting rows, with increasing length of abandonment. An observed shift in the location of the maximum L-band copolarization return away from VV, as well as an increase in surface roughness, both occurring with increasing age of abandonment, seems to be attributable to the formation of wind ripple on the relatively vegetationless fields. A Late Pleistocene/Holocene sand bar deposit, which can be identified in the radar images, is probably responsible for the failure of three fields to match the age sequence patterns in roughness and peak shift.

  18. Comparison of transcriptomic signature of post-Chernobyl and post radiotherapy thyroid tumors

    International Nuclear Information System (INIS)

    Ory, Catherine; Ugolin, Nicolas; Chevillard, Sylvie; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A.

    2013-01-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and post radiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression de-regulations and molecular features/pathways, and (ii) to test the capacity of the post radiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the post radiotherapy-induced tumors. We now explored if post radiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the post radiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the post radiotherapy series (15 sporadic and 12 post radiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the post radiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of post radiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each post radiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  19. SOIL RESPIRED D13C SIGNATURES REFLECT ROOT EXUDATE OR ROOT TURNOVER SIGNATURES IN AN ELEVATED CO2 AND OZONE MESOCOSM EXPERIMENT

    Science.gov (United States)

    Bulk tissue and root and soil respired d13C signatures were measured throughout the soil profile in a Ponderosa Pine mesocosm experiment exposed to ambient and elevated CO2 concentrations. For the ambient treatment, root (0-1mm, 1-2mm, and >2mm) and soil d13C signatures were ?24...

  20. Distinct microbiological signatures associated with triple negative breast cancer.

    Science.gov (United States)

    Banerjee, Sagarika; Wei, Zhi; Tan, Fei; Peck, Kristen N; Shih, Natalie; Feldman, Michael; Rebbeck, Timothy R; Alwine, James C; Robertson, Erle S

    2015-10-15

    Infectious agents are the third highest human cancer risk factor and may have a greater role in the origin and/or progression of cancers, and related pathogenesis. Thus, knowing the specific viruses and microbial agents associated with a cancer type may provide insights into cause, diagnosis and treatment. We utilized a pan-pathogen array technology to identify the microbial signatures associated with triple negative breast cancer (TNBC). This technology detects low copy number and fragmented genomes extracted from formalin-fixed paraffin embedded archival tissues. The results, validated by PCR and sequencing, define a microbial signature present in TNBC tissue which was underrepresented in normal tissue. Hierarchical clustering analysis displayed two broad microbial signatures, one prevalent in bacteria and parasites and one prevalent in viruses. These signatures demonstrate a new paradigm in our understanding of the link between microorganisms and cancer, as causative or commensal in the tumor microenvironment and provide new diagnostic potential.

  1. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  2. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  3. L1000CDS2: LINCS L1000 characteristic direction signatures search engine.

    Science.gov (United States)

    Duan, Qiaonan; Reid, St Patrick; Clark, Neil R; Wang, Zichen; Fernandez, Nicolas F; Rouillard, Andrew D; Readhead, Ben; Tritsch, Sarah R; Hodos, Rachel; Hafner, Marc; Niepel, Mario; Sorger, Peter K; Dudley, Joel T; Bavari, Sina; Panchal, Rekha G; Ma'ayan, Avi

    2016-01-01

    The library of integrated network-based cellular signatures (LINCS) L1000 data set currently comprises of over a million gene expression profiles of chemically perturbed human cell lines. Through unique several intrinsic and extrinsic benchmarking schemes, we demonstrate that processing the L1000 data with the characteristic direction (CD) method significantly improves signal to noise compared with the MODZ method currently used to compute L1000 signatures. The CD processed L1000 signatures are served through a state-of-the-art web-based search engine application called L1000CDS 2 . The L1000CDS 2 search engine provides prioritization of thousands of small-molecule signatures, and their pairwise combinations, predicted to either mimic or reverse an input gene expression signature using two methods. The L1000CDS 2 search engine also predicts drug targets for all the small molecules profiled by the L1000 assay that we processed. Targets are predicted by computing the cosine similarity between the L1000 small-molecule signatures and a large collection of signatures extracted from the gene expression omnibus (GEO) for single-gene perturbations in mammalian cells. We applied L1000CDS 2 to prioritize small molecules that are predicted to reverse expression in 670 disease signatures also extracted from GEO, and prioritized small molecules that can mimic expression of 22 endogenous ligand signatures profiled by the L1000 assay. As a case study, to further demonstrate the utility of L1000CDS 2 , we collected expression signatures from human cells infected with Ebola virus at 30, 60 and 120 min. Querying these signatures with L1000CDS 2 we identified kenpaullone, a GSK3B/CDK2 inhibitor that we show, in subsequent experiments, has a dose-dependent efficacy in inhibiting Ebola infection in vitro without causing cellular toxicity in human cell lines. In summary, the L1000CDS 2 tool can be applied in many biological and biomedical settings, while improving the extraction of

  4. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  5. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  6. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  7. Magnetic Signature Analysis & Validation System

    National Research Council Canada - National Science Library

    Vliet, Scott

    2001-01-01

    The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...

  8. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  9. Cis-regulatory signatures of orthologous stress-associated bZIP transcription factors from rice, sorghum and Arabidopsis based on phylogenetic footprints

    Directory of Open Access Journals (Sweden)

    Xu Fuyu

    2012-09-01

    Full Text Available Abstract Background The potential contribution of upstream sequence variation to the unique features of orthologous genes is just beginning to be unraveled. A core subset of stress-associated bZIP transcription factors from rice (Oryza sativa formed ten clusters of orthologous groups (COG with genes from the monocot sorghum (Sorghum bicolor and dicot Arabidopsis (Arabidopsis thaliana. The total cis-regulatory information content of each stress-associated COG was examined by phylogenetic footprinting to reveal ortholog-specific, lineage-specific and species-specific conservation patterns. Results The most apparent pattern observed was the occurrence of spatially conserved ‘core modules’ among the COGs but not among paralogs. These core modules are comprised of various combinations of two to four putative transcription factor binding site (TFBS classes associated with either developmental or stress-related functions. Outside the core modules are specific stress (ABA, oxidative, abiotic, biotic or organ-associated signals, which may be functioning as ‘regulatory fine-tuners’ and further define lineage-specific and species-specific cis-regulatory signatures. Orthologous monocot and dicot promoters have distinct TFBS classes involved in disease and oxidative-regulated expression, while the orthologous rice and sorghum promoters have distinct combinations of root-specific signals, a pattern that is not particularly conserved in Arabidopsis. Conclusions Patterns of cis-regulatory conservation imply that each ortholog has distinct signatures, further suggesting that they are potentially unique in a regulatory context despite the presumed conservation of broad biological function during speciation. Based on the observed patterns of conservation, we postulate that core modules are likely primary determinants of basal developmental programming, which may be integrated with and further elaborated by additional intrinsic or extrinsic signals in

  10. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  11. LAVA: An Open-Source Approach To Designing LAMP (Loop-Mediated Isothermal Amplification DNA Signatures

    Directory of Open Access Journals (Sweden)

    Gardner Shea N

    2011-06-01

    Full Text Available Abstract Background We developed an extendable open-source Loop-mediated isothermal AMPlification (LAMP signature design program called LAVA (LAMP Assay Versatile Analysis. LAVA was created in response to limitations of existing LAMP signature programs. Results LAVA identifies combinations of six primer regions for basic LAMP signatures, or combinations of eight primer regions for LAMP signatures with loop primers, which can be used as LAMP signatures. The identified primers are conserved among target organism sequences. Primer combinations are optimized based on lengths, melting temperatures, and spacing among primer sites. We compare LAMP signature candidates for Staphylococcus aureus created both by LAVA and by PrimerExplorer. We also include signatures from a sample run targeting all strains of Mycobacterium tuberculosis. Conclusions We have designed and demonstrated new software for identifying signature candidates appropriate for LAMP assays. The software is available for download at http://lava-dna.googlecode.com/.

  12. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  13. Neural Signatures of Trust During Human-Automation Interactions

    Science.gov (United States)

    2016-04-01

    also automated devices such as a Global Positioning System. For instance, to provide advanced safety measures, the Transportation Safety...AFRL-AFOSR-VA-TR-2016-0160 Neural Signatures of Trust during Human- Automation Interactions Frank Krueger GEORGE MASON UNIVERSITY Final Report 04/01...SUBTITLE Neural Signatures of Trust during Human- Automation Interactions 5a. CONTRACT NUMBER FA9550-13-1-0017 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  14. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  15. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  16. ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.; Cheng, C.-M.; Chung, K.-M.; Persiano, G.; Yang, B.-Y.

    2016-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41KB signature on an ARM Cortex

  17. Privacy in wireless sensor networks using ring signature

    Directory of Open Access Journals (Sweden)

    Ashmita Debnath

    2014-07-01

    Full Text Available The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In this work, a ring signature was proposed to authenticate the source node while preserving its spatial privacy. However, other nodes as signers and their numbers must be chosen to preclude the possibility of a traffic analysis attack by an adversary. The spatial uncertainty increases with the number of signers but requires larger memory size and communication overhead. This requirement can breach the privacy of the sensed object. To determine the effectiveness of the proposed scheme, the location estimate of a sensor node by an adversary and enhancement in the location uncertainty with a ring signature was evaluated. Using simulation studies, the ring signature was estimated to require approximately four members from the same neighbor region of the source node to sustain the privacy of the node. Furthermore, the ring signature was also determined to have a small overhead and not to adversely affect the performance of the sensor network.

  18. ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.

    2015-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on a "very small device" with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41\\,KB signature on an ARM Cortex M3

  19. Spatial Signature Estimation with an Uncalibrated Uniform Linear Array

    Directory of Open Access Journals (Sweden)

    Xiang Cao

    2015-06-01

    Full Text Available In this paper, the problem of spatial signature estimation using a uniform linear array (ULA with unknown sensor gain and phase errors is considered. As is well known, the directions-of-arrival (DOAs can only be determined within an unknown rotational angle in this array model. However, the phase ambiguity has no impact on the identification of the spatial signature. Two auto-calibration methods are presented for spatial signature estimation. In our methods, the rotational DOAs and model error parameters are firstly obtained, and the spatial signature is subsequently calculated. The first method extracts two subarrays from the ULA to construct an estimator, and the elements of the array can be used several times in one subarray. The other fully exploits multiple invariances in the interior of the sensor array, and a multidimensional nonlinear problem is formulated. A Gauss–Newton iterative algorithm is applied for solving it. The first method can provide excellent initial inputs for the second one. The effectiveness of the proposed algorithms is demonstrated by several simulation results.

  20. Pediatric Crohn disease patients exhibit specific ileal transcriptome and microbiome signature.

    Science.gov (United States)

    Haberman, Yael; Tickle, Timothy L; Dexheimer, Phillip J; Kim, Mi-Ok; Tang, Dora; Karns, Rebekah; Baldassano, Robert N; Noe, Joshua D; Rosh, Joel; Markowitz, James; Heyman, Melvin B; Griffiths, Anne M; Crandall, Wallace V; Mack, David R; Baker, Susan S; Huttenhower, Curtis; Keljo, David J; Hyams, Jeffrey S; Kugathasan, Subra; Walters, Thomas D; Aronow, Bruce; Xavier, Ramnik J; Gevers, Dirk; Denson, Lee A

    2014-08-01

    Interactions between the host and gut microbial community likely contribute to Crohn disease (CD) pathogenesis; however, direct evidence for these interactions at the onset of disease is lacking. Here, we characterized the global pattern of ileal gene expression and the ileal microbial community in 359 treatment-naive pediatric patients with CD, patients with ulcerative colitis (UC), and control individuals. We identified core gene expression profiles and microbial communities in the affected CD ilea that are preserved in the unaffected ilea of patients with colon-only CD but not present in those with UC or control individuals; therefore, this signature is specific to CD and independent of clinical inflammation. An abnormal increase of antimicrobial dual oxidase (DUOX2) expression was detected in association with an expansion of Proteobacteria in both UC and CD, while expression of lipoprotein APOA1 gene was downregulated and associated with CD-specific alterations in Firmicutes. The increased DUOX2 and decreased APOA1 gene expression signature favored oxidative stress and Th1 polarization and was maximally altered in patients with more severe mucosal injury. A regression model that included APOA1 gene expression and microbial abundance more accurately predicted month 6 steroid-free remission than a model using clinical factors alone. These CD-specific host and microbe profiles identify the ileum as the primary inductive site for all forms of CD and may direct prognostic and therapeutic approaches.

