WorldWideScience

Sample records for source code clones

  1. Structured Review of Code Clone Literature

    NARCIS (Netherlands)

    Hordijk, W.T.B.; Ponisio, Laura; Wieringa, Roelf J.

    2008-01-01

    This report presents the results of a structured review of code clone literature. The aim of the review is to assemble a conceptual model of clone-related concepts which helps us to reason about clones. This conceptual model unifies clone concepts from a wide range of literature, so that findings

  2. Coding sequence of human rho cDNAs clone 6 and clone 9

    Energy Technology Data Exchange (ETDEWEB)

    Chardin, P; Madaule, P; Tavitian, A

    1988-03-25

    The authors have isolated human cDNAs including the complete coding sequence for two rho proteins corresponding to the incomplete isolates previously described as clone 6 and clone 9. The deduced a.a. sequences, when compared to the a.a. sequence deduced from clone 12 cDNA, show that there are in human at least three highly homologous rho genes. They suggest that clone 12 be named rhoA, clone 6 : rhoB and clone 9 : rhoC. RhoA, B and C proteins display approx. 30% a.a. identity with ras proteins,. mainly clustered in four highly homologous internal regions corresponding to the GTP binding site; however at least one significant difference is found; the 3 rho proteins have an Alanine in position corresponding to ras Glycine 13, suggesting that rho and ras proteins might have slightly different biochemical properties.

  3. Entangled cloning of stabilizer codes and free fermions

    Science.gov (United States)

    Hsieh, Timothy H.

    2016-10-01

    Though the no-cloning theorem [Wooters and Zurek, Nature (London) 299, 802 (1982), 10.1038/299802a0] prohibits exact replication of arbitrary quantum states, there are many instances in quantum information processing and entanglement measurement in which a weaker form of cloning may be useful. Here, I provide a construction for generating an "entangled clone" for a particular but rather expansive and rich class of states. Given a stabilizer code or free fermion Hamiltonian, this construction generates an exact entangled clone of the original ground state, in the sense that the entanglement between the original and the exact copy can be tuned to be arbitrarily small but finite, or large, and the relation between the original and the copy can also be modified to some extent. For example, this Rapid Communication focuses on generating time-reversed copies of stabilizer codes and particle-hole transformed ground states of free fermion systems, although untransformed clones can also be generated. The protocol leverages entanglement to simulate a transformed copy of the Hamiltonian without having to physically implement it and can potentially be realized in superconducting qubits or ultracold atomic systems.

  4. Towards Clone Detection in UML Domain Models

    DEFF Research Database (Denmark)

    Störrle, Harald

    2010-01-01

    Code clones - that is, duplicate fragments of code - have been studied for a long time. There is strong evidence that code clones are a major source of software faults. Anecdotal evidence suggests that this phenomenon is not restricted to code, but occurs in models in a very similar way. So it is...

  5. Effective and efficient model clone detection

    DEFF Research Database (Denmark)

    Störrle, Harald

    2015-01-01

    Code clones are a major source of software defects. Thus, it is likely that model clones (i.e., duplicate fragments of models) have a significant negative impact on model quality, and thus, on any software created based on those models, irrespective of whether the software is generated fully...... automatically (“MDD-style”) or hand-crafted following the blueprint defined by the model (“MBSD-style”). Unfortunately, however, model clones are much less well studied than code clones. In this paper, we present a clone detection algorithm for UML domain models. Our approach covers a much greater variety...... of model types than existing approaches while providing high clone detection rates at high speed....

  6. Towards Clone Detection in UML Domain Models

    DEFF Research Database (Denmark)

    Störrle, Harald

    2013-01-01

    Code clones (i.e., duplicate fragments of code) have been studied for long, and there is strong evidence that they are a major source of software faults. Anecdotal evidence suggests that this phenomenon occurs similarly in models, suggesting that model clones are as detrimental to model quality...... as they are to code quality. However, programming language code and visual models have significant differences that make it difficult to directly transfer notions and algorithms developed in the code clone arena to model clones. In this article, we develop and propose a definition of the notion of “model clone” based...... we believe that our approach advances the state of the art significantly, it is restricted to UML models, its results leave room for improvements, and there is no validation by field studies....

  7. Cloning and identification of the gene coding for the 140-kd subunit of Drosophila RNA polymerase II

    OpenAIRE

    Faust, Daniela M.; Renkawitz-Pohl, Renate; Falkenburg, Dieter; Gasch, Alexander; Bialojan, Siegfried; Young, Richard A.; Bautz, Ekkehard K. F.

    1986-01-01

    Genomic clones of Drosophila melanogaster were isolated from a λ library by cross-hybridization with the yeast gene coding for the 150-kd subunit of RNA polymerase II. Clones containing a region of ∼2.0 kb with strong homology to the yeast gene were shown to code for a 3.9-kb poly(A)+-RNA. Part of the coding region was cloned into an expression vector. A fusion protein was obtained which reacted with an antibody directed against RNA polymerase II of Drosophila. Peptide mapping of the fusion p...

  8. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  9. Automated cloning methods.; TOPICAL

    International Nuclear Information System (INIS)

    Collart, F.

    2001-01-01

    Argonne has developed a series of automated protocols to generate bacterial expression clones by using a robotic system designed to be used in procedures associated with molecular biology. The system provides plate storage, temperature control from 4 to 37 C at various locations, and Biomek and Multimek pipetting stations. The automated system consists of a robot that transports sources from the active station on the automation system. Protocols for the automated generation of bacterial expression clones can be grouped into three categories (Figure 1). Fragment generation protocols are initiated on day one of the expression cloning procedure and encompass those protocols involved in generating purified coding region (PCR)

  10. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  11. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  12. Syndrome-source-coding and its universal generalization. [error correcting codes for data compression

    Science.gov (United States)

    Ancheta, T. C., Jr.

    1976-01-01

    A method of using error-correcting codes to obtain data compression, called syndrome-source-coding, is described in which the source sequence is treated as an error pattern whose syndrome forms the compressed data. It is shown that syndrome-source-coding can achieve arbitrarily small distortion with the number of compressed digits per source digit arbitrarily close to the entropy of a binary memoryless source. A 'universal' generalization of syndrome-source-coding is formulated which provides robustly effective distortionless coding of source ensembles. Two examples are given, comparing the performance of noiseless universal syndrome-source-coding to (1) run-length coding and (2) Lynch-Davisson-Schalkwijk-Cover universal coding for an ensemble of binary memoryless sources.

  13. Joint source-channel coding using variable length codes

    NARCIS (Netherlands)

    Balakirsky, V.B.

    2001-01-01

    We address the problem of joint source-channel coding when variable-length codes are used for information transmission over a discrete memoryless channel. Data transmitted over the channel are interpreted as pairs (m k ,t k ), where m k is a message generated by the source and t k is a time instant

  14. Isolation and characterization of full-length cDNA clones coding for cholinesterase from fetal human tissues

    International Nuclear Information System (INIS)

    Prody, C.A.; Zevin-Sonkin, D.; Gnatt, A.; Goldberg, O.; Soreq, H.

    1987-01-01

    To study the primary structure and regulation of human cholinesterases, oligodeoxynucleotide probes were prepared according to a consensus peptide sequence present in the active site of both human serum pseudocholinesterase and Torpedo electric organ true acetylcholinesterase. Using these probes, the authors isolated several cDNA clones from λgt10 libraries of fetal brain and liver origins. These include 2.4-kilobase cDNA clones that code for a polypeptide containing a putative signal peptide and the N-terminal, active site, and C-terminal peptides of human BtChoEase, suggesting that they code either for BtChoEase itself or for a very similar but distinct fetal form of cholinesterase. In RNA blots of poly(A) + RNA from the cholinesterase-producing fetal brain and liver, these cDNAs hybridized with a single 2.5-kilobase band. Blot hybridization to human genomic DNA revealed that these fetal BtChoEase cDNA clones hybridize with DNA fragments of the total length of 17.5 kilobases, and signal intensities indicated that these sequences are not present in many copies. Both the cDNA-encoded protein and its nucleotide sequence display striking homology to parallel sequences published for Torpedo AcChoEase. These finding demonstrate extensive homologies between the fetal BtChoEase encoded by these clones and other cholinesterases of various forms and species

  15. Rate-adaptive BCH coding for Slepian-Wolf coding of highly correlated sources

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Salmistraro, Matteo; Larsen, Knud J.

    2012-01-01

    This paper considers using BCH codes for distributed source coding using feedback. The focus is on coding using short block lengths for a binary source, X, having a high correlation between each symbol to be coded and a side information, Y, such that the marginal probability of each symbol, Xi in X......, given Y is highly skewed. In the analysis, noiseless feedback and noiseless communication are assumed. A rate-adaptive BCH code is presented and applied to distributed source coding. Simulation results for a fixed error probability show that rate-adaptive BCH achieves better performance than LDPCA (Low......-Density Parity-Check Accumulate) codes for high correlation between source symbols and the side information....

  16. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  17. Cloning and expression of a cDNA coding for a human monocyte-derived plasminogen activator inhibitor.

    OpenAIRE

    Antalis, T M; Clark, M A; Barnes, T; Lehrbach, P R; Devine, P L; Schevzov, G; Goss, N H; Stephens, R W; Tolstoshev, P

    1988-01-01

    Human monocyte-derived plasminogen activator inhibitor (mPAI-2) was purified to homogeneity from the U937 cell line and partially sequenced. Oligonucleotide probes derived from this sequence were used to screen a cDNA library prepared from U937 cells. One positive clone was sequenced and contained most of the coding sequence as well as a long incomplete 3' untranslated region (1112 base pairs). This cDNA sequence was shown to encode mPAI-2 by hybrid-select translation. A cDNA clone encoding t...

  18. The Visual Code Navigator : An Interactive Toolset for Source Code Investigation

    NARCIS (Netherlands)

    Lommerse, Gerard; Nossin, Freek; Voinea, Lucian; Telea, Alexandru

    2005-01-01

    We present the Visual Code Navigator, a set of three interrelated visual tools that we developed for exploring large source code software projects from three different perspectives, or views: The syntactic view shows the syntactic constructs in the source code. The symbol view shows the objects a

  19. Transmission imaging with a coded source

    International Nuclear Information System (INIS)

    Stoner, W.W.; Sage, J.P.; Braun, M.; Wilson, D.T.; Barrett, H.H.

    1976-01-01

    The conventional approach to transmission imaging is to use a rotating anode x-ray tube, which provides the small, brilliant x-ray source needed to cast sharp images of acceptable intensity. Stationary anode sources, although inherently less brilliant, are more compatible with the use of large area anodes, and so they can be made more powerful than rotating anode sources. Spatial modulation of the source distribution provides a way to introduce detailed structure in the transmission images cast by large area sources, and this permits the recovery of high resolution images, in spite of the source diameter. The spatial modulation is deliberately chosen to optimize recovery of image structure; the modulation pattern is therefore called a ''code.'' A variety of codes may be used; the essential mathematical property is that the code possess a sharply peaked autocorrelation function, because this property permits the decoding of the raw image cast by th coded source. Random point arrays, non-redundant point arrays, and the Fresnel zone pattern are examples of suitable codes. This paper is restricted to the case of the Fresnel zone pattern code, which has the unique additional property of generating raw images analogous to Fresnel holograms. Because the spatial frequency of these raw images are extremely coarse compared with actual holograms, a photoreduction step onto a holographic plate is necessary before the decoded image may be displayed with the aid of coherent illumination

  20. Forked and Integrated Variants In An Open-Source Firmware Project

    DEFF Research Database (Denmark)

    Stanciulescu, Stefan; Schulze, Sandro; Wasowski, Andrzej

    2015-01-01

    and interactive source management platforms such as Github. We study advantages and disadvantages of forking using the case of Marlin, an open source firmware for 3D printers. We find that many problems and advantages of cloning do translate to forking. Interestingly, the Marlin community uses both forking......Code cloning has been reported both on small (code fragments) and large (entire projects) scale. Cloning-in-the-large, or forking, is gaining ground as a reuse mechanism thanks to availability of better tools for maintaining forked project variants, hereunder distributed version control systems...

  1. Research on Primary Shielding Calculation Source Generation Codes

    Science.gov (United States)

    Zheng, Zheng; Mei, Qiliang; Li, Hui; Shangguan, Danhua; Zhang, Guangchun

    2017-09-01

    Primary Shielding Calculation (PSC) plays an important role in reactor shielding design and analysis. In order to facilitate PSC, a source generation code is developed to generate cumulative distribution functions (CDF) for the source particle sample code of the J Monte Carlo Transport (JMCT) code, and a source particle sample code is deveoped to sample source particle directions, types, coordinates, energy and weights from the CDFs. A source generation code is developed to transform three dimensional (3D) power distributions in xyz geometry to source distributions in r θ z geometry for the J Discrete Ordinate Transport (JSNT) code. Validation on PSC model of Qinshan No.1 nuclear power plant (NPP), CAP1400 and CAP1700 reactors are performed. Numerical results show that the theoretical model and the codes are both correct.

  2. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  3. Code Forking, Governance, and Sustainability in Open Source Software

    OpenAIRE

    Juho Lindman; Linus Nyman

    2013-01-01

    The right to fork open source code is at the core of open source licensing. All open source licenses grant the right to fork their code, that is to start a new development effort using an existing code as its base. Thus, code forking represents the single greatest tool available for guaranteeing sustainability in open source software. In addition to bolstering program sustainability, code forking directly affects the governance of open source initiatives. Forking, and even the mere possibilit...

  4. Enhanced Protein Production in Escherichia coli by Optimization of Cloning Scars at the Vector-Coding Sequence Junction

    DEFF Research Database (Denmark)

    Mirzadeh, Kiavash; Martinez, Virginia; Toddo, Stephen

    2015-01-01

    are poorly expressed even when they are codon-optimized and expressed from vectors with powerful genetic elements. In this study, we show that poor expression can be caused by certain nucleotide sequences (e.g., cloning scars) at the junction between the vector and the coding sequence. Since these sequences...

  5. Sources of Blood Meals of Sylvatic Triatoma guasayana near Zurima, Bolivia, Assayed with qPCR and 12S Cloning

    Science.gov (United States)

    Lucero, David E.; Ribera, Wilma; Pizarro, Juan Carlos; Plaza, Carlos; Gordon, Levi W.; Peña, Reynaldo; Morrissey, Leslie A.; Rizzo, Donna M.; Stevens, Lori

    2014-01-01

    Background In this study we compared the utility of two molecular biology techniques, cloning of the mitochondrial 12S ribosomal RNA gene and hydrolysis probe-based qPCR, to identify blood meal sources of sylvatic Chagas disease insect vectors collected with live-bait mouse traps (also known as Noireau traps). Fourteen T. guasayana were collected from six georeferenced trap locations in the Andean highlands of the department of Chuquisaca, Bolivia. Methodology/Principal Findings We detected four blood meals sources with the cloning assay: seven samples were positive for human (Homo sapiens), five for chicken (Gallus gallus) and unicolored blackbird (Agelasticus cyanopus), and one for opossum (Monodelphis domestica). Using the qPCR assay we detected chicken (13 vectors), and human (14 vectors) blood meals as well as an additional blood meal source, Canis sp. (4 vectors). Conclusions/Significance We show that cloning of 12S PCR products, which avoids bias associated with developing primers based on a priori knowledge, detected blood meal sources not previously considered and that species-specific qPCR is more sensitive. All samples identified as positive for a specific blood meal source by the cloning assay were also positive by qPCR. However, not all samples positive by qPCR were positive by cloning. We show the power of combining the cloning assay with the highly sensitive hydrolysis probe-based qPCR assay provides a more complete picture of blood meal sources for insect disease vectors. PMID:25474154

  6. Sources of blood meals of sylvatic Triatoma guasayana near Zurima, Bolivia, assayed with qPCR and 12S cloning.

    Directory of Open Access Journals (Sweden)

    David E Lucero

    2014-12-01

    Full Text Available In this study we compared the utility of two molecular biology techniques, cloning of the mitochondrial 12S ribosomal RNA gene and hydrolysis probe-based qPCR, to identify blood meal sources of sylvatic Chagas disease insect vectors collected with live-bait mouse traps (also known as Noireau traps. Fourteen T. guasayana were collected from six georeferenced trap locations in the Andean highlands of the department of Chuquisaca, Bolivia.We detected four blood meals sources with the cloning assay: seven samples were positive for human (Homo sapiens, five for chicken (Gallus gallus and unicolored blackbird (Agelasticus cyanopus, and one for opossum (Monodelphis domestica. Using the qPCR assay we detected chicken (13 vectors, and human (14 vectors blood meals as well as an additional blood meal source, Canis sp. (4 vectors.We show that cloning of 12S PCR products, which avoids bias associated with developing primers based on a priori knowledge, detected blood meal sources not previously considered and that species-specific qPCR is more sensitive. All samples identified as positive for a specific blood meal source by the cloning assay were also positive by qPCR. However, not all samples positive by qPCR were positive by cloning. We show the power of combining the cloning assay with the highly sensitive hydrolysis probe-based qPCR assay provides a more complete picture of blood meal sources for insect disease vectors.

  7. TA-GC cloning: A new simple and versatile technique for the directional cloning of PCR products for recombinant protein expression.

    Science.gov (United States)

    Niarchos, Athanasios; Siora, Anastasia; Konstantinou, Evangelia; Kalampoki, Vasiliki; Lagoumintzis, George; Poulas, Konstantinos

    2017-01-01

    During the last few decades, the recombinant protein expression finds more and more applications. The cloning of protein-coding genes into expression vectors is required to be directional for proper expression, and versatile in order to facilitate gene insertion in multiple different vectors for expression tests. In this study, the TA-GC cloning method is proposed, as a new, simple and efficient method for the directional cloning of protein-coding genes in expression vectors. The presented method features several advantages over existing methods, which tend to be relatively more labour intensive, inflexible or expensive. The proposed method relies on the complementarity between single A- and G-overhangs of the protein-coding gene, obtained after a short incubation with T4 DNA polymerase, and T and C overhangs of the novel vector pET-BccI, created after digestion with the restriction endonuclease BccI. The novel protein-expression vector pET-BccI also facilitates the screening of transformed colonies for recombinant transformants. Evaluation experiments of the proposed TA-GC cloning method showed that 81% of the transformed colonies contained recombinant pET-BccI plasmids, and 98% of the recombinant colonies expressed the desired protein. This demonstrates that TA-GC cloning could be a valuable method for cloning protein-coding genes in expression vectors.

  8. Code Forking, Governance, and Sustainability in Open Source Software

    Directory of Open Access Journals (Sweden)

    Juho Lindman

    2013-01-01

    Full Text Available The right to fork open source code is at the core of open source licensing. All open source licenses grant the right to fork their code, that is to start a new development effort using an existing code as its base. Thus, code forking represents the single greatest tool available for guaranteeing sustainability in open source software. In addition to bolstering program sustainability, code forking directly affects the governance of open source initiatives. Forking, and even the mere possibility of forking code, affects the governance and sustainability of open source initiatives on three distinct levels: software, community, and ecosystem. On the software level, the right to fork makes planned obsolescence, versioning, vendor lock-in, end-of-support issues, and similar initiatives all but impossible to implement. On the community level, forking impacts both sustainability and governance through the power it grants the community to safeguard against unfavourable actions by corporations or project leaders. On the business-ecosystem level forking can serve as a catalyst for innovation while simultaneously promoting better quality software through natural selection. Thus, forking helps keep open source initiatives relevant and presents opportunities for the development and commercialization of current and abandoned programs.

  9. TA-GC cloning: A new simple and versatile technique for the directional cloning of PCR products for recombinant protein expression.

    Directory of Open Access Journals (Sweden)

    Athanasios Niarchos

    Full Text Available During the last few decades, the recombinant protein expression finds more and more applications. The cloning of protein-coding genes into expression vectors is required to be directional for proper expression, and versatile in order to facilitate gene insertion in multiple different vectors for expression tests. In this study, the TA-GC cloning method is proposed, as a new, simple and efficient method for the directional cloning of protein-coding genes in expression vectors. The presented method features several advantages over existing methods, which tend to be relatively more labour intensive, inflexible or expensive. The proposed method relies on the complementarity between single A- and G-overhangs of the protein-coding gene, obtained after a short incubation with T4 DNA polymerase, and T and C overhangs of the novel vector pET-BccI, created after digestion with the restriction endonuclease BccI. The novel protein-expression vector pET-BccI also facilitates the screening of transformed colonies for recombinant transformants. Evaluation experiments of the proposed TA-GC cloning method showed that 81% of the transformed colonies contained recombinant pET-BccI plasmids, and 98% of the recombinant colonies expressed the desired protein. This demonstrates that TA-GC cloning could be a valuable method for cloning protein-coding genes in expression vectors.

  10. On the Combination of Multi-Layer Source Coding and Network Coding for Wireless Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Fitzek, Frank; Pedersen, Morten Videbæk

    2013-01-01

    quality is developed. A linear coding structure designed to gracefully encapsulate layered source coding provides both low complexity of the utilised linear coding while enabling robust erasure correction in the form of fountain coding capabilities. The proposed linear coding structure advocates efficient...

  11. Decoding the codes: A content analysis of the news coverage of genetic cloning by three online news sites and three national daily newspapers, 1996 through 1998

    Science.gov (United States)

    Hyde, Jon E.

    This study compared news coverage of genetic cloning research in three online news sites (CNN.com, ABC.com, and MSNBC.com) and three national daily newspapers (The New York Times, The Washington Post, and USA Today). The study involved the analysis of 230 online and print news articles concerning genetic cloning published from 1996 through 1998. Articles were examined with respect to formats, sources, focus, tone, and assessments about the impact of cloning research. Findings indicated that while print news formats remained relatively constant for the duration of this study, online news formats changed significantly with respect to the kinds of media used to represent the news, the layouts used to represent cloning news, and the emphasis placed on audio-visual content. Online stories were as much as 20 to 70% shorter than print stories. More than 50% of the articles appearing online were composed by outside sources (wire services, guest columnists, etc.). By comparison, nearly 90% of the articles published by print newspapers were written "in-house" by science reporters. Online news sites cited fewer sources and cited a smaller variety of sources than the newspapers examined here. In both news outlets, however, the sources most frequently cited were those with vested interests in furthering cloning research. Both online and print news coverage of cloning tends to focus principally on the technical procedures and on the future benefits of cloning. More than 60% of the articles focused on the techniques and technologies of cloning. Less than 25% of the articles focused on social, ethical, or legal issues associated with cloning. Similarly, articles from all six sources (75%) tended to be both positive and future-oriented. Less than 5% of the total articles examined here had a strongly negative or critical tone. Moreover, both online and print news sources increasingly conveyed a strong sense of acceptance about the possibility of human cloning. Data from this study

  12. Image authentication using distributed source coding.

    Science.gov (United States)

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  13. The Astrophysics Source Code Library by the numbers

    Science.gov (United States)

    Allen, Alice; Teuben, Peter; Berriman, G. Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert; Ryan, PW; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Wallin, John; Warmels, Rein

    2018-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) was founded in 1999 by Robert Nemiroff and John Wallin. ASCL editors seek both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and add entries for the found codes to the library. Software authors can submit their codes to the ASCL as well. This ensures a comprehensive listing covering a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL is indexed by both NASA’s Astrophysics Data System (ADS) and Web of Science, making software used in research more discoverable. This presentation covers the growth in the ASCL’s number of entries, the number of citations to its entries, and in which journals those citations appear. It also discusses what changes have been made to the ASCL recently, and what its plans are for the future.

  14. Data processing with microcode designed with source coding

    Science.gov (United States)

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  15. Cloning and expression of a cDNA coding for a human monocyte-derived plasminogen activator inhibitor

    International Nuclear Information System (INIS)

    Antalis, T.M.; Clark, M.A.; Barnes, T.; Lehrbach, P.R.; Devine, P.L.; Schevzov, G.; Goss, N.H.; Stephens, R.W.; Tolstoshev, P.

    1988-01-01

    Human monocyte-derived plasminogen activator inhibitor (mPAI-2) was purified to homogeneity from the U937 cell line and partially sequenced. Oligonucleotide probes derived from this sequence were used to screen a cDNA library prepared from U937 cells. One positive clone was sequenced and contained most of the coding sequence as well as a long incomplete 3' untranslated region (1112 base pairs). This cDNA sequence was shown to encode mPAI-2 by hybrid-select translation. A cDNA clone encoding the remainder of the mPAI-2 mRNA was obtained by primer extension of U937 poly(A) + RNA using a probe complementary to the mPAI-2 coding region. The coding sequence for mPAI-2 was placed under the control of the λ P/sub L/ promoter, and the protein expressed in Escherichia coli formed a complex with urokinase that could be detected immunologically. By nucleotide sequence analysis, mPAI-2 cDNA encodes a protein containing 415 amino acids with a predicted unglycosylated M/sub r/ of 46,543. The predicted amino acid sequence of mPAI-2 is very similar to placental PAI-2 and shows extensive homology with members of the serine protease inhibitor (serpin) superfamily. mPAI-2 was found to be more homologous to ovalbumin (37%) than the endothelial plasminogen activator inhibitor, PAI-1 (26%). The 3' untranslated region of the mPAI-2 cDNA contains a putative regulatory sequence that has been associated with the inflammatory mediators

  16. Present state of the SOURCES computer code

    International Nuclear Information System (INIS)

    Shores, Erik F.

    2002-01-01

    In various stages of development for over two decades, the SOURCES computer code continues to calculate neutron production rates and spectra from four types of problems: homogeneous media, two-region interfaces, three-region interfaces and that of a monoenergetic alpha particle beam incident on a slab of target material. Graduate work at the University of Missouri - Rolla, in addition to user feedback from a tutorial course, provided the impetus for a variety of code improvements. Recently upgraded to version 4B, initial modifications to SOURCES focused on updates to the 'tape5' decay data library. Shortly thereafter, efforts focused on development of a graphical user interface for the code. This paper documents the Los Alamos SOURCES Tape1 Creator and Library Link (LASTCALL) and describes additional library modifications in more detail. Minor improvements and planned enhancements are discussed.

  17. Schroedinger’s Code: A Preliminary Study on Research Source Code Availability and Link Persistence in Astrophysics

    Science.gov (United States)

    Allen, Alice; Teuben, Peter J.; Ryan, P. Wesley

    2018-05-01

    We examined software usage in a sample set of astrophysics research articles published in 2015 and searched for the source codes for the software mentioned in these research papers. We categorized the software to indicate whether the source code is available for download and whether there are restrictions to accessing it, and if the source code is not available, whether some other form of the software, such as a binary, is. We also extracted hyperlinks from one journal’s 2015 research articles, as links in articles can serve as an acknowledgment of software use and lead to the data used in the research, and tested them to determine which of these URLs are still accessible. For our sample of 715 software instances in the 166 articles we examined, we were able to categorize 418 records as according to whether source code was available and found that 285 unique codes were used, 58% of which offered the source code for download. Of the 2558 hyperlinks extracted from 1669 research articles, at best, 90% of them were available over our testing period.

  18. Iterative List Decoding of Concatenated Source-Channel Codes

    Directory of Open Access Journals (Sweden)

    Hedayat Ahmadreza

    2005-01-01

    Full Text Available Whenever variable-length entropy codes are used in the presence of a noisy channel, any channel errors will propagate and cause significant harm. Despite using channel codes, some residual errors always remain, whose effect will get magnified by error propagation. Mitigating this undesirable effect is of great practical interest. One approach is to use the residual redundancy of variable length codes for joint source-channel decoding. In this paper, we improve the performance of residual redundancy source-channel decoding via an iterative list decoder made possible by a nonbinary outer CRC code. We show that the list decoding of VLC's is beneficial for entropy codes that contain redundancy. Such codes are used in state-of-the-art video coders, for example. The proposed list decoder improves the overall performance significantly in AWGN and fully interleaved Rayleigh fading channels.

  19. Cloning and expression of a cDNA coding for a human monocyte-derived plasminogen activator inhibitor.

    Science.gov (United States)

    Antalis, T M; Clark, M A; Barnes, T; Lehrbach, P R; Devine, P L; Schevzov, G; Goss, N H; Stephens, R W; Tolstoshev, P

    1988-02-01

    Human monocyte-derived plasminogen activator inhibitor (mPAI-2) was purified to homogeneity from the U937 cell line and partially sequenced. Oligonucleotide probes derived from this sequence were used to screen a cDNA library prepared from U937 cells. One positive clone was sequenced and contained most of the coding sequence as well as a long incomplete 3' untranslated region (1112 base pairs). This cDNA sequence was shown to encode mPAI-2 by hybrid-select translation. A cDNA clone encoding the remainder of the mPAI-2 mRNA was obtained by primer extension of U937 poly(A)+ RNA using a probe complementary to the mPAI-2 coding region. The coding sequence for mPAI-2 was placed under the control of the lambda PL promoter, and the protein expressed in Escherichia coli formed a complex with urokinase that could be detected immunologically. By nucleotide sequence analysis, mPAI-2 cDNA encodes a protein containing 415 amino acids with a predicted unglycosylated Mr of 46,543. The predicted amino acid sequence of mPAI-2 is very similar to placental PAI-2 (3 amino acid differences) and shows extensive homology with members of the serine protease inhibitor (serpin) superfamily. mPAI-2 was found to be more homologous to ovalbumin (37%) than the endothelial plasminogen activator inhibitor, PAI-1 (26%). Like ovalbumin, mPAI-2 appears to have no typical amino-terminal signal sequence. The 3' untranslated region of the mPAI-2 cDNA contains a putative regulatory sequence that has been associated with the inflammatory mediators.

  20. Measuring Modularity in Open Source Code Bases

    Directory of Open Access Journals (Sweden)

    Roberto Milev

    2009-03-01

    Full Text Available Modularity of an open source software code base has been associated with growth of the software development community, the incentives for voluntary code contribution, and a reduction in the number of users who take code without contributing back to the community. As a theoretical construct, modularity links OSS to other domains of research, including organization theory, the economics of industry structure, and new product development. However, measuring the modularity of an OSS design has proven difficult, especially for large and complex systems. In this article, we describe some preliminary results of recent research at Carleton University that examines the evolving modularity of large-scale software systems. We describe a measurement method and a new modularity metric for comparing code bases of different size, introduce an open source toolkit that implements this method and metric, and provide an analysis of the evolution of the Apache Tomcat application server as an illustrative example of the insights gained from this approach. Although these results are preliminary, they open the door to further cross-discipline research that quantitatively links the concerns of business managers, entrepreneurs, policy-makers, and open source software developers.

  1. Optimization of Coding of AR Sources for Transmission Across Channels with Loss

    DEFF Research Database (Denmark)

    Arildsen, Thomas

    Source coding concerns the representation of information in a source signal using as few bits as possible. In the case of lossy source coding, it is the encoding of a source signal using the fewest possible bits at a given distortion or, at the lowest possible distortion given a specified bit rate....... Channel coding is usually applied in combination with source coding to ensure reliable transmission of the (source coded) information at the maximal rate across a channel given the properties of this channel. In this thesis, we consider the coding of auto-regressive (AR) sources which are sources that can...... compared to the case where the encoder is unaware of channel loss. We finally provide an extensive overview of cross-layer communication issues which are important to consider due to the fact that the proposed algorithm interacts with the source coding and exploits channel-related information typically...

  2. Repairing business process models as retrieved from source code

    NARCIS (Netherlands)

    Fernández-Ropero, M.; Reijers, H.A.; Pérez-Castillo, R.; Piattini, M.; Nurcan, S.; Proper, H.A.; Soffer, P.; Krogstie, J.; Schmidt, R.; Halpin, T.; Bider, I.