  1. Special Nuclear Material Gamma-Ray Signatures for Reachback Analysts

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Myers, Steven Charles [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-29

    These are slides on special nuclear material gamma-ray signatures for reachback analysts for an LSS Spectroscopy course. The closing thoughts for this presentation are the following: SNM materials have definite spectral signatures that should be readily recognizable to analysts in both bare and shielded configurations. One can estimate burnup of plutonium using certain pairs of peaks that are a few keV apart. In most cases, one cannot reliably estimate uranium enrichment in an analogous way to the estimation of plutonium burnup. The origin of the most intense peaks from some SNM items may be indirect and from ‘associated nuclides.' Indirect SNM signatures sometimes have commonalities with the natural gamma-ray background.

  2. Mirage: a visible signature evaluation tool

    Science.gov (United States)

    Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel

    2017-10-01

    This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).

  3. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  4. Assessing the robustness of quantitative fatty acid signature analysis to assumption violations

    Science.gov (United States)

    Bromaghin, Jeffrey F.; Budge, Suzanne M.; Thiemann, Gregory W.; Rode, Karyn D.

    2016-01-01

      Knowledge of animal diets can provide important insights into life history and ecology, relationships among species in a community and potential response to ecosystem change or perturbation. Quantitative fatty acid signature analysis (QFASA) is a method of estimating diets from data on the composition, or signature, of fatty acids stored in adipose tissue. Given data on signatures of potential prey, a predator diet is estimated by minimizing the distance between its signature and a mixture of prey signatures. Calibration coefficients, constants derived from feeding trials, are used to account for differential metabolism of individual fatty acids. QFASA has been widely applied since its introduction and several variants of the original estimator have appeared in the literature. However, work to compare the statistical properties of QFASA estimators has been limited.

  5. An algorithm to discover gene signatures with predictive potential

    Directory of Open Access Journals (Sweden)

    Hallett Robin M

    2010-09-01

    Full Text Available Abstract Background The advent of global gene expression profiling has generated unprecedented insight into our molecular understanding of cancer, including breast cancer. For example, human breast cancer patients display significant diversity in terms of their survival, recurrence, metastasis as well as response to treatment. These patient outcomes can be predicted by the transcriptional programs of their individual breast tumors. Predictive gene signatures allow us to correctly classify human breast tumors into various risk groups as well as to more accurately target therapy to ensure more durable cancer treatment. Results Here we present a novel algorithm to generate gene signatures with predictive potential. The method first classifies the expression intensity for each gene as determined by global gene expression profiling as low, average or high. The matrix containing the classified data for each gene is then used to score the expression of each gene based its individual ability to predict the patient characteristic of interest. Finally, all examined genes are ranked based on their predictive ability and the most highly ranked genes are included in the master gene signature, which is then ready for use as a predictor. This method was used to accurately predict the survival outcomes in a cohort of human breast cancer patients. Conclusions We confirmed the capacity of our algorithm to generate gene signatures with bona fide predictive ability. The simplicity of our algorithm will enable biological researchers to quickly generate valuable gene signatures without specialized software or extensive bioinformatics training.

  6. 15 CFR 80.4 - Signature of persons unable to sign their name.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Signature of persons unable to sign... POPULATION SCHEDULES § 80.4 Signature of persons unable to sign their name. A person requesting Census information who is unable to sign his or her name shall make an “X” mark where signature is required, and the...

  7. Design of Genomic Signatures of Pathogen Identification & Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Slezak, T; Gardner, S; Allen, J; Vitalis, E; Jaing, C

    2010-02-09

    This chapter will address some of the many issues associated with the identification of signatures based on genomic DNA/RNA, which can be used to identify and characterize pathogens for biodefense and microbial forensic goals. For the purposes of this chapter, we define a signature as one or more strings of contiguous genomic DNA or RNA bases that are sufficient to identify a pathogenic target of interest at the desired resolution and which could be instantiated with particular detection chemistry on a particular platform. The target may be a whole organism, an individual functional mechanism (e.g., a toxin gene), or simply a nucleic acid indicative of the organism. The desired resolution will vary with each program's goals but could easily range from family to genus to species to strain to isolate. The resolution may not be taxonomically based but rather pan-mechanistic in nature: detecting virulence or antibiotic-resistance genes shared by multiple microbes. Entire industries exist around different detection chemistries and instrument platforms for identification of pathogens, and we will only briefly mention a few of the techniques that we have used at Lawrence Livermore National Laboratory (LLNL) to support our biosecurity-related work since 2000. Most nucleic acid based detection chemistries involve the ability to isolate and amplify the signature target region(s), combined with a technique to detect the amplification. Genomic signature based identification techniques have the advantage of being precise, highly sensitive and relatively fast in comparison to biochemical typing methods and protein signatures. Classical biochemical typing methods were developed long before knowledge of DNA and resulted in dozens of tests (Gram's stain, differential growth characteristics media, etc.) that could be used to roughly characterize the major known pathogens (of course some are uncultivable). These tests could take many days to complete and precise resolution

  8. Anogenital distance as a phenotypic signature through infancy

    DEFF Research Database (Denmark)

    Priskorn, Lærke; Petersen, Jørgen H; Jørgensen, Niels

    2018-01-01

    BACKGROUND: Anogenital distance (AGD) has been suggested to represent a phenotypic signature reflecting in utero androgen action. However, it is not known whether an individual's AGD at birth correlates to AGD later in life. We investigate correlations of AGD between 3 and 18 months and asses rep......-up through childhood and puberty will reveal whether AGD represents a phenotypic signature throughout life.Pediatric Research accepted article preview online, 20 November 2017. doi:10.1038/pr.2017.287....

  9. Plasma Signatures of Radial Field Power Dropouts

    International Nuclear Information System (INIS)

    Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.

    1998-01-01

    A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events

  10. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  11. Molecular signatures database (MSigDB) 3.0.

    Science.gov (United States)

    Liberzon, Arthur; Subramanian, Aravind; Pinchback, Reid; Thorvaldsdóttir, Helga; Tamayo, Pablo; Mesirov, Jill P

    2011-06-15

    Well-annotated gene sets representing the universe of the biological processes are critical for meaningful and insightful interpretation of large-scale genomic data. The Molecular Signatures Database (MSigDB) is one of the most widely used repositories of such sets. We report the availability of a new version of the database, MSigDB 3.0, with over 6700 gene sets, a complete revision of the collection of canonical pathways and experimental signatures from publications, enhanced annotations and upgrades to the web site. MSigDB is freely available for non-commercial use at http://www.broadinstitute.org/msigdb.

  12. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  13. Spectral decomposition of MR spectroscopy signatures with use of eigenanalysis

    International Nuclear Information System (INIS)

    Hearshen, D.O.; Windham, J.P.; Roebuck, J.R.; Helpern, J.A.

    1989-01-01

    Partial-volume contamination and overlapping resonances are common problems in whole-body MR spectroscopy and can affect absolute or relative intensity and chemical-shift measurements. One technique, based on solution of constrained eigenvalue problems, treats spectra as N-dimensional signatures and minimizes contributions of undesired signatures while maximizing contributions of desired signatures in compromised spectra. Computer simulations and both high-resolution (400-MHz) and whole-body (63.8-MHz) phantom studies tested accuracy and reproducibility of spectral decomposition. Results demonstrated excellent decomposition and good reproducibility within certain constraints. The authors conclude that eigenanalysis may improve quantitation of spectra without introducing operator bias

  14. The effects of different representations on static structure analysis of computer malware signatures.

    Science.gov (United States)

    Narayanan, Ajit; Chen, Yi; Pang, Shaoning; Tao, Ban

    2013-01-01

    The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. We show that, if malware signatures are represented as artificial protein sequences, it is possible to apply standard sequence alignment techniques in bioinformatics to improve accuracy of distinguishing between worm and virus signatures. Moreover, aligned signature sequences can be mined through traditional data mining techniques to extract metasignatures that help to distinguish between viral and worm signatures. All bioinformatics and data mining analysis were performed on publicly available tools and Weka.

  15. Observational Signatures Of Agn Feedback Across Cosmic Time

    Science.gov (United States)

    Wylezalek, Dominika

    2017-06-01

    While many compelling models of AGN feedback exist, there is no clear data-driven picture of how winds are launched, how they propagate through the galaxy and what impact they have on the galactic gas. Recent work suggests that AGN luminosity plays an important role. The following described projects focus on understanding the power, reach and impact of feedback processes exerted by AGN of different power. I first describe recent efforts in our group of relating feedback signatures in powerful quasars to the specific star formation rate in their host galaxies, where our results are consistent with the AGN having a `negative' impact through feedback on the galaxies' star formation history. Feedback signatures seem to be best observable in gas-rich galaxies where the coupling of the AGN-driven wind to the gas is strongest, in agreement with recent simulations. But how and where does this quenching happen? Is it accomplished through the mechanical action of jets or through nuclear winds driven by radiation pressure? Finally, I show that AGN signatures and AGN-driven winds can be easily hidden and not be apparent in the integrated spectrum of a galaxy hosting a low/intermediate-luminosity AGN. Using data from the new SDSS-IV MaNGA survey, we have developed a new AGN selection algorithm tailored to IFU data and we are uncovering a much more nuanced picture of AGN activity allowing us to discover AGN signatures at large distances from the galaxy center. This implies that large IFU surveys, such as the SDSS-IV MaNGA survey, might uncover many previously unknown AGN and feedback signatures related to them. Outflows and feedback from low- and intermediate-luminosity AGN might have been underestimated in the past but can potentially significantly contribute to the AGN/host-galaxy self-regulation.

  16. Biological signatures of dynamic river networks from a coupled landscape evolution and neutral community model

    Science.gov (United States)

    Stokes, M.; Perron, J. T.

    2017-12-01

    Freshwater systems host exceptionally species-rich communities whose spatial structure is dictated by the topology of the river networks they inhabit. Over geologic time, river networks are dynamic; drainage basins shrink and grow, and river capture establishes new connections between previously separated regions. It has been hypothesized that these changes in river network structure influence the evolution of life by exchanging and isolating species, perhaps boosting biodiversity in the process. However, no general model exists to predict the evolutionary consequences of landscape change. We couple a neutral community model of freshwater organisms to a landscape evolution model in which the river network undergoes drainage divide migration and repeated river capture. Neutral community models are macro-ecological models that include stochastic speciation and dispersal to produce realistic patterns of biodiversity. We explore the consequences of three modes of speciation - point mutation, time-protracted, and vicariant (geographic) speciation - by tracking patterns of diversity in time and comparing the final result to an equilibrium solution of the neutral model on the final landscape. Under point mutation, a simple model of stochastic and instantaneous speciation, the results are identical to the equilibrium solution and indicate the dominance of the species-area relationship in forming patterns of diversity. The number of species in a basin is proportional to its area, and regional species richness reaches its maximum when drainage area is evenly distributed among sub-basins. Time-protracted speciation is also modeled as a stochastic process, but in order to produce more realistic rates of diversification, speciation is not assumed to be instantaneous. Rather, each new species must persist for a certain amount of time before it is considered to be established. When vicariance (geographic speciation) is included, there is a transient signature of increased

  17. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  18. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  19. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  20. 48 CFR 2917.504-70 - Signature authority and internal procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Signature authority and internal procedures. 2917.504-70 Section 2917.504-70 Federal Acquisition Regulations System DEPARTMENT OF... The Economy Act 2917.504-70 Signature authority and internal procedures. (a) A DOL contracting officer...