    2013-01-01

    The static analysis of source code has become a feasible solution to obtain underlying business process models from existing information systems. Due to the fact that not all information can be automatically derived from source code (e.g., consider manual activities), such business process models

  3. Blahut-Arimoto algorithm and code design for action-dependent source coding problems

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Simeone, Osvaldo; Popovski, Petar

    2013-01-01

    The source coding problem with action-dependent side information at the decoder has recently been introduced to model data acquisition in resource-constrained systems. In this paper, an efficient Blahut-Arimoto-type algorithm for the numerical computation of the rate-distortion-cost function...... for this problem is proposed. Moreover, a simplified two-stage code structure based on multiplexing is put forth, whereby the first stage encodes the actions and the second stage is composed of an array of classical Wyner-Ziv codes, one for each action. Leveraging this structure, specific coding/decoding...... strategies are designed based on LDGM codes and message passing. Through numerical examples, the proposed code design is shown to achieve performance close to the rate-distortion-cost function....

  4. Towards Holography via Quantum Source-Channel Codes

    Science.gov (United States)

    Pastawski, Fernando; Eisert, Jens; Wilming, Henrik

    2017-07-01

    While originally motivated by quantum computation, quantum error correction (QEC) is currently providing valuable insights into many-body quantum physics, such as topological phases of matter. Furthermore, mounting evidence originating from holography research (AdS/CFT) indicates that QEC should also be pertinent for conformal field theories. With this motivation in mind, we introduce quantum source-channel codes, which combine features of lossy compression and approximate quantum error correction, both of which are predicted in holography. Through a recent construction for approximate recovery maps, we derive guarantees on its erasure decoding performance from calculations of an entropic quantity called conditional mutual information. As an example, we consider Gibbs states of the transverse field Ising model at criticality and provide evidence that they exhibit nontrivial protection from local erasure. This gives rise to the first concrete interpretation of a bona fide conformal field theory as a quantum error correcting code. We argue that quantum source-channel codes are of independent interest beyond holography.

  5. OSSMETER D3.4 – Language-Specific Source Code Quality Analysis

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim); H.J.S. Basten (Bas)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and prototypes of the tools that are needed for source code quality analysis in open source software projects. It builds upon the results of: • Deliverable 3.1 where infra-structure and

  6. Should we clone human beings? Cloning as a source of tissue for transplantation.

    Science.gov (United States)

    Savulescu, J

    1999-01-01

    The most publicly justifiable application of human cloning, if there is one at all, is to provide self-compatible cells or tissues for medical use, especially transplantation. Some have argued that this raises no new ethical issues above those raised by any form of embryo experimentation. I argue that this research is less morally problematic than other embryo research. Indeed, it is not merely morally permissible but morally required that we employ cloning to produce embryos or fetuses for the sake of providing cells, tissues or even organs for therapy, followed by abortion of the embryo or fetus. PMID:10226910

  7. An efficient chaotic source coding scheme with variable-length blocks

    International Nuclear Information System (INIS)

    Lin Qiu-Zhen; Wong Kwok-Wo; Chen Jian-Yong

    2011-01-01

    An efficient chaotic source coding scheme operating on variable-length blocks is proposed. With the source message represented by a trajectory in the state space of a chaotic system, data compression is achieved when the dynamical system is adapted to the probability distribution of the source symbols. For infinite-precision computation, the theoretical compression performance of this chaotic coding approach attains that of optimal entropy coding. In finite-precision implementation, it can be realized by encoding variable-length blocks using a piecewise linear chaotic map within the precision of register length. In the decoding process, the bit shift in the register can track the synchronization of the initial value and the corresponding block. Therefore, all the variable-length blocks are decoded correctly. Simulation results show that the proposed scheme performs well with high efficiency and minor compression loss when compared with traditional entropy coding. (general)

  8. Coded aperture imaging of alpha source spatial distribution

    International Nuclear Information System (INIS)

    Talebitaher, Alireza; Shutler, Paul M.E.; Springham, Stuart V.; Rawat, Rajdeep S.; Lee, Paul

    2012-01-01

    The Coded Aperture Imaging (CAI) technique has been applied with CR-39 nuclear track detectors to image alpha particle source spatial distributions. The experimental setup comprised: a 226 Ra source of alpha particles, a laser-machined CAI mask, and CR-39 detectors, arranged inside a vacuum enclosure. Three different alpha particle source shapes were synthesized by using a linear translator to move the 226 Ra source within the vacuum enclosure. The coded mask pattern used is based on a Singer Cyclic Difference Set, with 400 pixels and 57 open square holes (representing ρ = 1/7 = 14.3% open fraction). After etching of the CR-39 detectors, the area, circularity, mean optical density and positions of all candidate tracks were measured by an automated scanning system. Appropriate criteria were used to select alpha particle tracks, and a decoding algorithm applied to the (x, y) data produced the de-coded image of the source. Signal to Noise Ratio (SNR) values obtained for alpha particle CAI images were found to be substantially better than those for corresponding pinhole images, although the CAI-SNR values were below the predictions of theoretical formulae. Monte Carlo simulations of CAI and pinhole imaging were performed in order to validate the theoretical SNR formulae and also our CAI decoding algorithm. There was found to be good agreement between the theoretical formulae and SNR values obtained from simulations. Possible reasons for the lower SNR obtained for the experimental CAI study are discussed.

  9. Heterogeneity of rat tropoelastin mRNA revealed by cDNA cloning

    International Nuclear Information System (INIS)

    Pierce, R.A.; Deak, S.B.; Stolle, C.A.; Boyd, C.D.

    1990-01-01

    A λgt11 library constructed from poly(A+) RNA isolated from aortic tissue of neonatal rats was screened for rat tropoelastin cDNAs. The first, screen, utilizing a human tropoelastin cDNA clone, provided rat tropoelastin cDNAs spanning 2.3 kb of carboxy-terminal coding sequence and extended into the 3'-untranslated region. A subsequent screen using a 5' rat tropoelastin cDNA clone yielded clones extending into the amino-terminal signal sequence coding region. Sequence analysis of these clones has provided the complete derived amino acid sequence of rat tropoelastin and allowed alignment and comparison with published bovine cDNA sequence. While the overall structure of rat tropoelastin is similar to bovine sequence, numerous substitutions, deletions, and insertions demonstrated considerable heterogeneity between species. In particular, the pentapeptide repeat VPGVG, characteristic of all tropoelastins analyzed to date, is replaced in rat tropoelastin by a repeating pentapeptide, IPGVG. The hexapeptide repeat VGVAPG, the bovine elastin receptor binding peptide, is not encoded by rat tropoelastin cDNAs. Variations in coding sequence between rat tropoelastin CDNA clones were also found which may represent mRNA heterogeneity produced by alternative splicing of the rat tropoelastin pre-mRNA

  10. An Efficient SF-ISF Approach for the Slepian-Wolf Source Coding Problem

    Directory of Open Access Journals (Sweden)

    Tu Zhenyu

    2005-01-01

    Full Text Available A simple but powerful scheme exploiting the binning concept for asymmetric lossless distributed source coding is proposed. The novelty in the proposed scheme is the introduction of a syndrome former (SF in the source encoder and an inverse syndrome former (ISF in the source decoder to efficiently exploit an existing linear channel code without the need to modify the code structure or the decoding strategy. For most channel codes, the construction of SF-ISF pairs is a light task. For parallelly and serially concatenated codes and particularly parallel and serial turbo codes where this appear less obvious, an efficient way for constructing linear complexity SF-ISF pairs is demonstrated. It is shown that the proposed SF-ISF approach is simple, provenly optimal, and generally applicable to any linear channel code. Simulation using conventional and asymmetric turbo codes demonstrates a compression rate that is only 0.06 bit/symbol from the theoretical limit, which is among the best results reported so far.

  11. Code of conduct on the safety and security of radioactive sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories.

  12. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories

  13. Cloning and over expression of non-coding RNA rprA in E.coli and its resistance to Kanamycin without osmotic shock.

    Science.gov (United States)

    Sahni, Azita; Hajjari, Mohammadreza; Raheb, Jamshid; Foroughmand, Ali Mohammad; Asgari, Morteza

    2017-01-01

    Recent reports have indicated that small RNAs have key roles in the response of the E.coli to stress and also in the regulating of virulence factors. It seems that some small non-coding RNAs are involved in multidrug resistance. Previous studies have indicated that rprA can increase the tolerance to Kanamycin in RcsB-deficient Escherichia coli K-12 following osmotic shock. The current study aims to clone and over-express the non-coding RNA rprA in E.coli and investigate its effect on the bacterial resistance to Kanamycin without any osmotic shock. For this purpose, rprA gene was amplified by the PCR and then cloned into the PET-28a (+) vector. The recombinant plasmid was transformed into wild type E.coli BL21 (DE3). The over expression was induced by IPTG and confirmed by qRT-PCR. The resistance to the kanamycin was then measured in different times by spectrophotometry. The statistical analysis showed that the rprA can increase the resistance to Kanamycin in Ecoli K12. The interaction between rprA and rpoS was reviewed and analyzed by in silico methods. The results showed that the bacteria with over-expressed rprA were more resistant to Kanamycin. The present study is an important step to prove the role of non-coding RNA rprA in bacterial resistance. The data can be the basis for future works and can also help to develop and deliver next-generation antibiotics.

  14. Open-Source Development of the Petascale Reactive Flow and Transport Code PFLOTRAN

    Science.gov (United States)

    Hammond, G. E.; Andre, B.; Bisht, G.; Johnson, T.; Karra, S.; Lichtner, P. C.; Mills, R. T.

    2013-12-01

    Open-source software development has become increasingly popular in recent years. Open-source encourages collaborative and transparent software development and promotes unlimited free redistribution of source code to the public. Open-source development is good for science as it reveals implementation details that are critical to scientific reproducibility, but generally excluded from journal publications. In addition, research funds that would have been spent on licensing fees can be redirected to code development that benefits more scientists. In 2006, the developers of PFLOTRAN open-sourced their code under the U.S. Department of Energy SciDAC-II program. Since that time, the code has gained popularity among code developers and users from around the world seeking to employ PFLOTRAN to simulate thermal, hydraulic, mechanical and biogeochemical processes in the Earth's surface/subsurface environment. PFLOTRAN is a massively-parallel subsurface reactive multiphase flow and transport simulator designed from the ground up to run efficiently on computing platforms ranging from the laptop to leadership-class supercomputers, all from a single code base. The code employs domain decomposition for parallelism and is founded upon the well-established and open-source parallel PETSc and HDF5 frameworks. PFLOTRAN leverages modern Fortran (i.e. Fortran 2003-2008) in its extensible object-oriented design. The use of this progressive, yet domain-friendly programming language has greatly facilitated collaboration in the code's software development. Over the past year, PFLOTRAN's top-level data structures were refactored as Fortran classes (i.e. extendible derived types) to improve the flexibility of the code, ease the addition of new process models, and enable coupling to external simulators. For instance, PFLOTRAN has been coupled to the parallel electrical resistivity tomography code E4D to enable hydrogeophysical inversion while the same code base can be used as a third

  15. OSSMETER D3.2 – Report on Source Code Activity Metrics

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and initial prototypes of the tools that are needed for source code activity analysis. It builds upon the Deliverable 3.1 where infra-structure and a domain analysis have been

  16. Java Source Code Analysis for API Migration to Embedded Systems

    Energy Technology Data Exchange (ETDEWEB)

    Winter, Victor [Univ. of Nebraska, Omaha, NE (United States); McCoy, James A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guerrero, Jonathan [Univ. of Nebraska, Omaha, NE (United States); Reinke, Carl Werner [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Perry, James Thomas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    Embedded systems form an integral part of our technological infrastructure and oftentimes play a complex and critical role within larger systems. From the perspective of reliability, security, and safety, strong arguments can be made favoring the use of Java over C in such systems. In part, this argument is based on the assumption that suitable subsets of Java’s APIs and extension libraries are available to embedded software developers. In practice, a number of Java-based embedded processors do not support the full features of the JVM. For such processors, source code migration is a mechanism by which key abstractions offered by APIs and extension libraries can made available to embedded software developers. The analysis required for Java source code-level library migration is based on the ability to correctly resolve element references to their corresponding element declarations. A key challenge in this setting is how to perform analysis for incomplete source-code bases (e.g., subsets of libraries) from which types and packages have been omitted. This article formalizes an approach that can be used to extend code bases targeted for migration in such a manner that the threats associated the analysis of incomplete code bases are eliminated.

  17. Using National Drug Codes and drug knowledge bases to organize prescription records from multiple sources.

    Science.gov (United States)

    Simonaitis, Linas; McDonald, Clement J

    2009-10-01

    The utility of National Drug Codes (NDCs) and drug knowledge bases (DKBs) in the organization of prescription records from multiple sources was studied. The master files of most pharmacy systems include NDCs and local codes to identify the products they dispense. We obtained a large sample of prescription records from seven different sources. These records carried a national product code or a local code that could be translated into a national product code via their formulary master. We obtained mapping tables from five DKBs. We measured the degree to which the DKB mapping tables covered the national product codes carried in or associated with the sample of prescription records. Considering the total prescription volume, DKBs covered 93.0-99.8% of the product codes from three outpatient sources and 77.4-97.0% of the product codes from four inpatient sources. Among the in-patient sources, invented codes explained 36-94% of the noncoverage. Outpatient pharmacy sources rarely invented codes, which comprised only 0.11-0.21% of their total prescription volume, compared with inpatient pharmacy sources for which invented codes comprised 1.7-7.4% of their prescription volume. The distribution of prescribed products was highly skewed, with 1.4-4.4% of codes accounting for 50% of the message volume and 10.7-34.5% accounting for 90% of the message volume. DKBs cover the product codes used by outpatient sources sufficiently well to permit automatic mapping. Changes in policies and standards could increase coverage of product codes used by inpatient sources.

  18. Joint source/channel coding of scalable video over noisy channels

    Energy Technology Data Exchange (ETDEWEB)

    Cheung, G.; Zakhor, A. [Department of Electrical Engineering and Computer Sciences University of California Berkeley, California94720 (United States)

    1997-01-01

    We propose an optimal bit allocation strategy for a joint source/channel video codec over noisy channel when the channel state is assumed to be known. Our approach is to partition source and channel coding bits in such a way that the expected distortion is minimized. The particular source coding algorithm we use is rate scalable and is based on 3D subband coding with multi-rate quantization. We show that using this strategy, transmission of video over very noisy channels still renders acceptable visual quality, and outperforms schemes that use equal error protection only. The flexibility of the algorithm also permits the bit allocation to be selected optimally when the channel state is in the form of a probability distribution instead of a deterministic state. {copyright} {ital 1997 American Institute of Physics.}

  19. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Fossorier Marc

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope -ary phase shift key ( -PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded -PSK signaling (with . Then, it is extended to include coded -PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded -PSK signaling performs 3.1 to 5.2 dB better than uncoded -PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  20. Why Clone?

    Science.gov (United States)

    ... than expected. Could we really clone dinosaurs? In theory? Yes. You would need: A well-preserved source ... it raises a number of ethical, legal, and social challenges that need to be considered. The vast ...

  1. Source Coding for Wireless Distributed Microphones in Reverberant Environments

    DEFF Research Database (Denmark)

    Zahedi, Adel

    2016-01-01

    . However, it comes with the price of several challenges, including the limited power and bandwidth resources for wireless transmission of audio recordings. In such a setup, we study the problem of source coding for the compression of the audio recordings before the transmission in order to reduce the power...... consumption and/or transmission bandwidth by reduction in the transmission rates. Source coding for wireless microphones in reverberant environments has several special characteristics which make it more challenging in comparison with regular audio coding. The signals which are acquired by the microphones......Modern multimedia systems are more and more shifting toward distributed and networked structures. This includes audio systems, where networks of wireless distributed microphones are replacing the traditional microphone arrays. This allows for flexibility of placement and high spatial diversity...

  2. Asymmetric Joint Source-Channel Coding for Correlated Sources with Blind HMM Estimation at the Receiver

    Directory of Open Access Journals (Sweden)

    Ser Javier Del

    2005-01-01

    Full Text Available We consider the case of two correlated sources, and . The correlation between them has memory, and it is modelled by a hidden Markov chain. The paper studies the problem of reliable communication of the information sent by the source over an additive white Gaussian noise (AWGN channel when the output of the other source is available as side information at the receiver. We assume that the receiver has no a priori knowledge of the correlation statistics between the sources. In particular, we propose the use of a turbo code for joint source-channel coding of the source . The joint decoder uses an iterative scheme where the unknown parameters of the correlation model are estimated jointly within the decoding process. It is shown that reliable communication is possible at signal-to-noise ratios close to the theoretical limits set by the combination of Shannon and Slepian-Wolf theorems.

  3. Brain cDNA clone for human cholinesterase

    International Nuclear Information System (INIS)

    McTiernan, C.; Adkins, S.; Chatonnet, A.; Vaughan, T.A.; Bartels, C.F.; Kott, M.; Rosenberry, T.L.; La Du, B.N.; Lockridge, O.

    1987-01-01

    A cDNA library from human basal ganglia was screened with oligonucleotide probes corresponding to portions of the amino acid sequence of human serum cholinesterase. Five overlapping clones, representing 2.4 kilobases, were isolated. The sequenced cDNA contained 207 base pairs of coding sequence 5' to the amino terminus of the mature protein in which there were four ATG translation start sites in the same reading frame as the protein. Only the ATG coding for Met-(-28) lay within a favorable consensus sequence for functional initiators. There were 1722 base pairs of coding sequence corresponding to the protein found circulating in human serum. The amino acid sequence deduced from the cDNA exactly matched the 574 amino acid sequence of human serum cholinesterase, as previously determined by Edman degradation. Therefore, our clones represented cholinesterase rather than acetylcholinesterase. It was concluded that the amino acid sequences of cholinesterase from two different tissues, human brain and human serum, were identical. Hybridization of genomic DNA blots suggested that a single gene, or very few genes coded for cholinesterase

  4. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Marc Fossorier

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope M-ary phase shift key (M-PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded M-PSK signaling (with M=2k. Then, it is extended to include coded M-PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded M-PSK signaling performs 3.1 to 5.2 dB better than uncoded M-PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  5. Comparison of DT neutron production codes MCUNED, ENEA-JSI source subroutine and DDT

    Energy Technology Data Exchange (ETDEWEB)

    Čufar, Aljaž, E-mail: aljaz.cufar@ijs.si [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia); Lengar, Igor; Kodeli, Ivan [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia); Milocco, Alberto [Culham Centre for Fusion Energy, Culham Science Centre, Abingdon, OX14 3DB (United Kingdom); Sauvan, Patrick [Departamento de Ingeniería Energética, E.T.S. Ingenieros Industriales, UNED, C/Juan del Rosal 12, 28040 Madrid (Spain); Conroy, Sean [VR Association, Uppsala University, Department of Physics and Astronomy, PO Box 516, SE-75120 Uppsala (Sweden); Snoj, Luka [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia)

    2016-11-01

    Highlights: • Results of three codes capable of simulating the accelerator based DT neutron generators were compared on a simple model where only a thin target made of mixture of titanium and tritium is present. Two typical deuteron beam energies, 100 keV and 250 keV, were used in the comparison. • Comparisons of the angular dependence of the total neutron flux and spectrum as well as the neutron spectrum of all the neutrons emitted from the target show general agreement of the results but also some noticeable differences. • A comparison of figures of merit of the calculations using different codes showed that the computational time necessary to achieve the same statistical uncertainty can vary for more than 30× when different codes for the simulation of the DT neutron generator are used. - Abstract: As the DT fusion reaction produces neutrons with energies significantly higher than in fission reactors, special fusion-relevant benchmark experiments are often performed using DT neutron generators. However, commonly used Monte Carlo particle transport codes such as MCNP or TRIPOLI cannot be directly used to analyze these experiments since they do not have the capabilities to model the production of DT neutrons. Three of the available approaches to model the DT neutron generator source are the MCUNED code, the ENEA-JSI DT source subroutine and the DDT code. The MCUNED code is an extension of the well-established and validated MCNPX Monte Carlo code. The ENEA-JSI source subroutine was originally prepared for the modelling of the FNG experiments using different versions of the MCNP code (−4, −5, −X) and was later extended to allow the modelling of both DT and DD neutron sources. The DDT code prepares the DT source definition file (SDEF card in MCNP) which can then be used in different versions of the MCNP code. In the paper the methods for the simulation of the DT neutron production used in the codes are briefly described and compared for the case of a

  6. Cost-effective sequencing of full-length cDNA clones powered by a de novo-reference hybrid assembly.

    Science.gov (United States)

    Kuroshu, Reginaldo M; Watanabe, Junichi; Sugano, Sumio; Morishita, Shinichi; Suzuki, Yutaka; Kasahara, Masahiro

    2010-05-07

    Sequencing full-length cDNA clones is important to determine gene structures including alternative splice forms, and provides valuable resources for experimental analyses to reveal the biological functions of coded proteins. However, previous approaches for sequencing cDNA clones were expensive or time-consuming, and therefore, a fast and efficient sequencing approach was demanded. We developed a program, MuSICA 2, that assembles millions of short (36-nucleotide) reads collected from a single flow cell lane of Illumina Genome Analyzer to shotgun-sequence approximately 800 human full-length cDNA clones. MuSICA 2 performs a hybrid assembly in which an external de novo assembler is run first and the result is then improved by reference alignment of shotgun reads. We compared the MuSICA 2 assembly with 200 pooled full-length cDNA clones finished independently by the conventional primer-walking using Sanger sequencers. The exon-intron structure of the coding sequence was correct for more than 95% of the clones with coding sequence annotation when we excluded cDNA clones insufficiently represented in the shotgun library due to PCR failure (42 out of 200 clones excluded), and the nucleotide-level accuracy of coding sequences of those correct clones was over 99.99%. We also applied MuSICA 2 to full-length cDNA clones from Toxoplasma gondii, to confirm that its ability was competent even for non-human species. The entire sequencing and shotgun assembly takes less than 1 week and the consumables cost only approximately US$3 per clone, demonstrating a significant advantage over previous approaches.

  7. Joint Source-Channel Coding by Means of an Oversampled Filter Bank Code

    Directory of Open Access Journals (Sweden)

    Marinkovic Slavica

    2006-01-01

    Full Text Available Quantized frame expansions based on block transforms and oversampled filter banks (OFBs have been considered recently as joint source-channel codes (JSCCs for erasure and error-resilient signal transmission over noisy channels. In this paper, we consider a coding chain involving an OFB-based signal decomposition followed by scalar quantization and a variable-length code (VLC or a fixed-length code (FLC. This paper first examines the problem of channel error localization and correction in quantized OFB signal expansions. The error localization problem is treated as an -ary hypothesis testing problem. The likelihood values are derived from the joint pdf of the syndrome vectors under various hypotheses of impulse noise positions, and in a number of consecutive windows of the received samples. The error amplitudes are then estimated by solving the syndrome equations in the least-square sense. The message signal is reconstructed from the corrected received signal by a pseudoinverse receiver. We then improve the error localization procedure by introducing a per-symbol reliability information in the hypothesis testing procedure of the OFB syndrome decoder. The per-symbol reliability information is produced by the soft-input soft-output (SISO VLC/FLC decoders. This leads to the design of an iterative algorithm for joint decoding of an FLC and an OFB code. The performance of the algorithms developed is evaluated in a wavelet-based image coding system.

  8. Distributed Remote Vector Gaussian Source Coding for Wireless Acoustic Sensor Networks

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2014-01-01

    In this paper, we consider the problem of remote vector Gaussian source coding for a wireless acoustic sensor network. Each node receives messages from multiple nodes in the network and decodes these messages using its own measurement of the sound field as side information. The node’s measurement...... and the estimates of the source resulting from decoding the received messages are then jointly encoded and transmitted to a neighboring node in the network. We show that for this distributed source coding scenario, one can encode a so-called conditional sufficient statistic of the sources instead of jointly...

  9. Therapeutic cloning: The ethical limits

    International Nuclear Information System (INIS)

    Whittaker, Peter A.

    2005-01-01

    A brief outline of stem cells, stem cell therapy and therapeutic cloning is given. The position of therapeutic cloning with regard to other embryonic manipulations - IVF-based reproduction, embryonic stem formation from IVF embryos and reproductive cloning - is indicated. The main ethically challenging stages in therapeutic cloning are considered to be the nuclear transfer process including the source of eggs for this and the destruction of an embryo to provide stem cells for therapeutic use. The extremely polarised nature of the debate regarding the status of an early human embryo is noted, and some potential alternative strategies for preparing immunocompatible pluripotent stem cells are indicated

  10. Test of Effective Solid Angle code for the efficiency calculation of volume source

    Energy Technology Data Exchange (ETDEWEB)

    Kang, M. Y.; Kim, J. H.; Choi, H. D. [Seoul National Univ., Seoul (Korea, Republic of); Sun, G. M. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    It is hard to determine a full energy (FE) absorption peak efficiency curve for an arbitrary volume source by experiment. That's why the simulation and semi-empirical methods have been preferred so far, and many works have progressed in various ways. Moens et al. determined the concept of effective solid angle by considering an attenuation effect of γ-rays in source, media and detector. This concept is based on a semi-empirical method. An Effective Solid Angle code (ESA code) has been developed for years by the Applied Nuclear Physics Group in Seoul National University. ESA code converts an experimental FE efficiency curve determined by using a standard point source to that for a volume source. To test the performance of ESA Code, we measured the point standard sources and voluminous certified reference material (CRM) sources of γ-ray, and compared with efficiency curves obtained in this study. 200∼1500 KeV energy region is fitted well. NIST X-ray mass attenuation coefficient data is used currently to check for the effect of linear attenuation only. We will use the interaction cross-section data obtained from XCOM code to check the each contributing factor like photoelectric effect, incoherent scattering and coherent scattering in the future. In order to minimize the calculation time and code simplification, optimization of algorithm is needed.

  11. Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey

    Directory of Open Access Journals (Sweden)

    Pierre Siohan

    2005-05-01

    Full Text Available Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC and variable-length source codes (VLC widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.

  12. Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey

    Science.gov (United States)

    Guillemot, Christine; Siohan, Pierre

    2005-12-01

    Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS) provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD) strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM) capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC) and variable-length source codes (VLC) widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.

  13. Cloning, killing, and identity.

    Science.gov (United States)

    McMahan, J

    1999-01-01

    One potentially valuable use of cloning is to provide a source of tissues or organs for transplantation. The most important objection to this use of cloning is that a human clone would be the sort of entity that it would be seriously wrong to kill. I argue that entities of the sort that you and I essentially are do not begin to exist until around the seventh month of fetal gestation. Therefore to kill a clone prior to that would not be to kill someone like you or me but would be only to prevent one of us from existing. And even after one of us begins to exist, the objections to killing it remain comparatively weak until its psychological capacities reach a certain level of maturation. These claims support the permissibility of killing a clone during the early stages of its development in order to use its organs for transplantation. PMID:10226909

  14. Hybrid sequencing approach applied to human fecal metagenomic clone libraries revealed clones with potential biotechnological applications.

    Science.gov (United States)

    Džunková, Mária; D'Auria, Giuseppe; Pérez-Villarroya, David; Moya, Andrés

    2012-01-01

    Natural environments represent an incredible source of microbial genetic diversity. Discovery of novel biomolecules involves biotechnological methods that often require the design and implementation of biochemical assays to screen clone libraries. However, when an assay is applied to thousands of clones, one may eventually end up with very few positive clones which, in most of the cases, have to be "domesticated" for downstream characterization and application, and this makes screening both laborious and expensive. The negative clones, which are not considered by the selected assay, may also have biotechnological potential; however, unfortunately they would remain unexplored. Knowledge of the clone sequences provides important clues about potential biotechnological application of the clones in the library; however, the sequencing of clones one-by-one would be very time-consuming and expensive. In this study, we characterized the first metagenomic clone library from the feces of a healthy human volunteer, using a method based on 454 pyrosequencing coupled with a clone-by-clone Sanger end-sequencing. Instead of whole individual clone sequencing, we sequenced 358 clones in a pool. The medium-large insert (7-15 kb) cloning strategy allowed us to assemble these clones correctly, and to assign the clone ends to maintain the link between the position of a living clone in the library and the annotated contig from the 454 assembly. Finally, we found several open reading frames (ORFs) with previously described potential medical application. The proposed approach allows planning ad-hoc biochemical assays for the clones of interest, and the appropriate sub-cloning strategy for gene expression in suitable vectors/hosts.

  15. [Mystery and problems of cloning].

    Science.gov (United States)

    Nikitin, V A

    2010-01-01

    The attention of investigators is attracted to the fact that, in spite of great efforts in mammalian cloning, advances that have been made in this area of research are not great, and cloned animals have developmental pathologies often incompatible with life and/or reproduction ability. It is yet not clear what technical or biological factors underlie this, and how they are connected or interact with each other, which is more realistic strategically. There is a great number of articles dealing with the influence of cloning with the nuclear transfer on genetic and epigenetic reprogramming of donor cells. At the same time we can see the practical absence of analytical investigations concerning the technology of cloning as such, its weak points, and possible sources of cellular trauma in the course of microsurgery of nuclear transfer or twinning. This article discusses step by step several nuclear transfer techniques and the methods of dividing early preimplanted embryos for twinning with the aim to reveal possible sources of cell damage during micromanipulation that may have negative influence on the development of cloned organisms. Several new author's technologies based on the study of cell biophysical characteristics are described, which allow one to avoid cellular trauma during manipulation and minimize the possibility of cell damage at any rate.

  16. Model-Based Least Squares Reconstruction of Coded Source Neutron Radiographs: Integrating the ORNL HFIR CG1D Source Model

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J [ORNL; Gregor, Jens [University of Tennessee, Knoxville (UTK); Bingham, Philip R [ORNL

    2014-01-01

    At the present, neutron sources cannot be fabricated small and powerful enough in order to achieve high resolution radiography while maintaining an adequate flux. One solution is to employ computational imaging techniques such as a Magnified Coded Source Imaging (CSI) system. A coded-mask is placed between the neutron source and the object. The system resolution is increased by reducing the size of the mask holes and the flux is increased by increasing the size of the coded-mask and/or the number of holes. One limitation of such system is that the resolution of current state-of-the-art scintillator-based detectors caps around 50um. To overcome this challenge, the coded-mask and object are magnified by making the distance from the coded-mask to the object much smaller than the distance from object to detector. In previous work, we have shown via synthetic experiments that our least squares method outperforms other methods in image quality and reconstruction precision because of the modeling of the CSI system components. However, the validation experiments were limited to simplistic neutron sources. In this work, we aim to model the flux distribution of a real neutron source and incorporate such a model in our least squares computational system. We provide a full description of the methodology used to characterize the neutron source and validate the method with synthetic experiments.

  17. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    Science.gov (United States)

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  18. Sequence of a cloned cDNA encoding human ribosomal protein S11

    Energy Technology Data Exchange (ETDEWEB)

    Lott, J B; Mackie, G A

    1988-02-11

    The authors have isolated a cloned cDNA that encodes human ribosomal protein (rp) S11 by screening a human fibroblast cDNA library with a labelled 204 bp DNA fragment encompassing residues 212-416 of pRS11, a rat rp Sll cDNA clone. The human rp S11 cloned cDNA consists of 15 residues of the 5' leader, the entire coding sequence and all 51 residues of the 3' untranslated region. The predicted amino acid sequence of 158 residues is identical to rat rpS11. The nucleotide sequence in the coding region differs, however, from that in rat in the first position in two codons and in the third position in 44 codons.