  1. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature

    Science.gov (United States)

    Tutino, Vincent M.; Poppenberg, Kerry E.; Jiang, Kaiyu; Jarvis, James N.; Sun, Yijun; Sonig, Ashish; Siddiqui, Adnan H.; Snyder, Kenneth V.; Levy, Elad I.; Kolega, John

    2018-01-01

    Background Unruptured intracranial aneurysms (IAs) are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs. Methods Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts. Results Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (pIAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5) and controls (n = 5), the 82 transcripts separated 9 of 10 patients into their respective groups. Conclusion Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs. PMID:29342213

  2. Adaptative numerical methods for transport problems in safety nuclear reactors by the use of perturbations signatures and processes

    International Nuclear Information System (INIS)

    Doriath, J.Y.

    1983-05-01

    The need for increasingly accurate nuclear reactor performance data has led to increasingly sophisticated methods for solving the Boltzmann transport equation. This work has revealed the need for analyzing the functional signatures of the neutron flux using pattern recognition techniques to relate the local and overall phases of reactor calculations according to the desired parameters. This approach makes it possible to develop procedures based on a reference calculations and designed to evaluate the disturbances due to changes in physical media and to media interface modifications [fr

  3. Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

    Directory of Open Access Journals (Sweden)

    Tao Shang

    2018-04-01

    Full Text Available With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.

  4. Infrared signature modelling of a rocket jet plume - comparison with flight measurements

    International Nuclear Information System (INIS)

    Rialland, V; Perez, P; Roblin, A; Guy, A; Gueyffier, D; Smithson, T

    2016-01-01

    The infrared signature modelling of rocket plumes is a challenging problem involving rocket geometry, propellant composition, combustion modelling, trajectory calculations, fluid mechanics, atmosphere modelling, calculation of gas and particles radiative properties and of radiative transfer through the atmosphere. This paper presents ONERA simulation tools chained together to achieve infrared signature prediction, and the comparison of the estimated and measured signatures of an in-flight rocket plume. We consider the case of a solid rocket motor with aluminized propellant, the Black Brant sounding rocket. The calculation case reproduces the conditions of an experimental rocket launch, performed at White Sands in 1997, for which we obtained high quality infrared signature data sets from DRDC Valcartier. The jet plume is calculated using an in-house CFD software called CEDRE. The plume infrared signature is then computed on the spectral interval 1900-5000 cm -1 with a step of 5 cm -1 . The models and their hypotheses are presented and discussed. Then the resulting plume properties, radiance and spectra are detailed. Finally, the estimated infrared signature is compared with the spectral imaging measurements. The discrepancies are analyzed and discussed. (paper)

  5. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  6. Field Education as the Signature Pedagogy of Social Work Education

    Science.gov (United States)

    Wayne, Julianne; Bogo, Marion; Raskin, Miriam

    2010-01-01

    In its EPAS, CSWE (2008) identifies field education as the signature pedagogy (Shulman, 2005b) of social work education. This article analyzes the field education-signature pedagogy fit. It finds congruence in selected organizational arrangements that are pervasive and routine, and disparities with respect to expectations about public student…

  7. Comparative conventional- and quantum dot-labelling strategies for LPS binding site detection in Arabidopsis thaliana mesophyll protoplasts

    Directory of Open Access Journals (Sweden)

    Londiwe Siphephise Mgcina

    2015-05-01

    Full Text Available Lipopolysaccharide (LPS from Gram-negative bacteria is recognized as a microbe-associated molecular pattern (MAMP and not only induces an innate immune response in plants, but also stimulates the development of characteristic defense responses. However, identification and characterization of a cell surface LPS-receptor/binding site, as described in mammals, remains elusive in plants. As an amphiphilic, macromolecular lipoglycan, intact LPS potentially contains three MAMP-active regions, represented by the O-polysaccharide chain, the core and the lipid A. Binding site studies with intact labelled LPS were conducted in Arabidopsis thaliana protoplasts and quantified using flow cytometry fluorescence changes. Qdots, which allow non-covalent, hydrophobic labelling were used as a novel strategy in this study and compared to covalent, hydrophilic labelling with Alexa 488. Affinity for LPS-binding sites was clearly demonstrated by concentration-, temperature- and time-dependent increases in protoplast fluorescence following treatment with the labelled LPS. Moreover, this induced fluorescence increase was convincingly reduced following pre-treatment with excess unlabeled LPS, thereby indicating reversibility of LPS binding. Inhibition of the binding process is also reported using endo- and exocytosis inhibitors. Here, we present evidence for the anticipated presence of LPS-specific binding sites in Arabidopsis protoplasts, and furthermore propose Qdots as a more sensitive LPS-labelling strategy in comparison to the conventional Alexa 488 hydrazide label for binding studies.

  8. Dual Transcriptome Profiling of Leishmania-Infected Human Macrophages Reveals Distinct Reprogramming Signatures.

    Science.gov (United States)

    Fernandes, Maria Cecilia; Dillon, Laura A L; Belew, Ashton Trey; Bravo, Hector Corrada; Mosser, David M; El-Sayed, Najib M

    2016-05-10

    Macrophages are mononuclear phagocytes that constitute a first line of defense against pathogens. While lethal to many microbes, they are the primary host cells of Leishmania spp. parasites, the obligate intracellular pathogens that cause leishmaniasis. We conducted transcriptomic profiling of two Leishmania species and the human macrophage over the course of intracellular infection by using high-throughput RNA sequencing to characterize the global gene expression changes and reprogramming events that underlie the interactions between the pathogen and its host. A systematic exclusion of the generic effects of large-particle phagocytosis revealed a vigorous, parasite-specific response of the human macrophage early in the infection that was greatly tempered at later time points. An analogous temporal expression pattern was observed with the parasite, suggesting that much of the reprogramming that occurs as parasites transform into intracellular forms generally stabilizes shortly after entry. Following that, the parasite establishes an intracellular niche within macrophages, with minimal communication between the parasite and the host cell later during the infection. No significant difference was observed between parasite species transcriptomes or in the transcriptional response of macrophages infected with each species. Our comparative analysis of gene expression changes that occur as mouse and human macrophages are infected by Leishmania spp. points toward a general signature of the Leishmania-macrophage infectome. Little is known about the transcriptional changes that occur within mammalian cells harboring intracellular pathogens. This study characterizes the gene expression signatures of Leishmania spp. parasites and the coordinated response of infected human macrophages as the pathogen enters and persists within them. After accounting for the generic effects of large-particle phagocytosis, we observed a parasite-specific response of the human macrophages early in

  9. New particles and their experimental signatures

    International Nuclear Information System (INIS)

    Ellis, J.; Gelmini, G.; Kowalski, H.

    1984-08-01

    This report summarizes work done by our theoretical working group on exotic particles before, during and since the Lausanne meeting. We discuss the motivations, rates and experimental signatures for new physics and new particles in the 1 TeV mass range. Section 2 reviews some of the motivations for expecting new physics in this range. Of particular interest is the physics of gauge symmetry breaking. In section 3 we discuss the rates and experimental signatures of new particles predicted by theoretical models of gauge symmetry breaking, notably the Higgs boson supersymmetry and technicolour. Among the signatures we discuss are multiple Wsup(+-) and/or Z 0 events (for the Higgs), missing transverse energy (for supersymmetry) and multiple anti tt events (for the Higgs and technicolour). We provide many examples of final state differential distributions in rapidity and Psub(T), particularly for Higgses and for supersymmetry. We also analyse some physics backgrounds to the new particle production processes which interest us. Examples include W + W - , Z 0 Z 0 , W(anti tt) and (anti tt) production as backgrounds to Higgs production. However, we do not consider in detail non-physics backgrounds such as the jet fluctuation background to missing energy signals for supersymmetry production. Section 4 summarizes our preliminary conclusions on the observability at a high energy hadron collider of the new particles studied in this report. (orig./HSI)

  10. A prospective blood RNA signature for tuberculosis disease risk

    Science.gov (United States)

    Zak, Daniel E.; Penn-Nicholson, Adam; Scriba, Thomas J.; Thompson, Ethan; Suliman, Sara; Amon, Lynn M.; Mahomed, Hassan; Erasmus, Mzwandile; Whatney, Wendy; Hussey, Gregory D.; Abrahams, Deborah; Kafaar, Fazlin; Hawkridge, Tony; Verver, Suzanne; Hughes, E. Jane; Ota, Martin; Sutherland, Jayne; Howe, Rawleigh; Dockrell, Hazel M.; Boom, W. Henry; Thiel, Bonnie; Ottenhoff, Tom H.M.; Mayanja-Kizza, Harriet; Crampin, Amelia C; Downing, Katrina; Hatherill, Mark; Valvo, Joe; Shankar, Smitha; Parida, Shreemanta K; Kaufmann, Stefan H.E.; Walzl, Gerhard; Aderem, Alan; Hanekom, Willem A.

    2016-01-01

    Background Identification of blood biomarkers that prospectively predict progression of Mycobacterium tuberculosis infection to tuberculosis disease may lead to interventions that impact the epidemic. Methods Healthy, M. tuberculosis infected South African adolescents were followed for 2 years; blood was collected every 6 months. A prospective signature of risk was derived from whole blood RNA-Sequencing data by comparing participants who ultimately developed active tuberculosis disease (progressors) with those who remained healthy (matched controls). After adaptation to multiplex qRT-PCR, the signature was used to predict tuberculosis disease in untouched adolescent samples and in samples from independent cohorts of South African and Gambian adult progressors and controls. The latter participants were household contacts of adults with active pulmonary tuberculosis disease. Findings Of 6,363 adolescents screened, 46 progressors and 107 matched controls were identified. A 16 gene signature of risk was identified. The signature predicted tuberculosis progression with a sensitivity of 66·1% (95% confidence interval, 63·2–68·9) and a specificity of 80·6% (79·2–82·0) in the 12 months preceding tuberculosis diagnosis. The risk signature was validated in an untouched group of adolescents (p=0·018 for RNA-Seq and p=0·0095 for qRT-PCR) and in the independent South African and Gambian cohorts (p values Bill and Melinda Gates Foundation, the National Institutes of Health, Aeras, the European Union and the South African Medical Research Council (detail at end of text). PMID:27017310

  11. Incorporating X–ray summing into gamma–gamma signature quantification

    International Nuclear Information System (INIS)

    Britton, R.; Jackson, M.J.; Davies, A.V.

    2016-01-01

    A method for quantifying coincidence signatures has been extended to incorporate the effects of X–ray summing, and tested using a high–efficiency γ–γ system. An X–ray library has been created, allowing all possible γ, X–ray and conversion electron cascades to be generated. The equations for calculating efficiency and cascade summing corrected coincidence signature probabilities have also been extended from a two γ, two detector ‘special case’ to an arbitrarily large system. The coincidence library generated is fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and the half–life of the cascade, allowing the user to quickly identify coincidence signatures of interest. The method and software described is inherently flexible, as it only requires evaluated nuclear data, an X–ray library, and accurate efficiency characterisations to quickly and easily calculate coincidence signature probabilities for a variety of systems. Additional uses for the software include the fast identification of γ coincidence signals with required multiplicities and branching ratios, identification of the optimal coincidence signatures to measure for a particular system, and the calculation of cascade summing corrections for single detector systems. - Highlights: • Method for incorporating X-ray summing into coincidence measurements developed. • Calculation routines have been extended to an arbitrarily large detector system, and re-written to take advantage of multiple computing cores. • Data collected in list-mode with all events timestamped for offline coincidence analysis. • Coincidence analysis of environmental samples will dramatically improve the detection sensitivity achievable.