  19. Hybrid sequencing approach applied to human fecal metagenomic clone libraries revealed clones with potential biotechnological applications.

    Directory of Open Access Journals (Sweden)

    Mária Džunková

    Full Text Available Natural environments represent an incredible source of microbial genetic diversity. Discovery of novel biomolecules involves biotechnological methods that often require the design and implementation of biochemical assays to screen clone libraries. However, when an assay is applied to thousands of clones, one may eventually end up with very few positive clones which, in most of the cases, have to be "domesticated" for downstream characterization and application, and this makes screening both laborious and expensive. The negative clones, which are not considered by the selected assay, may also have biotechnological potential; however, unfortunately they would remain unexplored. Knowledge of the clone sequences provides important clues about potential biotechnological application of the clones in the library; however, the sequencing of clones one-by-one would be very time-consuming and expensive. In this study, we characterized the first metagenomic clone library from the feces of a healthy human volunteer, using a method based on 454 pyrosequencing coupled with a clone-by-clone Sanger end-sequencing. Instead of whole individual clone sequencing, we sequenced 358 clones in a pool. The medium-large insert (7-15 kb cloning strategy allowed us to assemble these clones correctly, and to assign the clone ends to maintain the link between the position of a living clone in the library and the annotated contig from the 454 assembly. Finally, we found several open reading frames (ORFs with previously described potential medical application. The proposed approach allows planning ad-hoc biochemical assays for the clones of interest, and the appropriate sub-cloning strategy for gene expression in suitable vectors/hosts.

  20. Code of conduct on the safety and security of radioactive sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The objective of this Code is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through tile fostering of international co-operation. In particular, this Code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost.

  1. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    2001-03-01

    The objective of this Code is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through tile fostering of international co-operation. In particular, this Code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost

  2. The Astrophysics Source Code Library: Supporting software publication and citation

    Science.gov (United States)

    Allen, Alice; Teuben, Peter

    2018-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net), established in 1999, is a free online registry for source codes used in research that has appeared in, or been submitted to, peer-reviewed publications. The ASCL is indexed by the SAO/NASA Astrophysics Data System (ADS) and Web of Science and is citable by using the unique ascl ID assigned to each code. In addition to registering codes, the ASCL can house archive files for download and assign them DOIs. The ASCL advocations for software citation on par with article citation, participates in multidiscipinary events such as Force11, OpenCon, and the annual Workshop on Sustainable Software for Science, works with journal publishers, and organizes Special Sessions and Birds of a Feather meetings at national and international conferences such as Astronomical Data Analysis Software and Systems (ADASS), European Week of Astronomy and Space Science, and AAS meetings. In this presentation, I will discuss some of the challenges of gathering credit for publishing software and ideas and efforts from other disciplines that may be useful to astronomy.

  3. Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images

    Directory of Open Access Journals (Sweden)

    Barni Mauro

    2007-01-01

    Full Text Available This paper deals with the application of distributed source coding (DSC theory to remote sensing image compression. Although DSC exhibits a significant potential in many application fields, up till now the results obtained on real signals fall short of the theoretical bounds, and often impose additional system-level constraints. The objective of this paper is to assess the potential of DSC for lossless image compression carried out onboard a remote platform. We first provide a brief overview of DSC of correlated information sources. We then focus on onboard lossless image compression, and apply DSC techniques in order to reduce the complexity of the onboard encoder, at the expense of the decoder's, by exploiting the correlation of different bands of a hyperspectral dataset. Specifically, we propose two different compression schemes, one based on powerful binary error-correcting codes employed as source codes, and one based on simpler multilevel coset codes. The performance of both schemes is evaluated on a few AVIRIS scenes, and is compared with other state-of-the-art 2D and 3D coders. Both schemes turn out to achieve competitive compression performance, and one of them also has reduced complexity. Based on these results, we highlight the main issues that are still to be solved to further improve the performance of DSC-based remote sensing systems.

  4. Remodularizing Java Programs for Improved Locality of Feature Implementations in Source Code

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2011-01-01

    Explicit traceability between features and source code is known to help programmers to understand and modify programs during maintenance tasks. However, the complex relations between features and their implementations are not evident from the source code of object-oriented Java programs....... Consequently, the implementations of individual features are difficult to locate, comprehend, and modify in isolation. In this paper, we present a novel remodularization approach that improves the representation of features in the source code of Java programs. Both forward- and reverse restructurings...... are supported through on-demand bidirectional restructuring between feature-oriented and object-oriented decompositions. The approach includes a feature location phase based of tracing program execution, a feature representation phase that reallocates classes into a new package structure based on single...

  5. Distributed coding of multiview sparse sources with joint recovery

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Deligiannis, Nikos; Forchhammer, Søren

    2016-01-01

    In support of applications involving multiview sources in distributed object recognition using lightweight cameras, we propose a new method for the distributed coding of sparse sources as visual descriptor histograms extracted from multiview images. The problem is challenging due to the computati...... transform (SIFT) descriptors extracted from multiview images shows that our method leads to bit-rate saving of up to 43% compared to the state-of-the-art distributed compressed sensing method with independent encoding of the sources....

  6. Revised IAEA Code of Conduct on the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Wheatley, J. S.

    2004-01-01

    The revised Code of Conduct on the Safety and Security of Radioactive Sources is aimed primarily at Governments, with the objective of achieving and maintaining a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations; and through the fostering of international co-operation. It focuses on sealed radioactive sources and provides guidance on legislation, regulations and the regulatory body, and import/export controls. Nuclear materials (except for sources containing 239Pu), as defined in the Convention on the Physical Protection of Nuclear Materials, are not covered by the revised Code, nor are radioactive sources within military or defence programmes. An earlier version of the Code was published by IAEA in 2001. At that time, agreement was not reached on a number of issues, notably those relating to the creation of comprehensive national registries for radioactive sources, obligations of States exporting radioactive sources, and the possibility of unilateral declarations of support. The need to further consider these and other issues was highlighted by the events of 11th September 2001. Since then, the IAEA's Secretariat has been working closely with Member States and relevant International Organizations to achieve consensus. The text of the revised Code was finalized at a meeting of technical and legal experts in August 2003, and it was submitted to IAEA's Board of Governors for approval in September 2003, with a recommendation that the IAEA General Conference adopt it and encourage its wide implementation. The IAEA General Conference, in September 2003, endorsed the revised Code and urged States to work towards following the guidance contained within it. This paper summarizes the history behind the revised Code, its content and the outcome of the discussions within the IAEA Board of Governors and General Conference. (Author) 8 refs

  7. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    Anon.

    2001-01-01

    The objective of the code of conduct is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through the fostering of international co-operation. In particular, this code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost. (N.C.)

  8. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks.

    Science.gov (United States)

    Kim, Daehee; Kim, Dongwan; An, Sunshin

    2016-07-09

    Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.

  9. Distributed Remote Vector Gaussian Source Coding with Covariance Distortion Constraints

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2014-01-01

    In this paper, we consider a distributed remote source coding problem, where a sequence of observations of source vectors is available at the encoder. The problem is to specify the optimal rate for encoding the observations subject to a covariance matrix distortion constraint and in the presence...

  10. [Cloning and law in Hungary].

    Science.gov (United States)

    Julesz, Máté

    2015-03-01

    Reproductive human cloning is prohibited in Hungary, as in many other countries. Therapeutic human cloning is not prohibited, just like in many other countries. Stem cell therapy is also allowed. Article III, paragraph (3) of the Hungarian basic law (constitution) strictly forbids total human cloning. Article 1 of the Additional Protocol to the Oviedo Convention, on the Prohibition of Cloning Human Beings (1998) stipulates that any intervention seeking to create a human being genetically identical to another human being, whether living or dead, is prohibited. In Hungary, according to Article 174 of the Criminal Code, total human cloning constitutes a crime. Article 180, paragraph (3) of the Hungarian Act on Health declares that embryos shall not be brought about for research purposes; research shall be conducted only on embryos brought about for reproductive purposes when this is authorized by the persons entitled to decide upon its disposal, or when the embryo is damaged. Article 180, paragraph (5) of the Hungarian Act on Health stipulates that multiple individuals who genetically conform to one another shall not be brought about. According to Article 181, paragraph (1) of the Hungarian Act on Health, an embryo used for research shall be kept alive for not longer than 14 days, not counting the time it was frozen for storage and the time period of research.

  11. IllinoisGRMHD: an open-source, user-friendly GRMHD code for dynamical spacetimes

    International Nuclear Information System (INIS)

    Etienne, Zachariah B; Paschalidis, Vasileios; Haas, Roland; Mösta, Philipp; Shapiro, Stuart L

    2015-01-01

    In the extreme violence of merger and mass accretion, compact objects like black holes and neutron stars are thought to launch some of the most luminous outbursts of electromagnetic and gravitational wave energy in the Universe. Modeling these systems realistically is a central problem in theoretical astrophysics, but has proven extremely challenging, requiring the development of numerical relativity codes that solve Einstein's equations for the spacetime, coupled to the equations of general relativistic (ideal) magnetohydrodynamics (GRMHD) for the magnetized fluids. Over the past decade, the Illinois numerical relativity (ILNR) group's dynamical spacetime GRMHD code has proven itself as a robust and reliable tool for theoretical modeling of such GRMHD phenomena. However, the code was written ‘by experts and for experts’ of the code, with a steep learning curve that would severely hinder community adoption if it were open-sourced. Here we present IllinoisGRMHD, which is an open-source, highly extensible rewrite of the original closed-source GRMHD code of the ILNR group. Reducing the learning curve was the primary focus of this rewrite, with the goal of facilitating community involvement in the code's use and development, as well as the minimization of human effort in generating new science. IllinoisGRMHD also saves computer time, generating roundoff-precision identical output to the original code on adaptive-mesh grids, but nearly twice as fast at scales of hundreds to thousands of cores. (paper)

  12. Domain-Specific Acceleration and Auto-Parallelization of Legacy Scientific Code in FORTRAN 77 using Source-to-Source Compilation

    OpenAIRE

    Vanderbauwhede, Wim; Davidson, Gavin

    2017-01-01

    Massively parallel accelerators such as GPGPUs, manycores and FPGAs represent a powerful and affordable tool for scientists who look to speed up simulations of complex systems. However, porting code to such devices requires a detailed understanding of heterogeneous programming tools and effective strategies for parallelization. In this paper we present a source to source compilation approach with whole-program analysis to automatically transform single-threaded FORTRAN 77 legacy code into Ope...

  13. Automating RPM Creation from a Source Code Repository

    Science.gov (United States)

    2012-02-01

    apps/usr --with- libpq=/apps/ postgres make rm -rf $RPM_BUILD_ROOT umask 0077 mkdir -p $RPM_BUILD_ROOT/usr/local/bin mkdir -p $RPM_BUILD_ROOT...from a source code repository. %pre %prep %setup %build ./autogen.sh ; ./configure --with-db=/apps/db --with-libpq=/apps/ postgres make

  14. Development of in-vessel source term analysis code, tracer

    International Nuclear Information System (INIS)

    Miyagi, K.; Miyahara, S.

    1996-01-01

    Analyses of radionuclide transport in fuel failure accidents (generally referred to source terms) are considered to be important especially in the severe accident evaluation. The TRACER code has been developed to realistically predict the time dependent behavior of FPs and aerosols within the primary cooling system for wide range of fuel failure events. This paper presents the model description, results of validation study, the recent model advancement status of the code, and results of check out calculations under reactor conditions. (author)

  15. Source Coding in Networks with Covariance Distortion Constraints

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2016-01-01

    results to a joint source coding and denoising problem. We consider a network with a centralized topology and a given weighted sum-rate constraint, where the received signals at the center are to be fused to maximize the output SNR while enforcing no linear distortion. We show that one can design...

  16. Use of source term code package in the ELEBRA MX-850 system

    International Nuclear Information System (INIS)

    Guimaraes, A.C.F.; Goes, A.G.A.

    1988-12-01

    The implantation of source term code package in the ELEBRA-MX850 system is presented. The source term is formed when radioactive materials generated in nuclear fuel leakage toward containment and the external environment to reactor containment. The implantated version in the ELEBRA system are composed of five codes: MARCH 3, TRAPMELT 3, THCCA, VANESA and NAVA. The original example case was used. The example consists of a small loca accident in a PWR type reactor. A sensitivity study for the TRAPMELT 3 code was carried out, modifying the 'TIME STEP' to estimate the processing time of CPU for executing the original example case. (M.C.K.) [pt

  17. Evaluating Open-Source Full-Text Search Engines for Matching ICD-10 Codes.

    Science.gov (United States)

    Jurcău, Daniel-Alexandru; Stoicu-Tivadar, Vasile

    2016-01-01

    This research presents the results of evaluating multiple free, open-source engines on matching ICD-10 diagnostic codes via full-text searches. The study investigates what it takes to get an accurate match when searching for a specific diagnostic code. For each code the evaluation starts by extracting the words that make up its text and continues with building full-text search queries from the combinations of these words. The queries are then run against all the ICD-10 codes until a match indicates the code in question as a match with the highest relative score. This method identifies the minimum number of words that must be provided in order for the search engines choose the desired entry. The engines analyzed include a popular Java-based full-text search engine, a lightweight engine written in JavaScript which can even execute on the user's browser, and two popular open-source relational database management systems.

  18. Artificial cloning of domestic animals.

    Science.gov (United States)

    Keefer, Carol L

    2015-07-21

    Domestic animals can be cloned using techniques such as embryo splitting and nuclear transfer to produce genetically identical individuals. Although embryo splitting is limited to the production of only a few identical individuals, nuclear transfer of donor nuclei into recipient oocytes, whose own nuclear DNA has been removed, can result in large numbers of identical individuals. Moreover, clones can be produced using donor cells from sterile animals, such as steers and geldings, and, unlike their genetic source, these clones are fertile. In reality, due to low efficiencies and the high costs of cloning domestic species, only a limited number of identical individuals are generally produced, and these clones are primarily used as breed stock. In addition to providing a means of rescuing and propagating valuable genetics, somatic cell nuclear transfer (SCNT) research has contributed knowledge that has led to the direct reprogramming of cells (e.g., to induce pluripotent stem cells) and a better understanding of epigenetic regulation during embryonic development. In this review, I provide a broad overview of the historical development of cloning in domestic animals, of its application to the propagation of livestock and transgenic animal production, and of its scientific promise for advancing basic research.

  19. Lovely clone of coconuts

    Energy Technology Data Exchange (ETDEWEB)

    Branton, R.; Blake, J.

    1983-05-01

    It has taken over 10 years research and development to clone oil palms and coconut palms successfully. Unilever has recently built a tissue culture factory in England with a potential capacity for producing half a million clonal oil palms a year for export. Research on the cloning of coconut palms is reported here. Cloned palms may increase yields from oil palms by 20 to 30 percent and yields from coconut could be as high as five-fold over unselected stock. Improved yields would not only increase the yield of oil and copra but also the harvests of husk and shell which are immense potential sources of energy; the 1978 Philippine harvest of over 12 million nuts is equivalent in terms of energy to 3.8 billion litres of petrol (31 x 10/sup 12/ kcal).

  20. Molecular cloning of the human gene for von Willebrand factor and identification of the transcription initiation site

    International Nuclear Information System (INIS)

    Collins, C.J.; Underdahl, J.P.; Levene, R.B.; Ravera, C.P.; Morin, M.J.; Dombalagian, M.J.; Ricca, G.; Livingston, D.M.; Lynch, D.C.

    1987-01-01

    A series of overlapping cosmid genomic clones have been isolated that contain the entire coding unit of the human gene for van Willebrand factor (vWf), a major component of the hemostatic system. The cloned segments span ≅ 175 kilobases of human DNA sequence, and hybridization analysis suggest that the vWf coding unit is ≅150 kilobases in length. Within one of these clones, the vWF transcription initiation site has been mapped and a portion of the vWf promoter region has been sequenced, revealing a typical TATA box, a downstream CCAAT box, and a perfect downstream repeat of the 8 base pairs containing the transcription start site. Sequencing of a segment of another genomic clone has revealed the vWF translation termination codon. Where tested, comparative restriction analysis of cloned and chromosomal DNA segments strongly suggests that no major alterations occurred during cloning and that there is only one complete copy of the vWf gene in the human haploid genome. Similar analyses of DNA from vWf-producing endothelial cells and nonexpressing leukocytes suggest that vWf gene expression is not accompanied by gross genomic rearrangements. In addition, there is significant homology of C-terminal coding sequences among the vWf genes of several vertebrate species

  1. Molecular cloning of a peptidylglycine alpha-hydroxylating monooxygenase from sea anemones

    DEFF Research Database (Denmark)

    Hauser, F; Williamson, M; Grimmelikhuijzen, C J

    1997-01-01

    conserved regions of PHM, we have now cloned a PHM from the sea anemone Calliactis parasitica showing 42% amino acid sequence identity with rat PHM. Among the conserved (identical) amino acid residues are five histidine and one methionine residue, which bind two Cu2+ atoms that are essential for PHM...... activity. No cDNA coding for PAL could be identified, suggesting that sea anemone PAL is coded for by a gene that is different from the sea anemone PHM gene, a situation similar to the one found in insects. This is the first report on the molecular cloning of a cnidarian PHM. Udgivelsesdato: 1997-Dec-18...

  2. Detecting Source Code Plagiarism on .NET Programming Languages using Low-level Representation and Adaptive Local Alignment

    Directory of Open Access Journals (Sweden)

    Oscar Karnalim

    2017-01-01

    Full Text Available Even though there are various source code plagiarism detection approaches, only a few works which are focused on low-level representation for deducting similarity. Most of them are only focused on lexical token sequence extracted from source code. In our point of view, low-level representation is more beneficial than lexical token since its form is more compact than the source code itself. It only considers semantic-preserving instructions and ignores many source code delimiter tokens. This paper proposes a source code plagiarism detection which rely on low-level representation. For a case study, we focus our work on .NET programming languages with Common Intermediate Language as its low-level representation. In addition, we also incorporate Adaptive Local Alignment for detecting similarity. According to Lim et al, this algorithm outperforms code similarity state-of-the-art algorithm (i.e. Greedy String Tiling in term of effectiveness. According to our evaluation which involves various plagiarism attacks, our approach is more effective and efficient when compared with standard lexical-token approach.

  3. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks †

    Science.gov (United States)

    Kim, Daehee; Kim, Dongwan; An, Sunshin

    2016-01-01

    Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption. PMID:27409616

  4. Optimal power allocation and joint source-channel coding for wireless DS-CDMA visual sensor networks

    Science.gov (United States)

    Pandremmenou, Katerina; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.

    2011-01-01

    In this paper, we propose a scheme for the optimal allocation of power, source coding rate, and channel coding rate for each of the nodes of a wireless Direct Sequence Code Division Multiple Access (DS-CDMA) visual sensor network. The optimization is quality-driven, i.e. the received quality of the video that is transmitted by the nodes is optimized. The scheme takes into account the fact that the sensor nodes may be imaging scenes with varying levels of motion. Nodes that image low-motion scenes will require a lower source coding rate, so they will be able to allocate a greater portion of the total available bit rate to channel coding. Stronger channel coding will mean that such nodes will be able to transmit at lower power. This will both increase battery life and reduce interference to other nodes. Two optimization criteria are considered. One that minimizes the average video distortion of the nodes and one that minimizes the maximum distortion among the nodes. The transmission powers are allowed to take continuous values, whereas the source and channel coding rates can assume only discrete values. Thus, the resulting optimization problem lies in the field of mixed-integer optimization tasks and is solved using Particle Swarm Optimization. Our experimental results show the importance of considering the characteristics of the video sequences when determining the transmission power, source coding rate and channel coding rate for the nodes of the visual sensor network.

  5. Microdosimetry computation code of internal sources - MICRODOSE 1

    International Nuclear Information System (INIS)

    Li Weibo; Zheng Wenzhong; Ye Changqing

    1995-01-01

    This paper describes a microdosimetry computation code, MICRODOSE 1, on the basis of the following described methods: (1) the method of calculating f 1 (z) for charged particle in the unit density tissues; (2) the method of calculating f(z) for a point source; (3) the method of applying the Fourier transform theory to the calculation of the compound Poisson process; (4) the method of using fast Fourier transform technique to determine f(z) and, giving some computed examples based on the code, MICRODOSE 1, including alpha particles emitted from 239 Pu in the alveolar lung tissues and from radon progeny RaA and RAC in the human respiratory tract. (author). 13 refs., 6 figs

  6. Source Code Vulnerabilities in IoT Software Systems

    Directory of Open Access Journals (Sweden)

    Saleh Mohamed Alnaeli

    2017-08-01

    Full Text Available An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the number of unsafe commands (e.g., strcpy, strcmp, and strlen that are well-known among research communities to cause potential risks and security concerns, thereby decreasing a system’s robustness and quality. These unsafe statements are banned by many companies (e.g., Microsoft. The use of these commands should be avoided from the start when writing code and should be removed from legacy code over time as recommended by new C/C++ language standards. Each system is analyzed and the distribution of the known unsafe commands is presented. Historical trends in the usage of the unsafe commands of 7 of the systems are presented to show how the studied systems evolved over time with respect to the vulnerable code. The results show that the most prevalent unsafe command used for most systems is memcpy, followed by strlen. These results can be used to help train software developers on secure coding practices so that they can write higher quality software systems.

  7. Cloning and characterization of the major histone H2A genes completes the cloning and sequencing of known histone genes of Tetrahymena thermophila.

    Science.gov (United States)

    Liu, X; Gorovsky, M A

    1996-01-01

    A truncated cDNA clone encoding Tetrahymena thermophila histone H2A2 was isolated using synthetic degenerate oligonucleotide probes derived from H2A protein sequences of Tetrahymena pyriformis. The cDNA clone was used as a homologous probe to isolate a truncated genomic clone encoding H2A1. The remaining regions of the genes for H2A1 (HTA1) and H2A2 (HTA2) were then isolated using inverse PCR on circularized genomic DNA fragments. These partial clones were assembled into intact HTA1 and HTA2 clones. Nucleotide sequences of the two genes were highly homologous within the coding region but not in the noncoding regions. Comparison of the deduced amino acid sequences with protein sequences of T. pyriformis H2As showed only two and three differences respectively, in a total of 137 amino acids for H2A1, and 132 amino acids for H2A2, indicating the two genes arose before the divergence of these two species. The HTA2 gene contains a TAA triplet within the coding region, encoding a glutamine residue. In contrast with the T. thermophila HHO and HTA3 genes, no introns were identified within the two genes. The 5'- and 3'-ends of the histone H2A mRNAs; were determined by RNase protection and by PCR mapping using RACE and RLM-RACE methods. Both genes encode polyadenylated mRNAs and are highly expressed in vegetatively growing cells but only weakly expressed in starved cultures. With the inclusion of these two genes, T. thermophila is the first organism whose entire complement of known core and linker histones, including replication-dependent and basal variants, has been cloned and sequenced. PMID:8760889

  8. Cloning in Streptococcus lactis of plasmid-mediated UV resistance and effect on prophage stability

    International Nuclear Information System (INIS)

    Chopin, M.C.; Chopin, A.; Rouault, A.; Simon, D.

    1986-01-01

    Plasmid pIL7 (33 kilobases) from Streptococcus lactis enhances UV resistance and prophage stability. A 5.4-kilobase pIL7 fragment carrying genes coding for both characters was cloned into S. lactis, using plasmid pHV1301 as the cloning vector. The recombinant plasmid was subsequently transferred to three other S. lactis strains by transformation or protoplast fusion. Cloned genes were expressed in all tested strains

  9. Source-term model for the SYVAC3-NSURE performance assessment code

    International Nuclear Information System (INIS)

    Rowat, J.H.; Rattan, D.S.; Dolinar, G.M.

    1996-11-01

    Radionuclide contaminants in wastes emplaced in disposal facilities will not remain in those facilities indefinitely. Engineered barriers will eventually degrade, allowing radioactivity to escape from the vault. The radionuclide release rate from a low-level radioactive waste (LLRW) disposal facility, the source term, is a key component in the performance assessment of the disposal system. This report describes the source-term model that has been implemented in Ver. 1.03 of the SYVAC3-NSURE (Systems Variability Analysis Code generation 3-Near Surface Repository) code. NSURE is a performance assessment code that evaluates the impact of near-surface disposal of LLRW through the groundwater pathway. The source-term model described here was developed for the Intrusion Resistant Underground Structure (IRUS) disposal facility, which is a vault that is to be located in the unsaturated overburden at AECL's Chalk River Laboratories. The processes included in the vault model are roof and waste package performance, and diffusion, advection and sorption of radionuclides in the vault backfill. The model presented here was developed for the IRUS vault; however, it is applicable to other near-surface disposal facilities. (author). 40 refs., 6 figs

  10. Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks

    OpenAIRE

    Mavroeidis, Vasileios; Nicho, Mathew

    2017-01-01

    The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since the vulnerability is practically part of their design, scanning a malicious QR code can direct the user to cloned malicious sites resulting in revealing sensitive information. In order to evaluate the vulnerabilities and propose subsequent countermeasures, we demonstrate this type of attack through a simulated experiment, where a malicious QR c...

  11. MOLECULAR CLONING OF OVINE cDNA LEPTIN GENE

    Directory of Open Access Journals (Sweden)

    CLAUDIA TEREZIA SOCOL

    2008-05-01

    Full Text Available An efficient bacterial transformation system suitable for cloning the coding sequence of the ovine leptin gene in E. coli DH5α host cells using the pGEMT easy vector it is described in this paper. The necessity of producing leptin is based on the fact that the role of this molecule in the animal and human organism is still unknown, leptin not existing as commercial product on the Romanian market. The results obtained in the bacterial transformation, cloning, recombinant clones selection, control of the insertion experiments and DNA computational analysis represent the first steps in further genetic engineering experiments such as production of DNA libraries, DNA sequencing, protein expression, etc., for a further contribution in elucidating the role of leptin in the animal and human organism.

  12. Cloning of cDNAs coding for the heavy chain region and connecting region of human factor V, a blood coagulation factor with four types of internal repeats

    International Nuclear Information System (INIS)

    Kane, W.H.; Ichinose, A.; Hagen, F.S.; Davie, E.W.

    1987-01-01

    Human factor V is a high molecular weight plasma glycoprotein that participates as a cofactor in the conversion of prothrombin to thrombin by factor X/sub a/. Prior to its participation in the coagulation cascade, factor V is converted to factor V/sub a/ by thrombin generating a heavy chain and a light chain, and these two chains are held together by calcium ions. A connecting region originally located between the heavy and light chains is liberated during the activation reaction. In a previous study, a cDNA of 2970 nucleotides that codes for the carboxyl-terminal 938 amino acids of factor V was isolated and characterized from a Hep G2 cDNA library. This cDNA has been used to obtain additional clones from Hep G2 and human liver cDNA libraries. Furthermore, a Hep G2 cDNA library prepared with an oligonucleotide from the 5' end of these cDNAs was screened to obtain overlapping cDNA clones that code for the amino-terminal region of the molecule. The composite sequence of these clones spans 6911 nucleotides and is consistent with the size of the factor V message present in Hep G2 cells (approximately 7 kilobases). The cDNA codes for a leader sequence of 28 amino acids and a mature protein of 2196 amino acids. The amino acid sequence predicted from the cDNA was in complete agreement with 139 amino acid residues that were identified by Edman degradation of cyanogen bromide peptides isolated from the heavy chain region and connecting region of plasma factor V. The domain structure of human factor V is similar to that previously reported for human coagulation factor VIII. Two types of tandem repeats (17 and 9 amino acids) have also been identified in the connecting region of factor V. The present data indicate that the amino acid sequence in the heavy and light chain regions of factor V is ∼ 40% identical with the corresponding regions of factor VIII

  13. Molecular cloning and construction of the coding region for human acetylcholinesterase reveals a G + C-rich attenuating structure

    International Nuclear Information System (INIS)

    Soreq, H.; Ben-Aziz, R.; Prody, C.A.; Seidman, S.; Gnatt, A.; Neville, L.; Lieman-Hurwitz, J.; Lev-Lehman, E.; Ginzberg, D.; Lapidot-Lifson, Y.; Zakut, H.

    1990-01-01

    To study the primary structure of human acetylcholinesterase and its gene expression and amplification, cDNA libraries from human tissues expressing oocyte-translatable AcChoEase mRNA were constructed and screened with labeled oligodeoxynucleotide probes. Several cDNA clones were isolated that encoded a polypeptide with ≥50% identically aligned amino acids to Torpedo AcChoEase and human butyrylcholinesterase. However, these cDNA clones were all truncated within a 300-nucleotide-long G + C-rich region with a predicted pattern of secondary structure having a high Gibbs free energy downstream from the expected 5' end of the coding region. Screening of a genomic DNA library revealed the missing 5' domain. When ligated to the cDNA and constructed into a transcription vector, this sequence encoded a synthetic mRNA translated in microinjected oocytes into catalytically active AcChoEase with marked preference for acetylthiocholine over butyrylthiocholine as a substrate, susceptibility to inhibition by the AcChoEase inhibitor BW284C51, and resistance to the AcChoEase inhibitor tetraisopropylpyrophosphoramide. Blot hybridization of genomic DNA from different individuals carrying amplified AcChoEase genes revealed variable intensities and restriction patterns with probes from the regions upstream and downstream from the predicted G + C-rich structure. Thus, the human AcChoEase gene includes a putative G + C-rich attenuator domain and is subject to structural alterations in cases of AcChoEase gene amplification

  14. Cloning, expression and purification of cold adapted acetate kinase ...

    African Journals Online (AJOL)

    shell) Neobuccinum living in the Antarctic ice-covered sea. An open reading frame of 1203 bp, coding for acetate kinase gene, called ack, was amplified, cloned into the expression vector, pETY-16b, and the enzyme was overproduced by ...

  15. Verification test calculations for the Source Term Code Package

    International Nuclear Information System (INIS)

    Denning, R.S.; Wooton, R.O.; Alexander, C.A.; Curtis, L.A.; Cybulskis, P.; Gieseke, J.A.; Jordan, H.; Lee, K.W.; Nicolosi, S.L.

    1986-07-01

    The purpose of this report is to demonstrate the reasonableness of the Source Term Code Package (STCP) results. Hand calculations have been performed spanning a wide variety of phenomena within the context of a single accident sequence, a loss of all ac power with late containment failure, in the Peach Bottom (BWR) plant, and compared with STCP results. The report identifies some of the limitations of the hand calculation effort. The processes involved in a core meltdown accident are complex and coupled. Hand calculations by their nature must deal with gross simplifications of these processes. Their greatest strength is as an indicator that a computer code contains an error, for example that it doesn't satisfy basic conservation laws, rather than in showing the analysis accurately represents reality. Hand calculations are an important element of verification but they do not satisfy the need for code validation. The code validation program for the STCP is a separate effort. In general the hand calculation results show that models used in the STCP codes (e.g., MARCH, TRAP-MELT, VANESA) obey basic conservation laws and produce reasonable results. The degree of agreement and significance of the comparisons differ among the models evaluated. 20 figs., 26 tabs

  16. Imaging x-ray sources at a finite distance in coded-mask instruments

    International Nuclear Information System (INIS)

    Donnarumma, Immacolata; Pacciani, Luigi; Lapshov, Igor; Evangelista, Yuri

    2008-01-01

    We present a method for the correction of beam divergence in finite distance sources imaging through coded-mask instruments. We discuss the defocusing artifacts induced by the finite distance showing two different approaches to remove such spurious effects. We applied our method to one-dimensional (1D) coded-mask systems, although it is also applicable in two-dimensional systems. We provide a detailed mathematical description of the adopted method and of the systematics introduced in the reconstructed image (e.g., the fraction of source flux collected in the reconstructed peak counts). The accuracy of this method was tested by simulating pointlike and extended sources at a finite distance with the instrumental setup of the SuperAGILE experiment, the 1D coded-mask x-ray imager onboard the AGILE (Astro-rivelatore Gamma a Immagini Leggero) mission. We obtained reconstructed images of good quality and high source location accuracy. Finally we show the results obtained by applying this method to real data collected during the calibration campaign of SuperAGILE. Our method was demonstrated to be a powerful tool to investigate the imaging response of the experiment, particularly the absorption due to the materials intercepting the line of sight of the instrument and the conversion between detector pixel and sky direction

  17. SOURCES-3A: A code for calculating (α, n), spontaneous fission, and delayed neutron sources and spectra

    International Nuclear Information System (INIS)

    Perry, R.T.; Wilson, W.B.; Charlton, W.S.