  12. Thermal imaging comparison of Signature, Infiniti, and Stellaris phacoemulsification systems.

    Science.gov (United States)

    Ryoo, Na Kyung; Kwon, Ji-Won; Wee, Won Ryang; Miller, Kevin M; Han, Young Keun

    2013-10-12

    To compare the heat production of 3 different phacoemulsification machines under strict laboratory test conditions. More specifically, the thermal behavior was analyzed between the torsional modality of the Infiniti system and longitudinal modalities of the Abbot WhiteStar Signature Phacoemulsification system and Bausch and Lomb Stellaris system. Experiments were performed under in-vitro conditions in this study.Three phacoemulsification handpieces (Infiniti, Signature, and Stellaris) were inserted into balanced salt solution-filled silicone test chambers and were imaged side-by-side by using a thermal camera. Incision compression was simulated by suspending 30.66-gram weights from the silicone chambers. The irrigation flow rate was set at 0, 1, 2, 3, 4, and 5 cc/min and the phacoemulsification power on the instrument consoles was set at 40, 60, 80, and 100%. The highest temperatures generated from each handpiece around the point of compression were measured at 0, 10, 30, and 60 seconds. Under the same displayed phacoemulsification power settings, the peak temperatures measured when using the Infiniti were lower than when using the other two machines, and the Signature was cooler than the Stellaris. At 10 seconds, torsional phacoemulsification with Infiniti at 100% power showed data comparable to that of the Signature at 80% and the Stellaris at 60%. At 30 seconds, the temperature from the Infiniti at 100% power was lower than the Signature at 60% and the Stellaris at 40%. Torsional phacoemulsification with the Infiniti generates less heat than longitudinal phacoemulsification with the Signature and the Stellaris. Lower operating temperatures indicate lower heat generation within the same fluid volume, which may provide additional thermal protection during cataract surgery.

  13. The dependence of cusp ion signatures on the reconnection rate

    Directory of Open Access Journals (Sweden)

    S. K. Morley

    2003-04-01

    Full Text Available The interpretation of structure in cusp ion dispersions is important for helping to understand the temporal and spatial structure of magnetopause reconnection. "Stepped" and "sawtooth" signatures have been shown to be caused by temporal variations in the reconnection rate under the same physical conditions for different satellite trajectories. The present paper shows that even for a single satellite path, a change in the amplitude of any reconnection pulses can alter the observed signature and even turn sawtooth into stepped forms and vice versa. On 20 August 1998, the Defense Meteorological Satellite Program (DMSP craft F-14 crossed the cusp just to the south of Longyearbyen, returning on the following orbit. The two passes by the DMSP F-14 satellites have very similar trajectories and the open-closed field line boundary (OCB crossings, as estimated from the SSJ/4 precipitating particle data and Polar UVI images, imply a similarly-shaped polar cap, yet the cusp ion dispersion signatures differ substantially. The cusp crossing at 08:54 UT displays a stepped ion dispersion previously considered to be typical of a meridional pass, whereas the crossing at 10:38 UT is a sawtooth form ion dispersion, previously considered typical of a satellite travelling longitudinally with respect to the OCB. It is shown that this change in dispersed ion signature is likely to be due to a change in the amplitude of the pulses in the reconnection rate, causing the stepped signature. Modelling of the low-energy ion cutoff under different conditions has reproduced the forms of signature observed.Key words. Ionosphere (particle precipitation Magnetospheric physics (energetic particles, precipitating, magnetopause, cusp and boundary layers

  14. Quark-gluon plasma: experimental signatures

    International Nuclear Information System (INIS)

    Drapier, O.

    1995-01-01

    The existence of a deconfining phase transition of nuclear matter is a clear prediction of lattice quantum chromodynamics calculations. The signatures of this quark-gluon plasma (QGP) have been searched for, since the first high energy ion beams became available at BNL and CERN in 1986, and gold and lead beams are now accelerated at 11 and 160 GeV per nucleon by the AGS and SPS. An overview of the main signatures expected in case of QGP formation is presented here. Although some recent results have been found in agreement with the predictions of the QGP scenario, no clear evidence for its formation has been observed at present. Nevertheless, new high statistics results are expected from CERN lead beams. In addition, future experiments are being prepared at RHIC and LHCC, providing an increase by two orders of magnitude of the c.m.s. energy within a few years. (author). 66 refs., 28 figs

  15. 76 FR 62000 - Express Mail Domestic Postage Refund Policy and Waiver of Signature

    Science.gov (United States)

    2011-10-06

    ... POSTAL SERVICE 39 CFR Part 111 Express Mail Domestic Postage Refund Policy and Waiver of Signature... days to 30 days after the date of mailing, and to change the Express Mail ``waiver of signature'' standard for domestic items by obtaining an addressee's signature only when the mailer selects the...

  16. Characterizing Resident Space Object Earthshine Signature Variability

    Science.gov (United States)

    Van Cor, Jared D.

    There are three major sources of illumination on objects in the near Earth space environment: Sunshine, Moonshine, and Earthshine. For objects in this environment (satellites, orbital debris, etc.) known as Resident Space Objects (RSOs), the sun and the moon have consistently small illuminating solid angles and can be treated as point sources; this makes their incident illumination easily modeled. The Earth on the other hand has a large illuminating solid angle, is heterogeneous, and is in a constant state of change. The objective of this thesis was to characterize the impact and variability of observed RSO Earthshine on apparent magnitude signatures in the visible optical spectral region. A key component of this research was creating Earth object models incorporating the reflectance properties of the Earth. Two Earth objects were created: a homogeneous diffuse Earth object and a time sensitive heterogeneous Earth object. The homogeneous diffuse Earth object has a reflectance equal to the average global albedo, a standard model used when modeling Earthshine. The time sensitive heterogeneous Earth object was created with two material maps representative of the dynamic reflectance of the surface of the earth, and a shell representative of the atmosphere. NASA's Moderate-resolution Imaging Spectroradiometer (MODIS) Earth observing satellite product libraries, MCD43C1 global surface BRDF map and MOD06 global fractional cloud map, were utilized to create the material maps, and a hybridized version of the Empirical Line Method (ELM) was used to create the atmosphere. This dynamic Earth object was validated by comparing simulated color imagery of the Earth to that taken by: NASAs Earth Polychromatic Imaging Camera (EPIC) located on the Deep Space Climate Observatory (DSCOVR), and by MODIS located on the Terra satellite. The time sensitive heterogeneous Earth object deviated from MODIS imagery by a spectral radiance root mean square error (RMSE) of +/-14.86 [watts/m. 2sr

  17. A Weak Quantum Blind Signature with Entanglement Permutation

    Science.gov (United States)

    Lou, Xiaoping; Chen, Zhigang; Guo, Ying

    2015-09-01

    Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

  18. Oxygen isotopic signature of CO2 from combustion processes

    Directory of Open Access Journals (Sweden)

    W. A. Brand

    2011-02-01

    Full Text Available For a comprehensive understanding of the global carbon cycle precise knowledge of all processes is necessary. Stable isotope (13C and 18O abundances provide information for the qualification and the quantification of the diverse source and sink processes. This study focuses on the δ18O signature of CO2 from combustion processes, which are widely present both naturally (wild fires, and human induced (fossil fuel combustion, biomass burning in the carbon cycle. All these combustion processes use atmospheric oxygen, of which the isotopic signature is assumed to be constant with time throughout the whole atmosphere. The combustion is generally presumed to take place at high temperatures, thus minimizing isotopic fractionation. Therefore it is generally supposed that the 18O signature of the produced CO2 is equal to that of the atmospheric oxygen. This study, however, reveals that the situation is much more complicated and that important fractionation effects do occur. From laboratory studies fractionation effects on the order of up to 26%permil; became obvious in the derived CO2 from combustion of different kinds of material, a clear differentiation of about 7‰ was also found in car exhausts which were sampled directly under ambient atmospheric conditions. We investigated a wide range of materials (both different raw materials and similar materials with different inherent 18O signature, sample geometries (e.g. texture and surface-volume ratios and combustion circumstances. We found that the main factor influencing the specific isotopic signatures of the combustion-derived CO2 and of the concomitantly released oxygen-containing side products, is the case-specific rate of combustion. This points firmly into the direction of (diffusive transport of oxygen to the reaction zone as the cause of the isotope fractionation. The original total 18O signature of the material appeared to have little influence, however, a contribution of specific bio

  19. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  20. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  1. Enhanced vibration diagnostics using vibration signature analysis

    International Nuclear Information System (INIS)

    Ahmed, S.; Shehzad, K.; Zahoor, Y.; Mahmood, A.; Bibi, A.

    2001-01-01

    Symptoms will appear in equipment, as well as in human beings. when 'suffering from sickness. Symptoms of abnormality in equipment are vibration, noise, deformation, temperature, pressure, electric current, crack, wearing, leakage etc. these are called modes of failure. If the mode of failure is vibration then the vibration signature analysis can be effectively used in order to diagnose the machinery problems. Much valuable information is contained within these vibration 'Spectra' or 'Signatures' but is only of use if the analyst can unlock its 'Secrets'. This paper documents a vibration problem in the motor of a centrifugal pump (Type ETA). It focuses mainly on the roll of modern vibration monitoring system in problem analysis. The problem experienced was the motor unstability and noise due to high vibration. Using enhanced vibration signature data, the problem was analyzed. which suggested that the rotor eccentricity was the cause of excessive noise and vibration in the motor. In conclusion, advanced electronic monitoring and diagnostic systems provide powerful information for machine's condition assessment and problem analysis. Appropriate interpretation and use of this information is important for accurate and effective vibration analysis. (author)

  2. Subsurface signatures and timing of extreme wave events along the ...

    Indian Academy of Sciences (India)

    The diagnostic event signatures include the extent and elevation of the deposits, as well as morphologic similarity ... Historical archives of the origin, timing, and impact of tsunamis, storms, and floods along the mar- gins of ... High-resolution GPR studies (by the IIT Madras group) of erosional signatures from the beach ridge.

  3. Genome-wide signatures of differential DNA methylation in pediatric acute lymphoblastic leukemia

    DEFF Research Database (Denmark)

    Nordlund, Jessica; Bäcklin, Christofer L; Wahlberg, Per

    2013-01-01

    BACKGROUND: Although aberrant DNA methylation has been observed previously in acute lymphoblastic leukemia (ALL), the patterns of differential methylation have not been comprehensively determined in all subtypes of ALL on a genome-wide scale. The relationship between DNA methylation, cytogenetic...... background, drug resistance and relapse in ALL is poorly understood. RESULTS: We surveyed the DNA methylation levels of 435,941 CpG sites in samples from 764 children at diagnosis of ALL and from 27 children at relapse. This survey uncovered four characteristic methylation signatures. First, compared...... cells at relapse, compared with matched samples at diagnosis. Analysis of relapse-free survival identified CpG sites with subtype-specific differential methylation that divided the patients into different risk groups, depending on their methylation status. CONCLUSIONS: Our results suggest an important...

  4. Patterns and variability in geochemical signatures and microbial activity within and between diverse cold seep habitats along the lower continental slope, Northern Gulf of Mexico

    Science.gov (United States)

    Bowles, Marshall; Hunter, Kimberley S.; Samarkin, Vladimir; Joye, Samantha

    2016-07-01

    We collected 69 sediment cores from distinct ecological and geological settings along the deep slope in the Northern Gulf of Mexico to evaluate whether specific geochemical- or habitat-related factors correlated with rates of microbial processes and geochemical signatures. By collecting replicate cores from distinct habitats across multiple sites, we illustrate and quantify the heterogeneity of cold seep geochemistry and microbial activity. These data also document the factors driving unique aspects of the geochemistry of deep slope gas, oil and brine seeps. Surprisingly little variation was observed between replicate (n=2-5) cores within sites for most analytes (except methane), implying that the common practice of collecting one core for geochemical analysis can capture the signature of a habitat in most cases. Depth-integrated concentrations of methane, dissolved inorganic carbon (DIC), and calcium were the predominant geochemical factors that correlated with a site's ecological or geological settings. Pore fluid methane concentration was related to the phosphate and DIC concentration, as well as to rates of sulfate reduction. While distinctions between seep habitats were identified from geochemical signatures, habitat specific geochemistry varied little across sites. The relative concentration of dissolved inorganic nitrogen versus phosphorus suggests that phosphorus availability limits biomass production at cold seeps. Correlations between calcium, chloride, and phosphate concentrations were indicative of brine-associated phosphate transport, suggesting that in addition to the co-migration of methane, dissolved organic carbon, and ammonium with brine, phosphate delivery is also associated with brine advection.

  5. Doppler Velocity Signatures of Idealized Elliptical Vortices

    Directory of Open Access Journals (Sweden)

    Wen-Chau Lee

    2006-01-01

    Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.

  6. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  7. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  8. A high-throughput pipeline for the design of real-time PCR signatures

    Directory of Open Access Journals (Sweden)

    Reifman Jaques

    2010-06-01

    Full Text Available Abstract Background Pathogen diagnostic assays based on polymerase chain reaction (PCR technology provide high sensitivity and specificity. However, the design of these diagnostic assays is computationally intensive, requiring high-throughput methods to identify unique PCR signatures in the presence of an ever increasing availability of sequenced genomes. Results We present the Tool for PCR Signature Identification (TOPSI, a high-performance computing pipeline for the design of PCR-based pathogen diagnostic assays. The TOPSI pipeline efficiently designs PCR signatures common to multiple bacterial genomes by obtaining the shared regions through pairwise alignments between the input genomes. TOPSI successfully designed PCR signatures common to 18 Staphylococcus aureus genomes in less than 14 hours using 98 cores on a high-performance computing system. Conclusions TOPSI is a computationally efficient, fully integrated tool for high-throughput design of PCR signatures common to multiple bacterial genomes. TOPSI is freely available for download at http://www.bhsai.org/downloads/topsi.tar.gz.

  9. Online Signature Verification using Recurrent Neural Network and Length-normalized Path Signature

    OpenAIRE

    Lai, Songxuan; Jin, Lianwen; Yang, Weixin

    2017-01-01

    Inspired by the great success of recurrent neural networks (RNNs) in sequential modeling, we introduce a novel RNN system to improve the performance of online signature verification. The training objective is to directly minimize intra-class variations and to push the distances between skilled forgeries and genuine samples above a given threshold. By back-propagating the training signals, our RNN network produced discriminative features with desired metrics. Additionally, we propose a novel d...

  10. Quantum Digital Signatures for Unconditional Safe Authenticity Protection of Medical Documentation

    Directory of Open Access Journals (Sweden)

    Arkadiusz Liber

    2015-12-01

    Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.

  11. The Temporal Signature of Memories: Identification of a General Mechanism for Dynamic Memory Replay in Humans

    Science.gov (United States)

    Michelmann, Sebastian; Bowman, Howard; Hanslmayr, Simon

    2016-01-01

    Reinstatement of dynamic memories requires the replay of neural patterns that unfold over time in a similar manner as during perception. However, little is known about the mechanisms that guide such a temporally structured replay in humans, because previous studies used either unsuitable methods or paradigms to address this question. Here, we overcome these limitations by developing a new analysis method to detect the replay of temporal patterns in a paradigm that requires participants to mentally replay short sound or video clips. We show that memory reinstatement is accompanied by a decrease of low-frequency (8 Hz) power, which carries a temporal phase signature of the replayed stimulus. These replay effects were evident in the visual as well as in the auditory domain and were localized to sensory-specific regions. These results suggest low-frequency phase to be a domain-general mechanism that orchestrates dynamic memory replay in humans. PMID:27494601

  12. Infrared signatures for remote sensing

    International Nuclear Information System (INIS)

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL's capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm -1 at 2 laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at ∼10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl 4 at 770--800 cm -1 . This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO 2 laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks

  13. Should fatty acid signature proportions sum to 1 for diet estimation?

    Science.gov (United States)

    Bromaghin, Jeffrey F.; Budge, Suzanne M.; Thiemann, Gregory W.

    2016-01-01

    Knowledge of predator diets, including how diets might change through time or differ among predators, provides essential insights into their ecology. Diet estimation therefore remains an active area of research within quantitative ecology. Quantitative fatty acid signature analysis (QFASA) is an increasingly common method of diet estimation. QFASA is based on a data library of prey signatures, which are vectors of proportions summarizing the fatty acid composition of lipids, and diet is estimated as the mixture of prey signatures that most closely approximates a predator’s signature. Diets are typically estimated using proportions from a subset of all fatty acids that are known to be solely or largely influenced by diet. Given the subset of fatty acids selected, the current practice is to scale their proportions to sum to 1.0. However, scaling signature proportions has the potential to distort the structural relationships within a prey library and between predators and prey. To investigate that possibility, we compared the practice of scaling proportions with two alternatives and found that the traditional scaling can meaningfully bias diet estimators under some conditions. Two aspects of the prey types that contributed to a predator’s diet influenced the magnitude of the bias: the degree to which the sums of unscaled proportions differed among prey types and the identifiability of prey types within the prey library. We caution investigators against the routine scaling of signature proportions in QFASA.

  14. 31 CFR 370.38 - What is the legal effect of an electronic signature?

    Science.gov (United States)

    2010-07-01

    ... electronic signature? 370.38 Section 370.38 Money and Finance: Treasury Regulations Relating to Money and... Requests Through the Bureau of the Public Debt § 370.38 What is the legal effect of an electronic signature? An electronic signature and any electronic message to which it is affixed or attached may not be...

  15. Electronic Signatures in Global and National Commerce Act. Public Law.

    Science.gov (United States)

    Congress of the U.S., Washington, DC.

    This document presents the text of Public Law 106-229, the "Electronic Signatures in Global and National Commerce Act." The act states that, with respect to any transaction in or affecting interstate or foreign commerce: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or…

  16. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation

    Science.gov (United States)

    2009-09-01

    Introduction This presentation summarizes recent activity in monitoring spacecraft health status using passive remote optical nonimaging ...Approved for public release; distribution is unlimited. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation...It is beneficial to the observer/analyst to understand the fundamental optical signature variability associated with these detection and

  17. Improved prognostic classification of breast cancer defined by antagonistic activation patterns of immune response pathway modules

    International Nuclear Information System (INIS)

    Teschendorff, Andrew E; Gomez, Sergio; Arenas, Alex; El-Ashry, Dorraya; Schmidt, Marcus; Gehrmann, Mathias; Caldas, Carlos

    2010-01-01

    Elucidating the activation pattern of molecular pathways across a given tumour type is a key challenge necessary for understanding the heterogeneity in clinical response and for developing novel more effective therapies. Gene expression signatures of molecular pathway activation derived from perturbation experiments in model systems as well as structural models of molecular interactions ('model signatures') constitute an important resource for estimating corresponding activation levels in tumours. However, relatively few strategies for estimating pathway activity from such model signatures exist and only few studies have used activation patterns of pathways to refine molecular classifications of cancer. Here we propose a novel network-based method for estimating pathway activation in tumours from model signatures. We find that although the pathway networks inferred from cancer expression data are highly consistent with the prior information contained in the model signatures, that they also exhibit a highly modular structure and that estimation of pathway activity is dependent on this modular structure. We apply our methodology to a panel of 438 estrogen receptor negative (ER-) and 785 estrogen receptor positive (ER+) breast cancers to infer activation patterns of important cancer related molecular pathways. We show that in ER negative basal and HER2+ breast cancer, gene expression modules reflecting T-cell helper-1 (Th1) and T-cell helper-2 (Th2) mediated immune responses play antagonistic roles as major risk factors for distant metastasis. Using Boolean interaction Cox-regression models to identify non-linear pathway combinations associated with clinical outcome, we show that simultaneous high activation of Th1 and low activation of a TGF-beta pathway module defines a subtype of particularly good prognosis and that this classification provides a better prognostic model than those based on the individual pathways. In ER+ breast cancer, we find that

  18. Source signature estimation from multimode surface waves via mode-separated virtual real source method

    Science.gov (United States)

    Gao, Lingli; Pan, Yudi

    2018-05-01

    The correct estimation of the seismic source signature is crucial to exploration geophysics. Based on seismic interferometry, the virtual real source (VRS) method provides a model-independent way for source signature estimation. However, when encountering multimode surface waves, which are commonly seen in the shallow seismic survey, strong spurious events appear in seismic interferometric results. These spurious events introduce errors in the virtual-source recordings and reduce the accuracy of the source signature estimated by the VRS method. In order to estimate a correct source signature from multimode surface waves, we propose a mode-separated VRS method. In this method, multimode surface waves are mode separated before seismic interferometry. Virtual-source recordings are then obtained by applying seismic interferometry to each mode individually. Therefore, artefacts caused by cross-mode correlation are excluded in the virtual-source recordings and the estimated source signatures. A synthetic example showed that a correct source signature can be estimated with the proposed method, while strong spurious oscillation occurs in the estimated source signature if we do not apply mode separation first. We also applied the proposed method to a field example, which verified its validity and effectiveness in estimating seismic source signature from shallow seismic shot gathers containing multimode surface waves.

  19. Numerical Predictions of Sonic Boom Signatures for a Straight Line Segmented Leading Edge Model

    Science.gov (United States)

    Elmiligui, Alaa A.; Wilcox, Floyd J.; Cliff, Susan; Thomas, Scott

    2012-01-01

    A sonic boom wind tunnel test was conducted on a straight-line segmented leading edge (SLSLE) model in the NASA Langley 4- by 4- Foot Unitary Plan Wind Tunnel (UPWT). The purpose of the test was to determine whether accurate sonic boom measurements could be obtained while continuously moving the SLSLE model past a conical pressure probe. Sonic boom signatures were also obtained using the conventional move-pause data acquisition method for comparison. The continuous data acquisition approach allows for accurate signatures approximately 15 times faster than a move-pause technique. These successful results provide an incentive for future testing with greatly increased efficiency using the continuous model translation technique with the single probe to measure sonic boom signatures. Two widely used NASA codes, USM3D (Navier-Stokes) and CART3D-AERO (Euler, adjoint-based adaptive mesh), were used to compute off-body sonic boom pressure signatures of the SLSLE model at several different altitudes below the model at Mach 2.0. The computed pressure signatures compared well with wind tunnel data. The effect of the different altitude for signature extraction was evaluated by extrapolating the near field signatures to the ground and comparing pressure signatures and sonic boom loudness levels.

  20. SiDIVS: Simple Detection of Inductive Vehicle Signatures with a Multiplex Resonant Sensor

    Directory of Open Access Journals (Sweden)

    José J. Lamas-Seco

    2016-08-01

    Full Text Available This work provides a system capable of obtaining simultaneous inductive signatures of vehicles traveling on a roadway with minimal cost. Based on Time-Division Multiplexing (TDM with multiple oscillators, one for each inductive loop, the proposed system detects the presence of vehicles by means of a shift in the oscillation period of the selected loop and registers the signature of the detected vehicles by measuring the duration of a fixed number of oscillator pulses. In order to test the system in an actual environment, we implement a prototype that we denote as SiDIVS (Simple Detection of Inductive Vehicle Signatures and acquire different vehicle inductive signatures under real scenarios. We also test the robustness of the detector by simulating the effect of noise on the signature acquisition.

  1. "With Grace under Pressure": How Critique as Signature Pedagogy Fosters Effective Music Performance

    Science.gov (United States)

    Hastings, David M.

    2017-01-01

    Inspired by seminal writings on Critique as Signature Pedagogy in the Arts and performance as Signature Pedagogy in Music, this article unifies these two concepts into a study of how critique as signature pedagogy in music-performance promotes student learning. This essay seeks to first define the notion of different mindsets as musicians perform…

  2. Metal enrichment signatures of the first stars on high-z DLAs

    Science.gov (United States)

    Ma, Q.; Maio, U.; Ciardi, B.; Salvaterra, R.