    1998-04-01

    In many systems, it is imperative to have accurate knowledge of all significant sources of neutrons due to the decay of radionuclides. These sources can include neutrons resulting from the spontaneous fission of actinides, the interaction of actinide decay α-particles in (α,n) reactions with low- or medium-Z nuclides, and/or delayed neutrons from the fission products of actinides. Numerous systems exist in which these neutron sources could be important. These include, but are not limited to, clean and spent nuclear fuel (UO 2 , ThO 2 , MOX, etc.), enrichment plant operations (UF 6 , PuF 4 , etc.), waste tank studies, waste products in borosilicate glass or glass-ceramic mixtures, and weapons-grade plutonium in storage containers. SOURCES-3A is a computer code that determines neutron production rates and spectra from (α,n) reactions, spontaneous fission, and delayed neutron emission due to the decay of radionuclides in homogeneous media (i.e., a mixture of α-emitting source material and low-Z target material) and in interface problems (i.e., a slab of α-emitting source material in contact with a slab of low-Z target material). The code is also capable of calculating the neutron production rates due to (α,n) reactions induced by a monoenergetic beam of α-particles incident on a slab of target material. Spontaneous fission spectra are calculated with evaluated half-life, spontaneous fission branching, and Watt spectrum parameters for 43 actinides. The (α,n) spectra are calculated using an assumed isotropic angular distribution in the center-of-mass system with a library of 89 nuclide decay α-particle spectra, 24 sets of measured and/or evaluated (α,n) cross sections and product nuclide level branching fractions, and functional α-particle stopping cross sections for Z < 106. The delayed neutron spectra are taken from an evaluated library of 105 precursors. The code outputs the magnitude and spectra of the resultant neutron source. It also provides an

  18. Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

    Directory of Open Access Journals (Sweden)

    Valenzise G

    2009-01-01

    Full Text Available In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. We propose a novel hashing scheme which exploits the paradigms of compressive sensing and distributed source coding to generate a compact hash signature, and we apply it to the case of audio content protection. The audio content provider produces a small hash signature by computing a limited number of random projections of a perceptual, time-frequency representation of the original audio stream; the audio hash is given by the syndrome bits of an LDPC code applied to the projections. At the content user side, the hash is decoded using distributed source coding tools. If the tampering is sparsifiable or compressible in some orthonormal basis or redundant dictionary, it is possible to identify the time-frequency position of the attack, with a hash size as small as 200 bits/second; the bit saving obtained by introducing distributed source coding ranges between 20% to 70%.

  19. Beyond the Business Model: Incentives for Organizations to Publish Software Source Code

    Science.gov (United States)

    Lindman, Juho; Juutilainen, Juha-Pekka; Rossi, Matti

    The software stack opened under Open Source Software (OSS) licenses is growing rapidly. Commercial actors have released considerable amounts of previously proprietary source code. These actions beg the question why companies choose a strategy based on giving away software assets? Research on outbound OSS approach has tried to answer this question with the concept of the “OSS business model”. When studying the reasons for code release, we have observed that the business model concept is too generic to capture the many incentives organizations have. Conversely, in this paper we investigate empirically what the companies’ incentives are by means of an exploratory case study of three organizations in different stages of their code release. Our results indicate that the companies aim to promote standardization, obtain development resources, gain cost savings, improve the quality of software, increase the trustworthiness of software, or steer OSS communities. We conclude that future research on outbound OSS could benefit from focusing on the heterogeneous incentives for code release rather than on revenue models.

  20. Authorship attribution of source code by using back propagation neural network based on particle swarm optimization.

    Science.gov (United States)

    Yang, Xinyu; Xu, Guoai; Li, Qi; Guo, Yanhui; Zhang, Miao

    2017-01-01

    Authorship attribution is to identify the most likely author of a given sample among a set of candidate known authors. It can be not only applied to discover the original author of plain text, such as novels, blogs, emails, posts etc., but also used to identify source code programmers. Authorship attribution of source code is required in diverse applications, ranging from malicious code tracking to solving authorship dispute or software plagiarism detection. This paper aims to propose a new method to identify the programmer of Java source code samples with a higher accuracy. To this end, it first introduces back propagation (BP) neural network based on particle swarm optimization (PSO) into authorship attribution of source code. It begins by computing a set of defined feature metrics, including lexical and layout metrics, structure and syntax metrics, totally 19 dimensions. Then these metrics are input to neural network for supervised learning, the weights of which are output by PSO and BP hybrid algorithm. The effectiveness of the proposed method is evaluated on a collected dataset with 3,022 Java files belong to 40 authors. Experiment results show that the proposed method achieves 91.060% accuracy. And a comparison with previous work on authorship attribution of source code for Java language illustrates that this proposed method outperforms others overall, also with an acceptable overhead.

  1. Eu-NORSEWInD - Assessment of Viability of Open Source CFD Code for the Wind Industry

    DEFF Research Database (Denmark)

    Stickland, Matt; Scanlon, Tom; Fabre, Sylvie

    2009-01-01

    Part of the overall NORSEWInD project is the use of LiDAR remote sensing (RS) systems mounted on offshore platforms to measure wind velocity profiles at a number of locations offshore. The data acquired from the offshore RS measurements will be fed into a large and novel wind speed dataset suitab...... between the results of simulations created by the commercial code FLUENT and the open source code OpenFOAM. An assessment of the ease with which the open source code can be used is also included....

  2. Cloning

    Science.gov (United States)

    Cloning describes the processes used to create an exact genetic replica of another cell, tissue or organism. ... named Dolly. There are three different types of cloning: Gene cloning, which creates copies of genes or ...

  3. What is Cloning?

    Science.gov (United States)

    Donate Home Cloning What is Cloning What is Cloning Clones are organisms that are exact genetic copies. ... clones made through modern cloning technologies. How Is Cloning Done? Many people first heard of cloning when ...

  4. Health physics source document for codes of practice

    International Nuclear Information System (INIS)

    Pearson, G.W.; Meggitt, G.C.

    1989-05-01

    Personnel preparing codes of practice often require basic Health Physics information or advice relating to radiological protection problems and this document is written primarily to supply such information. Certain technical terms used in the text are explained in the extensive glossary. Due to the pace of change in the field of radiological protection it is difficult to produce an up-to-date document. This document was compiled during 1988 however, and therefore contains the principle changes brought about by the introduction of the Ionising Radiations Regulations (1985). The paper covers the nature of ionising radiation, its biological effects and the principles of control. It is hoped that the document will provide a useful source of information for both codes of practice and wider areas and stimulate readers to study radiological protection issues in greater depth. (author)

  5. Low complexity source and channel coding for mm-wave hybrid fiber-wireless links

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Vegas Olmos, Juan José; Pang, Xiaodan

    2014-01-01

    We report on the performance of channel and source coding applied for an experimentally realized hybrid fiber-wireless W-band link. Error control coding performance is presented for a wireless propagation distance of 3 m and 20 km fiber transmission. We report on peak signal-to-noise ratio perfor...

  6. ReMixT: clone-specific genomic structure estimation in cancer.

    Science.gov (United States)

    McPherson, Andrew W; Roth, Andrew; Ha, Gavin; Chauve, Cedric; Steif, Adi; de Souza, Camila P E; Eirew, Peter; Bouchard-Côté, Alexandre; Aparicio, Sam; Sahinalp, S Cenk; Shah, Sohrab P

    2017-07-27

    Somatic evolution of malignant cells produces tumors composed of multiple clonal populations, distinguished in part by rearrangements and copy number changes affecting chromosomal segments. Whole genome sequencing mixes the signals of sampled populations, diluting the signals of clone-specific aberrations, and complicating estimation of clone-specific genotypes. We introduce ReMixT, a method to unmix tumor and contaminating normal signals and jointly predict mixture proportions, clone-specific segment copy number, and clone specificity of breakpoints. ReMixT is free, open-source software and is available at http://bitbucket.org/dranew/remixt .

  7. Fine-Grained Energy Modeling for the Source Code of a Mobile Application

    DEFF Research Database (Denmark)

    Li, Xueliang; Gallagher, John Patrick

    2016-01-01

    The goal of an energy model for source code is to lay a foundation for the application of energy-aware programming techniques. State of the art solutions are based on source-line energy information. In this paper, we present an approach to constructing a fine-grained energy model which is able...

  8. The stability of induced compact mutant clones of Bramley's Seedling apple

    International Nuclear Information System (INIS)

    Lacey, C.N.D.

    1982-01-01

    Twelve selected, compact, clones of Bramley's Seedling induced by gamma radiation treatment were checked for stability. Representative trees were used as vegetative parents for large scale multiplication, and further buds were treated with gamma radiation to disrupt the structure of their meristems. The results indicate that seven of the clones are as stable as the original cultivar, and therefore probably homohistont, containing only cells with compact mutant genotype. The other five clones proved to be unstable and gave rise to a large proportion of apparently normal trees. It is hypothesized that in these clones the L 1 (epidermis) consists of normal unchanged tissue, while the bulk of the plant tissue layers are of mutant cells, i.e. that they are periclinal chimaeras with the genotypes of the different cell layers coded for different growth forms. (orig.)

  9. Clone DB: an integrated NCBI resource for clone-associated data

    Science.gov (United States)

    Schneider, Valerie A.; Chen, Hsiu-Chuan; Clausen, Cliff; Meric, Peter A.; Zhou, Zhigang; Bouk, Nathan; Husain, Nora; Maglott, Donna R.; Church, Deanna M.

    2013-01-01

    The National Center for Biotechnology Information (NCBI) Clone DB (http://www.ncbi.nlm.nih.gov/clone/) is an integrated resource providing information about and facilitating access to clones, which serve as valuable research reagents in many fields, including genome sequencing and variation analysis. Clone DB represents an expansion and replacement of the former NCBI Clone Registry and has records for genomic and cell-based libraries and clones representing more than 100 different eukaryotic taxa. Records provide details of library construction, associated sequences, map positions and information about resource distribution. Clone DB is indexed in the NCBI Entrez system and can be queried by fields that include organism, clone name, gene name and sequence identifier. Whenever possible, genomic clones are mapped to reference assemblies and their map positions provided in clone records. Clones mapping to specific genomic regions can also be searched for using the NCBI Clone Finder tool, which accepts queries based on sequence coordinates or features such as gene or transcript names. Clone DB makes reports of library, clone and placement data on its FTP site available for download. With Clone DB, users now have available to them a centralized resource that provides them with the tools they will need to make use of these important research reagents. PMID:23193260

  10. Cloning of a neonatal calcium atpase isoform (SERCA 1B) from extraocular muscle of adult blue marlin (Makaira nigricans).

    Science.gov (United States)

    Londraville, R L; Cramer, T D; Franck, J P; Tullis, A; Block, B A

    2000-10-01

    Complete cDNAs for the fast-twitch Ca2+ -ATPase isoform (SERCA 1) were cloned and sequenced from blue marlin (Makaira nigricans) extraocular muscle (EOM). Complete cDNAs for SERCA 1 were also cloned from fast-twitch skeletal muscle of the same species. The two sequences are identical over the coding region except for the last five codons on the carboxyl end; EOM SERCA 1 cDNA codes for 996 amino acids and the fast-twitch cDNAs code for 991 aa. Phylogenetic analysis revealed that EOM SERCA 1 clusters with an isoform of Ca2+ -ATPase normally expressed in early development of mammals (SERCA 1B). This is the first report of SERCA 1B in an adult vertebrate. RNA hybridization assays indicate that 1B expression is limited to extraocular muscles. Because EOM gives rise to the thermogenic heater organ in marlin, we investigated whether SERCA 1B may play a role in heat generation, or if 1B expression is common in EOM among vertebrates. Chicken also expresses SERCA 1B in EOM, but rat expresses SERCA 1A; because SERCA 1B is not specific to heater tissue we conclude it is unlikely that it plays a specific role in intracellular heat production. Comparative sequence analysis does reveal, however, several sites that may be the source of functional differences between fish and mammalian SERCAs.

  11. A plug-in to Eclipse for VHDL source codes: functionalities

    Science.gov (United States)

    Niton, B.; Poźniak, K. T.; Romaniuk, R. S.

    The paper presents an original application, written by authors, which supports writing and edition of source codes in VHDL language. It is a step towards fully automatic, augmented code writing for photonic and electronic systems, also systems based on FPGA and/or DSP processors. An implementation is described, based on VEditor. VEditor is a free license program. Thus, the work presented in this paper supplements and extends this free license. The introduction characterizes shortly available tools on the market which serve for aiding the design processes of electronic systems in VHDL. Particular attention was put on plug-ins to the Eclipse environment and Emacs program. There are presented detailed properties of the written plug-in such as: programming extension conception, and the results of the activities of formatter, re-factorizer, code hider, and other new additions to the VEditor program.

  12. WASTK: A Weighted Abstract Syntax Tree Kernel Method for Source Code Plagiarism Detection

    Directory of Open Access Journals (Sweden)

    Deqiang Fu

    2017-01-01

    Full Text Available In this paper, we introduce a source code plagiarism detection method, named WASTK (Weighted Abstract Syntax Tree Kernel, for computer science education. Different from other plagiarism detection methods, WASTK takes some aspects other than the similarity between programs into account. WASTK firstly transfers the source code of a program to an abstract syntax tree and then gets the similarity by calculating the tree kernel of two abstract syntax trees. To avoid misjudgment caused by trivial code snippets or frameworks given by instructors, an idea similar to TF-IDF (Term Frequency-Inverse Document Frequency in the field of information retrieval is applied. Each node in an abstract syntax tree is assigned a weight by TF-IDF. WASTK is evaluated on different datasets and, as a result, performs much better than other popular methods like Sim and JPlag.

  13. Recombinational Cloning Using Gateway and In-Fusion Cloning Schemes

    Science.gov (United States)

    Throop, Andrea L.; LaBaer, Joshua

    2015-01-01

    The comprehensive study of protein structure and function, or proteomics, depends on the obtainability of full-length cDNAs in species-specific expression vectors and subsequent functional analysis of the expressed protein. Recombinational cloning is a universal cloning technique based on site-specific recombination that is independent of the insert DNA sequence of interest, which differentiates this method from the classical restriction enzyme-based cloning methods. Recombinational cloning enables rapid and efficient parallel transfer of DNA inserts into multiple expression systems. This unit summarizes strategies for generating expression-ready clones using the most popular recombinational cloning technologies, including the commercially available Gateway® (Life Technologies) and In-Fusion® (Clontech) cloning technologies. PMID:25827088

  14. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    Science.gov (United States)

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  15. Rascal: A domain specific language for source code analysis and manipulation

    NARCIS (Netherlands)

    P. Klint (Paul); T. van der Storm (Tijs); J.J. Vinju (Jurgen); A. Walenstein; S. Schuppe

    2009-01-01

    htmlabstractMany automated software engineering tools require tight integration of techniques for source code analysis and manipulation. State-of-the-art tools exist for both, but the domains have remained notoriously separate because different computational paradigms fit each domain best. This

  16. RASCAL : a domain specific language for source code analysis and manipulationa

    NARCIS (Netherlands)

    Klint, P.; Storm, van der T.; Vinju, J.J.