    2017-12-01

    We use numerical N-body hydrodynamical simulations with varying PopIII stellar models to investigate the possibility of detecting first star signatures with observations of high-redshift damped Lyα absorbers (DLAs). The simulations include atomic and molecular cooling, star formation, energy feedback and metal spreading due to the evolution of stars with a range of masses and metallicities. Different initial mass functions (IMFs) and corresponding metal-dependent yields and lifetimes are adopted to model primordial stellar populations. The DLAs in the simulations are selected according to either the local gas temperature (temperature selected) or the host mass (mass selected). We find that 3 per cent (40 per cent) of mass (temperature)-selected high-z (z ≥ 5.5) DLAs retain signatures of pollution from PopIII stars, independent of the first star model. Such DLAs have low halo mass ( Z⊙) and star formation rate ( generation and to constrain the first star mass ranges. Comparing the abundance ratios derived from our simulations to those observed in DLAs at z ≥ 5, we find that most of these DLAs are consistent within errors with PopII star dominated enrichment and strongly disfavour the pollution pattern of very massive first stars (i.e. 100-500 M⊙). However, some of them could still result from the pollution of first stars in the mass range [0.1, 100] M⊙. In particular, we find that the abundance ratios from SDSS J1202+3235 are consistent with those expected from PopIII enrichment dominated by massive (but not extreme) first stars.

  3. CRC-113 gene expression signature for predicting prognosis in patients with colorectal cancer.

    Science.gov (United States)

    Nguyen, Minh Nam; Choi, Tae Gyu; Nguyen, Dinh Truong; Kim, Jin-Hwan; Jo, Yong Hwa; Shahid, Muhammad; Akter, Salima; Aryal, Saurav Nath; Yoo, Ji Youn; Ahn, Yong-Joo; Cho, Kyoung Min; Lee, Ju-Seog; Choe, Wonchae; Kang, Insug; Ha, Joohun; Kim, Sung Soo

    2015-10-13

    Colorectal cancer (CRC) is the third leading cause of global cancer mortality. Recent studies have proposed several gene signatures to predict CRC prognosis, but none of those have proven reliable for predicting prognosis in clinical practice yet due to poor reproducibility and molecular heterogeneity. Here, we have established a prognostic signature of 113 probe sets (CRC-113) that include potential biomarkers and reflect the biological and clinical characteristics. Robustness and accuracy were significantly validated in external data sets from 19 centers in five countries. In multivariate analysis, CRC-113 gene signature showed a stronger prognostic value for survival and disease recurrence in CRC patients than current clinicopathological risk factors and molecular alterations. We also demonstrated that the CRC-113 gene signature reflected both genetic and epigenetic molecular heterogeneity in CRC patients. Furthermore, incorporation of the CRC-113 gene signature into a clinical context and molecular markers further refined the selection of the CRC patients who might benefit from postoperative chemotherapy. Conclusively, CRC-113 gene signature provides new possibilities for improving prognostic models and personalized therapeutic strategies.

  4. Electronic signature for medical documents--integration and evaluation of a public key infrastructure in hospitals.

    Science.gov (United States)

    Brandner, R; van der Haak, M; Hartmann, M; Haux, R; Schmücker, P

    2002-01-01

    Our objectives were to determine the user-oriented and legal requirements for a Public Key Infrastructure (PKI) for electronic signatures for medical documents, and to translate these requirements into a general model for a signature system. A prototype of this model was then implemented and evaluated in clinical routine use. Analyses of documents, processes, interviews, observations, and of the available literature supplied the foundations for the development of the signature system model. Eight participants of the Department of Dermatology of the Heidelberg University Medical Center evaluated the implemented prototype from December 2000 to January 2001, during the course of an intervention study. By means of questionnaires, interviews, observations and database analyses, the usefulness and user acceptance of the electronic signature and its integration into electronic discharge letters were established. Since the major part of medical documents generated in a hospital are signature-relevant, they will require electronic signatures in the future. A PKI must meet the multitude of responsibilities and security needs required in a hospital. Also, the signature functionality must be integrated directly into the workflow surrounding document creation. A developed signature model, fulfilling user-oriented and legal requirements, was implemented using hard and software components that conform to the German Signature Law. It was integrated into the existing hospital information system of the Heidelberg University Medical Center. At the end of the intervention study, the average acceptance scores achieved were mean = 3.90; SD = 0.42 on a scale of 1 (very negative attitude) to 5 (very positive attitude) for the electronic signature procedure. Acceptance of the integration into computer-supported discharge letter writing reached mean = 3.91; SD = 0.47. On average, the discharge letters were completed 7.18 days earlier. The electronic signature is indispensable for the

  5. Multivariant analyses of trace element patterns for environmental tracking

    International Nuclear Information System (INIS)

    Jervis, R.E.; Ko, M.M.C.; Junliang Tian; Puling Liu

    1993-01-01

    Nuclear-based analytical techniques: INAA, PIXE and photon activation permit simultaneous multielemental determination of concentrations in environmental materials, which data are often found sufficiently precise and free of uncontrolled, random errors among the various elements such that the data sets can yield valuable information on elemental communality through multi-variant statistical 'factor' analysis. Characteristic factor patterns obtained in this way can provide clues to the likely sources in the environment of various components. Recent studies in three different environmental situations: solid waste incinerators , Chinese soils, and iron and steel industry, involving measurements of 30-35 elements, have yielded distinct elemental patterns or, environmental signatures, with factor loading coefficients ranging mostly in the ranges: 0.7-0.96. (author) 10 refs.; 2 figs.; 9 tabs

  6. Cosmological transitions with changes in the signature of the metric

    International Nuclear Information System (INIS)

    Sakharov, A.D.

    1984-01-01

    It is conjectured that there exist states of the physical continuum which include regions with different signatures of the metric and that the observed Universe and an infinite number of other Universes arose as a result of quantum transitions with a change in the signature of the metric. The Lagrangian in such a theory must satisfy conditions of non-negativity in the regions with even signature. Signature here means the number of time coordinates. The induced gravitational Lagrangian in a conformally invariant theory of Kaluza-Klein type evidently satisfies this requirement and leads to effective equations of the gravitational theory of macroscopic space identical to the equations of the general theory of relativity. It is suggested that in our Universe there exist in addition to the observable (macroscopic) time dimension two or some other even number of compactified time dimensions. It is suggested that the formation of a Euclidean region in the center of a black hole or in the cosmological contraction of the Universe (if it is predetermined by the dynamics) is a possible outcome of gravitational collapse

  7. Xenon adsorption on geological media and implications for radionuclide signatures.

    Science.gov (United States)

    Paul, M J; Biegalski, S R; Haas, D A; Jiang, H; Daigle, H; Lowrey, J D

    2018-07-01

    The detection of radioactive noble gases is a primary technology for verifying compliance with the pending Comprehensive Nuclear-Test-Ban Treaty. A fundamental challenge in applying this technology for detecting underground nuclear explosions is estimating the timing and magnitude of the radionuclide signatures. While the primary mechanism for transport is advective transport, either through barometric pumping or thermally driven advection, diffusive transport in the surrounding matrix also plays a secondary role. From the study of primordial noble gas signatures, it is known that xenon has a strong physical adsorption affinity in shale formations. Given the unselective nature of physical adsorption, isotherm measurements reported here show that non-trivial amounts of xenon adsorb on a variety of media, in addition to shale. A dual-porosity model is then discussed demonstrating that sorption amplifies the diffusive uptake of an adsorbing matrix from a fracture. This effect may reduce the radioxenon signature down to approximately one-tenth, similar to primordial xenon isotopic signatures. Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. Simple model of variation of the signature of a space-time metric

    International Nuclear Information System (INIS)

    Konstantinov, M.Yu.

    2004-01-01

    The problem on the changes in the space-time signature metrics is discussed. The simple model, wherein the space-time metrics signature is determined by the nonlinear scalar field, is proposed. It is shown that both classical and quantum description of changes in the metrics signature is possible within the frames of the considered model; the most characteristic peculiarities and variations of the classical and quantum descriptions are also briefly noted [ru

  9. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    OpenAIRE

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were gua...

  10. Full control and manipulation of heat signatures: cloaking, camouflage and thermal metamaterials.

    Science.gov (United States)

    Han, Tiancheng; Bai, Xue; Thong, John T L; Li, Baowen; Qiu, Cheng-Wei

    2014-03-19

    Thermal camouflage and cloaking can transform an actual heat signature into a pre-controlled one. A viable recipe for controlling and manipulating heat signatures using thermal metamaterials to empower cloaking and camouflage in heat conduction is demonstrated. The thermal signature of the object is thus metamorphosed and perceived as multiple targets with different geometries and compositions, with the original object cloaked. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Brain signature characterizing the body-brain-mind axis of transsexuals.

    Directory of Open Access Journals (Sweden)

    Hsiao-Lun Ku

    Full Text Available Individuals with gender identity disorder (GID, who are commonly referred to as transsexuals (TXs, are afflicted by negative psychosocial stressors. Central to the psychological complex of TXs is the conviction of belonging to the opposite sex. Neuroanatomical and functional brain imaging studies have demonstrated that the GID is associated with brain alterations. In this study, we found that TXs identify, when viewing male-female couples in erotic or non-erotic ("neutral" interactions, with the couple member of the desired gender in both situations. By means of functional magnetic resonance imaging, we found that the TXs, as opposed to controls (CONs, displayed an increased functional connectivity between the ventral tegmental area, which is associated with dimorphic genital representation, and anterior cingulate cortex subregions, which play a key role in social exclusion, conflict monitoring and punishment adjustment. The neural connectivity pattern suggests a brain signature of the psychosocial distress for the gender-sex incongruity of TXs.

  12. Molecular signatures from omics data: from chaos to consensus.

    Science.gov (United States)

    Sung, Jaeyun; Wang, Yuliang; Chandrasekaran, Sriram; Witten, Daniela M; Price, Nathan D

    2012-08-01

    In the past 15 years, new "omics" technologies have made it possible to obtain high-resolution molecular snapshots of organisms, tissues, and even individual cells at various disease states and experimental conditions. It is hoped that these developments will usher in a new era of personalized medicine in which an individual's molecular measurements are used to diagnose disease, guide therapy, and perform other tasks more accurately and effectively than is possible using standard approaches. There now exists a vast literature of reported "molecular signatures". However, despite some notable exceptions, many of these signatures have suffered from limited reproducibility in independent datasets, insufficient sensitivity or specificity to meet clinical needs, or other challenges. In this paper, we discuss the process of molecular signature discovery on the basis of omics data. In particular, we highlight potential pitfalls in the discovery process, as well as strategies that can be used to increase the odds of successful discovery. Despite the difficulties that have plagued the field of molecular signature discovery, we remain optimistic about the potential to harness the vast amounts of available omics data in order to substantially impact clinical practice. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Gene Expression Signature in Endemic Osteoarthritis by Microarray Analysis

    Directory of Open Access Journals (Sweden)

    Xi Wang

    2015-05-01

    Full Text Available Kashin-Beck Disease (KBD is an endemic osteochondropathy with an unknown pathogenesis. Diagnosis of KBD is effective only in advanced cases, which eliminates the possibility of early treatment and leads to an inevitable exacerbation of symptoms. Therefore, we aim to identify an accurate blood-based gene signature for the detection of KBD. Previously published gene expression profile data on cartilage and peripheral blood mononuclear cells (PBMCs from adults with KBD were compared to select potential target genes. Microarray analysis was conducted to evaluate the expression of the target genes in a cohort of 100 KBD patients and 100 healthy controls. A gene expression signature was identified using a training set, which was subsequently validated using an independent test set with a minimum redundancy maximum relevance (mRMR algorithm and support vector machine (SVM algorithm. Fifty unique genes were differentially expressed between KBD patients and healthy controls. A 20-gene signature was identified that distinguished between KBD patients and controls with 90% accuracy, 85% sensitivity, and 95% specificity. This study identified a 20-gene signature that accurately distinguishes between patients with KBD and controls using peripheral blood samples. These results promote the further development of blood-based genetic biomarkers for detection of KBD.

  14. Signature gene expression reveals novel clues to the molecular mechanisms of dimorphic transition in Penicillium marneffei.

    Directory of Open Access Journals (Sweden)

    Ence Yang

    2014-10-01

    Full Text Available Systemic dimorphic fungi cause more than one million new infections each year, ranking them among the significant public health challenges currently encountered. Penicillium marneffei is a systemic dimorphic fungus endemic to Southeast Asia. The temperature-dependent dimorphic phase transition between mycelium and yeast is considered crucial for the pathogenicity and transmission of P. marneffei, but the underlying mechanisms are still poorly understood. Here, we re-sequenced P. marneffei strain PM1 using multiple sequencing platforms and assembled the genome using hybrid genome assembly. We determined gene expression levels using RNA sequencing at the mycelial and yeast phases of P. marneffei, as well as during phase transition. We classified 2,718 genes with variable expression across conditions into 14 distinct groups, each marked by a signature expression pattern implicated at a certain stage in the dimorphic life cycle. Genes with the same expression patterns tend to be clustered together on the genome, suggesting orchestrated regulations of the transcriptional activities of neighboring genes. Using qRT-PCR, we validated expression levels of all genes in one of clusters highly expressed during the yeast-to-mycelium transition. These included madsA, a gene encoding MADS-box transcription factor whose gene family is exclusively expanded in P. marneffei. Over-expression of madsA drove P. marneffei to undergo mycelial growth at 37°C, a condition that restricts the wild-type in the yeast phase. Furthermore, analyses of signature expression patterns suggested diverse roles of secreted proteins at different developmental stages and the potential importance of non-coding RNAs in mycelium-to-yeast transition. We also showed that RNA structural transition in response to temperature changes may be related to the control of thermal dimorphism. Together, our findings have revealed multiple molecular mechanisms that may underlie the dimorphic transition

  15. Prognostic Biomarker Identification Through Integrating the Gene Signatures of Hepatocellular Carcinoma Properties

    Directory of Open Access Journals (Sweden)

    Jialin Cai

    2017-05-01

    Full Text Available Many molecular classification and prognostic gene signatures for hepatocellular carcinoma (HCC patients have been established based on genome-wide gene expression profiling; however, their generalizability is unclear. Herein, we systematically assessed the prognostic effects of these gene signatures and identified valuable prognostic biomarkers by integrating these gene signatures. With two independent HCC datasets (GSE14520, N = 242 and GSE54236, N = 78, 30 published gene signatures were evaluated, and 11 were significantly associated with the overall survival (OS of postoperative HCC patients in both datasets. The random survival forest models suggested that the gene signatures were superior to clinical characteristics for predicting the prognosis of the patients. Based on the 11 gene signatures, a functional protein-protein interaction (PPI network with 1406 nodes and 10,135 edges was established. With tissue microarrays of HCC patients (N = 60, we determined the prognostic values of the core genes in the network and found that RAD21, CDK1, and HDAC2 expression levels were negatively associated with OS for HCC patients. The multivariate Cox regression analyses suggested that CDK1 was an independent prognostic factor, which was validated in an independent case cohort (N = 78. In cellular models, inhibition of CDK1 by siRNA or a specific inhibitor, RO-3306, reduced cellular proliferation and viability for HCC cells. These results suggest that the prognostic predictive capacities of these gene signatures are reproducible and that CDK1 is a potential prognostic biomarker or therapeutic target for HCC patients.

  16. 38 CFR 3.2130 - Will VA accept a signature by mark or thumbprint?

    Science.gov (United States)

    2010-07-01

    ... signature by mark or thumbprint? 3.2130 Section 3.2130 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... of This Title General § 3.2130 Will VA accept a signature by mark or thumbprint? VA will accept signatures by mark or thumbprint if: (a) They are witnessed by two people who sign their names and give their...

  17. Effects of Hearing Protection Device Attenuation on Unmanned Aerial Vehicle (UAV) Audio Signatures

    Science.gov (United States)

    2016-03-01

    UAV ) Audio Signatures by Melissa Bezandry, Adrienne Raglin, and John Noble Approved for public release; distribution...Research Laboratory Effects of Hearing Protection Device Attenuation on Unmanned Aerial Vehicle ( UAV ) Audio Signatures by Melissa Bezandry...Aerial Vehicle ( UAV ) Audio Signatures 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Melissa Bezandry

  18. S-Denying of the Signature Conditions Expands General Relativity's Space

    Directory of Open Access Journals (Sweden)

    Rabounski D.

    2006-07-01

    Full Text Available We apply the S-denying procedure to signature conditions in a four-dimensional pseudo-Riemannian space — i. e. we change one (or even all of the conditions to be partially true and partially false. We obtain five kinds of expanded space-time for General Relativity. Kind I permits the space-time to be in collapse. Kind II permits the space-time to change its own signature. Kind III has peculiarities, linked to the third signature condition. Kind IV permits regions where the metric fully degenerates: there may be non-quantum teleportation, and a home for virtual photons. Kind V is common for kinds I, II, III, and IV.

  19. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2012-01-01

    At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...

  20. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  1. A simple but highly effective approach to evaluate the prognostic performance of gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Maud H W Starmans

    Full Text Available BACKGROUND: Highly parallel analysis of gene expression has recently been used to identify gene sets or 'signatures' to improve patient diagnosis and risk stratification. Once a signature is generated, traditional statistical testing is used to evaluate its prognostic performance. However, due to the dimensionality of microarrays, this can lead to false interpretation of these signatures. PRINCIPAL FINDINGS: A method was developed to test batches of a user-specified number of randomly chosen signatures in patient microarray datasets. The percentage of random generated signatures yielding prognostic value was assessed using ROC analysis by calculating the area under the curve (AUC in six public available cancer patient microarray datasets. We found that a signature consisting of randomly selected genes has an average 10% chance of reaching significance when assessed in a single dataset, but can range from 1% to ∼40% depending on the dataset in question. Increasing the number of validation datasets markedly reduces this number. CONCLUSIONS: We have shown that the use of an arbitrary cut-off value for evaluation of signature significance is not suitable for this type of research, but should be defined for each dataset separately. Our method can be used to establish and evaluate signature performance of any derived gene signature in a dataset by comparing its performance to thousands of randomly generated signatures. It will be of most interest for cases where few data are available and testing in multiple datasets is limited.

  2. Epigenetic signature of birth weight discordance in adult twins

    DEFF Research Database (Denmark)

    Tan, Qihua; Nielsen, Morten Frost Munk; Heijmans, Bastiaan T

    2014-01-01

    between birth weight and adult life health while controlling for not only genetics but also postnatal rearing environment. We performed an epigenome-wide profiling on blood samples from 150 pairs of adult monozygotic twins discordant for birth weight to look for molecular evidence of epigenetic signatures...... profiling did not reveal epigenetic signatures of birth weight discordance although some sites displayed age-dependent intra-pair differential methylation in the extremely discordant twin pairs....

  3. Effects of sample size on robustness and prediction accuracy of a prognostic gene signature

    Directory of Open Access Journals (Sweden)

    Kim Seon-Young

    2009-05-01

    Full Text Available Abstract Background Few overlap between independently developed gene signatures and poor inter-study applicability of gene signatures are two of major concerns raised in the development of microarray-based prognostic gene signatures. One recent study suggested that thousands of samples are needed to generate a robust prognostic gene signature. Results A data set of 1,372 samples was generated by combining eight breast cancer gene expression data sets produced using the same microarray platform and, using the data set, effects of varying samples sizes on a few performances of a prognostic gene signature were investigated. The overlap between independently developed gene signatures was increased linearly with more samples, attaining an average overlap of 16.56% with 600 samples. The concordance between predicted outcomes by different gene signatures also was increased with more samples up to 94.61% with 300 samples. The accuracy of outcome prediction also increased with more samples. Finally, analysis using only Estrogen Receptor-positive (ER+ patients attained higher prediction accuracy than using both patients, suggesting that sub-type specific analysis can lead to the development of better prognostic gene signatures Conclusion Increasing sample sizes generated a gene signature with better stability, better concordance in outcome prediction, and better prediction accuracy. However, the degree of performance improvement by the increased sample size was different between the degree of overlap and the degree of concordance in outcome prediction, suggesting that the sample size required for a study should be determined according to the specific aims of the study.

  4. Modeling the Thermal Signature of Natural Backgrounds

    National Research Council Canada - National Science Library

    Gamborg, Marius

    2002-01-01

    Two measuring stations have been established the purpose being to collect comprehensive databases of thermal signatures of background elements in addition to the prevailing meteorological conditions...

  5. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2012-12-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  6. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2013-02-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  7. Sex hormones and gene expression signatures in peripheral blood from postmenopausal women - the NOWAC postgenome study

    Directory of Open Access Journals (Sweden)

    Rylander Charlotta

    2011-03-01

    Full Text Available Abstract Background Postmenopausal hormone therapy (HT influences endogenous hormone concentrations and increases the risk of breast cancer. Gene expression profiling may reveal the mechanisms behind this relationship. Our objective was to explore potential associations between sex hormones and gene expression in whole blood from a population-based, random sample of postmenopausal women Methods Gene expression, as measured by the Applied Biosystems microarray platform, was compared between hormone therapy (HT users and non-users and between high and low hormone plasma concentrations using both gene-wise analysis and gene set analysis. Gene sets found to be associated with HT use were further analysed for enrichment in functional clusters and network predictions. The gene expression matrix included 285 samples and 16185 probes and was adjusted for significant technical variables. Results Gene-wise analysis revealed several genes significantly associated with different types of HT use. The functional cluster analyses provided limited information on these genes. Gene set analysis revealed 22 gene sets that were enriched between high and low estradiol concentration (HT-users excluded. Among these were seven oestrogen related gene sets, including our gene list associated with systemic estradiol use, which thereby represents a novel oestrogen signature. Seven gene sets were related to immune response. Among the 15 gene sets enriched for progesterone, 11 overlapped with estradiol. No significant gene expression patterns were found for testosterone, follicle stimulating hormone (FSH or sex hormone binding globulin (SHBG. Conclusions Distinct gene expression patterns associated with sex hormones are detectable in a random group of postmenopausal women, as demonstrated by the finding of a novel oestrogen signature.

  8. Genetic signatures in choline and 1-carbon metabolism are associated with the severity of hepatic steatosis

    Science.gov (United States)

    Corbin, Karen D.; Abdelmalek, Manal F.; Spencer, Melanie D.; da Costa, Kerry-Ann; Galanko, Joseph A.; Sha, Wei; Suzuki, Ayako; Guy, Cynthia D.; Cardona, Diana M.; Torquati, Alfonso; Diehl, Anna Mae; Zeisel, Steven H.

    2013-01-01

    Choline metabolism is important for very low-density lipoprotein secretion, making this nutritional pathway an important contributor to hepatic lipid balance. The purpose of this study was to assess whether the cumulative effects of multiple single nucleotide polymorphisms (SNPs) across genes of choline/1-carbon metabolism and functionally related pathways increase susceptibility to developing hepatic steatosis. In biopsy-characterized cases of nonalcoholic fatty liver disease and controls, we assessed 260 SNPs across 21 genes in choline/1-carbon metabolism. When SNPs were examined individually, using logistic regression, we only identified a single SNP (PNPLA3 rs738409) that was significantly associated with severity of hepatic steatosis after adjusting for confounders and multiple comparisons (P=0.02). However, when groupings of SNPs in similar metabolic pathways were defined using unsupervised hierarchical clustering, we identified groups of subjects with shared SNP signatures that were significantly correlated with steatosis burden (P=0.0002). The lowest and highest steatosis clusters could also be differentiated by ethnicity. However, unique SNP patterns defined steatosis burden irrespective of ethnicity. Our results suggest that analysis of SNP patterns in genes of choline/1-carbon metabolism may be useful for prediction of severity of steatosis in specific subsets of people, and the metabolic inefficiencies caused by these SNPs should be examined further.—Corbin, K. D., Abdelmalek, M. F., Spencer, M. D., da Costa, K.-A., Galanko, J. A., Sha, W., Suzuki, A., Guy, C. D., Cardona, D. M., Torquati, A., Diehl, A. M., Zeisel, S. H. Genetic signatures in choline and 1-carbon metabolism are associated with the severity of hepatic steatosis. PMID:23292069

  9. A Method for Automatic Inspection of Printed Circuit Boards by Using the Thermal Signature

    International Nuclear Information System (INIS)

    Amer, H.H.; Zekry, A.A.; Elaraby, S.; Ghareeb, K.E.

    2012-01-01

    This paper aims to design a system for automating inspection of the printed circuit boards (PCBs) by using the thermal signature of the different integrated circuits (I.C). The proposed inspection system consists of the inspection circuit, data acquisition system (DAS) and personal computer. Inspection is done by comparing the thermal signature of normally operated circuit with the thermal signature of circuit under test. One thermistor is assigned to each component in the circuit. The thermistor must touch tightly the surface of the I.C. to sense its temperature during the inspection process. Matlab software is used to represent the thermal signature through different colors. The Turbo C software is used to develop a program for acquiring and comparing the thermal signature of the circuit under the test with the reference circuit. If the colors of the two thermal signatures for the same I.C. are same then the circuit under test is fault free and does not contain any defect. On the other side, if the colors of the two thermal signatures for the same I.C. are different then the circuit under test is defective

  10. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  11. Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation

    Science.gov (United States)

    Shi, Ronghua; Ding, Wanting; Shi, Jinjing

    2018-03-01

    A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.

  12. Trans-Planckian physics and signature change events in Bose gas hydrodynamics

    International Nuclear Information System (INIS)

    Weinfurtner, Silke; White, Angela; Visser, Matt

    2007-01-01

    We present an example of emergent spacetime as the hydrodynamic limit of a more fundamental microscopic theory. The low-energy, long-wavelength limit in our model is dominated by collective variables that generate an effective Lorentzian metric. This system naturally exhibits a microscopic mechanism allowing us to perform controlled signature change between Lorentzian and Riemannian geometries. We calculate the number of quasiparticles produced from a finite-duration Euclidean-signature event, where we take the position that to a good approximation the dynamics is dominated by the evolution of the linearized perturbations, as suggested by Calzetta and Hu [Phys. Rev. A 68, 043625 (2003)]. We adapt the ideas presented by Dray et al. [Gen. Relativ. Gravit. 23, 967 (1991)], such that the field and its canonical momentum are continuous at the signature-change event. We investigate the interplay between the underlying microscopic structure and the emergent gravitational field, focussing on its impact on quasiparticle production in the ultraviolet regime. In general, this can be thought of as the combination of trans-Planckian physics and signature-change physics. Further we investigate the possibility of using the proposed signature-change event as an amplifier for analogue 'cosmological particle production' in condensed matter experiments

  13. Petroleum Pumps’ Current and Vibration Signatures Analysis Using Wavelet Coherence Technique

    Directory of Open Access Journals (Sweden)

    Rmdan Shnibha

    2013-01-01

    Full Text Available Vibration analysis is widely used for rotating machinery diagnostics; however measuring vibration of operational oil well pumps is not possible. The pump’s driver’s current signatures may provide condition-related information without the need for an access to the pump itself. This paper investigates the degree of relationship between the pump’s driver’s current signatures and its induced vibration. This relationship between the driver’s current signatures (DCS and its vibration signatures (DVS is studied by calculating magnitude-squared coherence and phase coherence parameters at a certain frequency band using continuous wavelet transform (CWT. The CWT coherence-based technique allows better analysis of temporal evolution of the frequency content of dynamic signals and areas in the time-frequency plane where the two signals exhibit common power or consistent phase behaviour indicating a relationship between the signals. This novel approach is validated by experimental data acquired from 3 kW petroleum pump’s driver. Both vibration and current signatures were acquired under different speed and load conditions. The outcomes of this research suggest the use of DCS analysis as reliable and inexpensive condition monitoring tool, which could be implemented for oil pumps, real-time monitoring associated with condition-based maintenance (CBM program.

  14. Functional Significance of Labellum Pattern Variation in a Sexually Deceptive Orchid (Ophrys heldreichii: Evidence of Individual Signature Learning Effects.

    Directory of Open Access Journals (Sweden)

    Kerstin Stejskal

    Full Text Available Mimicking female insects to attract male pollinators is an important strategy in sexually deceptive orchids of the genus Ophrys, and some species possess flowers with conspicuous labellum patterns. The function of the variation of the patterns remains unresolved, with suggestions that these enhance pollinator communication. We investigated the possible function of the labellum pattern in Ophrys heldreichii, an orchid species in which the conspicuous and complex labellum pattern contrasts with a dark background. The orchid is pollinated exclusively by males of the solitary bee, Eucera berlandi. Comparisons of labellum patterns revealed that patterns within inflorescences are more similar than those of other conspecific plants. Field observations showed that the males approach at a great speed and directly land on flowers, but after an unsuccessful copulation attempt, bees hover close and visually scan the labellum pattern for up to a minute. Learning experiments conducted with honeybees as an accessible model of bee vision demonstrated that labellum patterns of different plants can be reliably learnt; in contrast, patterns of flowers from the same inflorescence could not be discriminated. These results support the hypothesis that variable labellum patterns in O. heldreichii are involved in flower-pollinator communication which would likely help these plants to avoid geitonogamy.

  15. Linking the Molecular Signature of Heteroatomic Dissolved Organic Matter to Watershed Characteristics in World Rivers.

    Science.gov (United States)

    Wagner, Sasha; Riedel, Thomas; Niggemann, Jutta; Vähätalo, Anssi V; Dittmar, Thorsten; Jaffé, Rudolf

    2015-12-01

    Large world rivers are significant sources of dissolved organic matter (DOM) to the oceans. Watershed geomorphology and land use can drive the quality and reactivity of DOM. Determining the molecular composition of riverine DOM is essential for understanding its source, mobility and fate across landscapes. In this study, DOM from the main stem of 10 global rivers covering a wide climatic range and land use features was molecularly characterized via ultrahigh-resolution Fourier-transform ion cyclotron resonance mass spectrometry (FT-ICR-MS). FT-ICR mass spectral data revealed an overall similarity in molecular components among the rivers. However, when focusing specifically on the contribution of nonoxygen heteroatomic molecular formulas (CHON, CHOS, CHOP, etc.) to the bulk molecular signature, patterns relating DOM composition and watershed land use became apparent. Greater abundances of N- and S-containing molecular formulas were identified as unique to rivers influenced by anthropogenic inputs, whereas rivers with primarily forested watersheds had DOM signatures relatively depleted in heteroatomic content. A strong correlation between cropland cover and dissolved black nitrogen was established when focusing specifically on the pyrogenic class of compounds. This study demonstrated how changes in land use directly affect downstream DOM quality and could impact C and nutrient cycling on a global scale.

  16. Is the Alzheimer's disease cortical thickness signature a biological marker for memory?

    Science.gov (United States)

    Busovaca, Edgar; Zimmerman, Molly E; Meier, Irene B; Griffith, Erica Y; Grieve, Stuart M; Korgaonkar, Mayuresh S; Williams, Leanne M; Brickman, Adam M

    2016-06-01

    Recent work suggests that analysis of the cortical thickness in key brain regions can be used to identify individuals at greatest risk for development of Alzheimer's disease (AD). It is unclear to what extent this "signature" is a biological marker of normal memory function - the primary cognitive domain affected by AD. We examined the relationship between the AD signature biomarker and memory functioning in a group of neurologically healthy young and older adults. Cortical thickness measurements and neuropsychological evaluations were obtained in 110 adults (age range 21-78, mean = 46) drawn from the Brain Resource International Database. The cohort was divided into young adult (n = 64, age 21-50) and older adult (n = 46, age 51-78) groups. Cortical thickness analysis was performed with FreeSurfer, and the average cortical thickness extracted from the eight regions that comprise the AD signature. Mean AD-signature cortical thickness was positively associated with performance on the delayed free recall trial of a list learning task and this relationship did not differ between younger and older adults. Mean AD-signature cortical thickness was not associated with performance on a test of psychomotor speed, as a control task, in either group. The results suggest that the AD signature cortical thickness is a marker for memory functioning across the adult lifespan.

  17. Bio-magnetic signatures of fetal breathing movement

    International Nuclear Information System (INIS)

    Ulusar, U D; Wilson, J D; Murphy, P; Govindan, R B; Preissl, H; Lowery, C L; Eswaran, H

    2011-01-01

    The purpose of fetal magnetoencephalography (fMEG) is to record and analyze fetal brain activity. Unavoidably, these recordings consist of a complex mixture of bio-magnetic signals from both mother and fetus. The acquired data include biological signals that are related to maternal and fetal heart function as well as fetal gross body and breathing movements. Since fetal breathing generates a significant source of bio-magnetic interference during these recordings, the goal of this study was to identify and quantify the signatures pertaining to fetal breathing movements (FBM). The fMEG signals were captured using superconducting quantum interference devices (SQUIDs) The existence of FBM was verified and recorded concurrently by an ultrasound-based video technique. This simultaneous recording is challenging since SQUIDs are extremely sensitive to magnetic signals and highly susceptible to interference from electronic equipment. For each recording, an ultrasound-FBM (UFBM) signal was extracted by tracing the displacement of the boundary defined by the fetal thorax frame by frame. The start of each FBM was identified by using the peak points of the UFBM signal. The bio-magnetic signals associated with FBM were obtained by averaging the bio-magnetic signals time locked to the FBMs. The results showed the existence of a distinctive sinusoidal signal pattern of FBM in fMEG data

  18. Oxidative stress/reactive metabolite gene expression signature in rat liver detects idiosyncratic hepatotoxicants

    Energy Technology Data Exchange (ETDEWEB)

    Leone, Angelique; Nie, Alex; Brandon Parker, J.; Sawant, Sharmilee; Piechta, Leigh-Anne; Kelley, Michael F., E-mail: mkelley2@its.jnj.com; Mark Kao, L.; Jim Proctor, S.; Verheyen, Geert; Johnson, Mark D.; Lord, Peter G.; McMillian, Michael K.

    2014-03-15

    Previously we reported a gene expression signature in rat liver for detecting a specific type of oxidative stress (OS) related to reactive metabolites (RM). High doses of the drugs disulfiram, ethinyl estradiol and nimesulide were used with another dozen paradigm OS/RM compounds, and three other drugs flutamide, phenacetin and sulindac were identified by this signature. In a second study, antiepileptic drugs were compared for covalent binding and their effects on OS/RM; felbamate, carbamazepine, and phenobarbital produced robust OS/RM gene expression. In the present study, liver RNA samples from drug-treated rats from more recent experiments were examined for statistical fit to the OS/RM signature. Of all 97 drugs examined, in addition to the nine drugs noted above, 19 more were identified as OS/RM-producing compounds—chlorpromazine, clozapine, cyproterone acetate, dantrolene, dipyridamole, glibenclamide, isoniazid, ketoconazole, methapyrilene, naltrexone, nifedipine, sulfamethoxazole, tamoxifen, coumarin, ritonavir, amitriptyline, valproic acid, enalapril, and chloramphenicol. Importantly, all of the OS/RM drugs listed above have been linked to idiosyncratic hepatotoxicity, excepting chloramphenicol, which does not have a package label for hepatotoxicity, but does have a black box warning for idiosyncratic bone marrow suppression. Most of these drugs are not acutely toxic in the rat. The OS/RM signature should be useful to avoid idiosyncratic hepatotoxicity of drug candidates. - Highlights: • 28 of 97 drugs gave a positive OS/RM gene expression signature in rat liver. • The specificity of the signature for human idiosyncratic hepatotoxicants was 98%. • The sensitivity of the signature for human idiosyncratic hepatotoxicants was 75%. • The signature can help eliminate hepatotoxicants from drug development.

  19. E-learning platform for automated testing of electronic circuits using signature analysis method

    Science.gov (United States)

    Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel

    2016-12-01

    Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.

  20. Signatures for isoscalar spin transitions excited in (d, d,) reactions

    International Nuclear Information System (INIS)

    Morlet, M.; Willis, A.; Van de Wiele, J.; Marty, N.; Guillot, J.; Langevin-Joliot, H.; Bimbot, L.; Rosier, L.; Djalali, C.; Duchazeaubeneix, J.C.

    1990-01-01

    Three different signatures for isoscalar spin transitions in nuclei have been tested in the 12 C(d, d , ) 12 C reaction at 400 MeV. These signatures have values of close to zero for the natural parity states, and values ranging from 0.22 to 0.50 for the ΔS=1 ΔT=0, 12.7 MeV state