    2009-01-01

    Many automated software engineering tools require tight integration of techniques for source code analysis and manipulation. State-of-the-art tools exist for both, but the domains have remained notoriously separate because different computational paradigms fit each domain best. This impedance

  17. Cloning and sequence analysis of cDNA coding for rat nucleolar protein C23

    International Nuclear Information System (INIS)

    Ghaffari, S.H.; Olson, M.O.J.

    1986-01-01

    Using synthetic oligonucleotides as primers and probes, the authors have isolated and sequenced cDNA clones encoding protein C23, a putative nucleolus organizer protein. Poly(A + ) RNA was isolated from rat Novikoff hepatoma cells and enriched in C23 mRNA by sucrose density gradient ultracentrifugation. Two deoxyoligonuleotides, a 48- and a 27-mer, were synthesized on the basis of amino acid sequence from the C-terminal half of protein C23 and cDNA sequence data from CHO cell protein. The 48-mer was used a primer for synthesis of cDNA which was then inserted into plasmid pUC9. Transformed bacterial colonies were screened by hybridization with 32 P labeled 27-mer. Two clones among 5000 gave a strong positive signal. Plasmid DNAs from these clones were purified and characterized by blotting and nucleotide sequence analysis. The length of C23 mRNA was estimated to be 3200 bases in a northern blot analysis. The sequence of a 267 b.p. insert shows high homology with the CHO cDNA with only 9 nucleotide differences and an identical amino acid sequence. These studies indicate that this region of the protein is highly conserved

  18. D-DSC: Decoding Delay-based Distributed Source Coding for Internet of Sensing Things.

    Science.gov (United States)

    Aktas, Metin; Kuscu, Murat; Dinc, Ergin; Akan, Ozgur B

    2018-01-01

    Spatial correlation between densely deployed sensor nodes in a wireless sensor network (WSN) can be exploited to reduce the power consumption through a proper source coding mechanism such as distributed source coding (DSC). In this paper, we propose the Decoding Delay-based Distributed Source Coding (D-DSC) to improve the energy efficiency of the classical DSC by employing the decoding delay concept which enables the use of the maximum correlated portion of sensor samples during the event estimation. In D-DSC, network is partitioned into clusters, where the clusterheads communicate their uncompressed samples carrying the side information, and the cluster members send their compressed samples. Sink performs joint decoding of the compressed and uncompressed samples and then reconstructs the event signal using the decoded sensor readings. Based on the observed degree of the correlation among sensor samples, the sink dynamically updates and broadcasts the varying compression rates back to the sensor nodes. Simulation results for the performance evaluation reveal that D-DSC can achieve reliable and energy-efficient event communication and estimation for practical signal detection/estimation applications having massive number of sensors towards the realization of Internet of Sensing Things (IoST).

  19. Unified Approach to Universal Cloning and Phase-Covariant Cloning

    OpenAIRE

    Hu, Jia-Zhong; Yu, Zong-Wen; Wang, Xiang-Bin

    2008-01-01

    We analyze the problem of approximate quantum cloning when the quantum state is between two latitudes on the Bloch's sphere. We present an analytical formula for the optimized 1-to-2 cloning. The formula unifies the universal quantum cloning (UQCM) and the phase covariant quantum cloning.

  20. Documentation for grants equal to tax model: Volume 3, Source code

    International Nuclear Information System (INIS)

    Boryczka, M.K.

    1986-01-01

    The GETT model is capable of forecasting the amount of tax liability associated with all property owned and all activities undertaken by the US Department of Energy (DOE) in site characterization and repository development. The GETT program is a user-friendly, menu-driven model developed using dBASE III/trademark/, a relational data base management system. The data base for GETT consists primarily of eight separate dBASE III/trademark/ files corresponding to each of the eight taxes (real property, personal property, corporate income, franchise, sales, use, severance, and excise) levied by State and local jurisdictions on business property and activity. Additional smaller files help to control model inputs and reporting options. Volume 3 of the GETT model documentation is the source code. The code is arranged primarily by the eight tax types. Other code files include those for JURISDICTION, SIMULATION, VALIDATION, TAXES, CHANGES, REPORTS, GILOT, and GETT. The code has been verified through hand calculations

  1. RETRANS - A tool to verify the functional equivalence of automatically generated source code with its specification

    International Nuclear Information System (INIS)

    Miedl, H.

    1998-01-01

    Following the competent technical standards (e.g. IEC 880) it is necessary to verify each step in the development process of safety critical software. This holds also for the verification of automatically generated source code. To avoid human errors during this verification step and to limit the cost effort a tool should be used which is developed independently from the development of the code generator. For this purpose ISTec has developed the tool RETRANS which demonstrates the functional equivalence of automatically generated source code with its underlying specification. (author)

  2. A Source Term Calculation for the APR1400 NSSS Auxiliary System Components Using the Modified SHIELD Code

    International Nuclear Information System (INIS)

    Park, Hong Sik; Kim, Min; Park, Seong Chan; Seo, Jong Tae; Kim, Eun Kee

    2005-01-01

    The SHIELD code has been used to calculate the source terms of NSSS Auxiliary System (comprising CVCS, SIS, and SCS) components of the OPR1000. Because the code had been developed based upon the SYSTEM80 design and the APR1400 NSSS Auxiliary System design is considerably changed from that of SYSTEM80 or OPR1000, the SHIELD code cannot be used directly for APR1400 radiation design. Thus the hand-calculation is needed for the portion of design changes using the results of the SHIELD code calculation. In this study, the SHIELD code is modified to incorporate the APR1400 design changes and the source term calculation is performed for the APR1400 NSSS Auxiliary System components

  3. Comparison of TG-43 dosimetric parameters of brachytherapy sources obtained by three different versions of MCNP codes.

    Science.gov (United States)

    Zaker, Neda; Zehtabian, Mehdi; Sina, Sedigheh; Koontz, Craig; Meigooni, Ali S

    2016-03-08

    Monte Carlo simulations are widely used for calculation of the dosimetric parameters of brachytherapy sources. MCNP4C2, MCNP5, MCNPX, EGS4, EGSnrc, PTRAN, and GEANT4 are among the most commonly used codes in this field. Each of these codes utilizes a cross-sectional library for the purpose of simulating different elements and materials with complex chemical compositions. The accuracies of the final outcomes of these simulations are very sensitive to the accuracies of the cross-sectional libraries. Several investigators have shown that inaccuracies of some of the cross section files have led to errors in 125I and 103Pd parameters. The purpose of this study is to compare the dosimetric parameters of sample brachytherapy sources, calculated with three different versions of the MCNP code - MCNP4C, MCNP5, and MCNPX. In these simulations for each source type, the source and phantom geometries, as well as the number of the photons, were kept identical, thus eliminating the possible uncertainties. The results of these investigations indicate that for low-energy sources such as 125I and 103Pd there are discrepancies in gL(r) values. Discrepancies up to 21.7% and 28% are observed between MCNP4C and other codes at a distance of 6 cm for 103Pd and 10 cm for 125I from the source, respectively. However, for higher energy sources, the discrepancies in gL(r) values are less than 1.1% for 192Ir and less than 1.2% for 137Cs between the three codes.

  4. Tangent: Automatic Differentiation Using Source Code Transformation in Python

    OpenAIRE

    van Merriënboer, Bart; Wiltschko, Alexander B.; Moldovan, Dan

    2017-01-01

    Automatic differentiation (AD) is an essential primitive for machine learning programming systems. Tangent is a new library that performs AD using source code transformation (SCT) in Python. It takes numeric functions written in a syntactic subset of Python and NumPy as input, and generates new Python functions which calculate a derivative. This approach to automatic differentiation is different from existing packages popular in machine learning, such as TensorFlow and Autograd. Advantages ar...

  5. Code of Conduct on the Safety and Security of Radioactive Sources and the Supplementary Guidance on the Import and Export of Radioactive Sources

    International Nuclear Information System (INIS)

    2005-01-01

    In operative paragraph 4 of its resolution GC(47)/RES/7.B, the General Conference, having welcomed the approval by the Board of Governors of the revised IAEA Code of Conduct on the Safety and Security of Radioactive Sources (GC(47)/9), and while recognizing that the Code is not a legally binding instrument, urged each State to write to the Director General that it fully supports and endorses the IAEA's efforts to enhance the safety and security of radioactive sources and is working toward following the guidance contained in the IAEA Code of Conduct. In operative paragraph 5, the Director General was requested to compile, maintain and publish a list of States that have made such a political commitment. The General Conference, in operative paragraph 6, recognized that this procedure 'is an exceptional one, having no legal force and only intended for information, and therefore does not constitute a precedent applicable to other Codes of Conduct of the Agency or of other bodies belonging to the United Nations system'. In operative paragraph 7 of resolution GC(48)/RES/10.D, the General Conference welcomed the fact that more than 60 States had made political commitments with respect to the Code in line with resolution GC(47)/RES/7.B and encouraged other States to do so. In operative paragraph 8 of resolution GC(48)/RES/10.D, the General Conference further welcomed the approval by the Board of Governors of the Supplementary Guidance on the Import and Export of Radioactive Sources (GC(48)/13), endorsed this Guidance while recognizing that it is not legally binding, noted that more than 30 countries had made clear their intention to work towards effective import and export controls by 31 December 2005, and encouraged States to act in accordance with the Guidance on a harmonized basis and to notify the Director General of their intention to do so as supplementary information to the Code of Conduct, recalling operative paragraph 6 of resolution GC(47)/RES/7.B. 4. The

  6. Hybrid digital-analog coding with bandwidth expansion for correlated Gaussian sources under Rayleigh fading

    Science.gov (United States)

    Yahampath, Pradeepa

    2017-12-01

    Consider communicating a correlated Gaussian source over a Rayleigh fading channel with no knowledge of the channel signal-to-noise ratio (CSNR) at the transmitter. In this case, a digital system cannot be optimal for a range of CSNRs. Analog transmission however is optimal at all CSNRs, if the source and channel are memoryless and bandwidth matched. This paper presents new hybrid digital-analog (HDA) systems for sources with memory and channels with bandwidth expansion, which outperform both digital-only and analog-only systems over a wide range of CSNRs. The digital part is either a predictive quantizer or a transform code, used to achieve a coding gain. Analog part uses linear encoding to transmit the quantization error which improves the performance under CSNR variations. The hybrid encoder is optimized to achieve the minimum AMMSE (average minimum mean square error) over the CSNR distribution. To this end, analytical expressions are derived for the AMMSE of asymptotically optimal systems. It is shown that the outage CSNR of the channel code and the analog-digital power allocation must be jointly optimized to achieve the minimum AMMSE. In the case of HDA predictive quantization, a simple algorithm is presented to solve the optimization problem. Experimental results are presented for both Gauss-Markov sources and speech signals.

  7. Enzyme free cloning for high throughput gene cloning and expression

    NARCIS (Netherlands)

    de Jong, R.N.; Daniëls, M.; Kaptein, R.; Folkers, G.E.

    2006-01-01

    Structural and functional genomics initiatives significantly improved cloning methods over the past few years. Although recombinational cloning is highly efficient, its costs urged us to search for an alternative high throughput (HTP) cloning method. We implemented a modified Enzyme Free Cloning

  8. Cloning of a human insulin-stimulated protein kinase (ISPK-1) gene and analysis of coding regions and mRNA levels of the ISPK-1 and the protein phosphatase-1 genes in muscle from NIDDM patients

    DEFF Research Database (Denmark)

    Bjørbaek, C; Vik, T A; Echwald, S M

    1995-01-01

    with non-insulin-dependent diabetes mellitus (NIDDM). The human ISPK-1 cDNA was cloned from T-cell leukemia and placental cDNA libraries and mapped to the short arm of the human X chromosome. Single-strand conformation polymorphism (SSCP) analysis identified a total of six variations in the coding regions...

  9. Comparison of TG‐43 dosimetric parameters of brachytherapy sources obtained by three different versions of MCNP codes

    Science.gov (United States)

    Zaker, Neda; Sina, Sedigheh; Koontz, Craig; Meigooni1, Ali S.

    2016-01-01

    Monte Carlo simulations are widely used for calculation of the dosimetric parameters of brachytherapy sources. MCNP4C2, MCNP5, MCNPX, EGS4, EGSnrc, PTRAN, and GEANT4 are among the most commonly used codes in this field. Each of these codes utilizes a cross‐sectional library for the purpose of simulating different elements and materials with complex chemical compositions. The accuracies of the final outcomes of these simulations are very sensitive to the accuracies of the cross‐sectional libraries. Several investigators have shown that inaccuracies of some of the cross section files have led to errors in  125I and  103Pd parameters. The purpose of this study is to compare the dosimetric parameters of sample brachytherapy sources, calculated with three different versions of the MCNP code — MCNP4C, MCNP5, and MCNPX. In these simulations for each source type, the source and phantom geometries, as well as the number of the photons, were kept identical, thus eliminating the possible uncertainties. The results of these investigations indicate that for low‐energy sources such as  125I and  103Pd there are discrepancies in gL(r) values. Discrepancies up to 21.7% and 28% are observed between MCNP4C and other codes at a distance of 6 cm for  103Pd and 10 cm for  125I from the source, respectively. However, for higher energy sources, the discrepancies in gL(r) values are less than 1.1% for  192Ir and less than 1.2% for  137Cs between the three codes. PACS number(s): 87.56.bg PMID:27074460

  10. Phase 1 Validation Testing and Simulation for the WEC-Sim Open Source Code

    Science.gov (United States)

    Ruehl, K.; Michelen, C.; Gunawan, B.; Bosma, B.; Simmons, A.; Lomonaco, P.

    2015-12-01

    WEC-Sim is an open source code to model wave energy converters performance in operational waves, developed by Sandia and NREL and funded by the US DOE. The code is a time-domain modeling tool developed in MATLAB/SIMULINK using the multibody dynamics solver SimMechanics, and solves the WEC's governing equations of motion using the Cummins time-domain impulse response formulation in 6 degrees of freedom. The WEC-Sim code has undergone verification through code-to-code comparisons; however validation of the code has been limited to publicly available experimental data sets. While these data sets provide preliminary code validation, the experimental tests were not explicitly designed for code validation, and as a result are limited in their ability to validate the full functionality of the WEC-Sim code. Therefore, dedicated physical model tests for WEC-Sim validation have been performed. This presentation provides an overview of the WEC-Sim validation experimental wave tank tests performed at the Oregon State University's Directional Wave Basin at Hinsdale Wave Research Laboratory. Phase 1 of experimental testing was focused on device characterization and completed in Fall 2015. Phase 2 is focused on WEC performance and scheduled for Winter 2015/2016. These experimental tests were designed explicitly to validate the performance of WEC-Sim code, and its new feature additions. Upon completion, the WEC-Sim validation data set will be made publicly available to the wave energy community. For the physical model test, a controllable model of a floating wave energy converter has been designed and constructed. The instrumentation includes state-of-the-art devices to measure pressure fields, motions in 6 DOF, multi-axial load cells, torque transducers, position transducers, and encoders. The model also incorporates a fully programmable Power-Take-Off system which can be used to generate or absorb wave energy. Numerical simulations of the experiments using WEC-Sim will be

  11. Characterization and cloning of TMV resistance gene N homologues ...

    African Journals Online (AJOL)

    Tobacco cultivars Nicotiana tabacum cv. Samsun NN plants carrying the N gene contain a multitude of N-related genes. We cloned a few N homologues and isolated two full-length cDNAs of NL-C26 and NL-B69 genes from N. tabacum cv. Samsun NN. Nucleotide sequence analysis showed that the coding regions of ...

  12. Source Code Verification for Embedded Systems using Prolog

    Directory of Open Access Journals (Sweden)

    Frank Flederer

    2017-01-01

    Full Text Available System relevant embedded software needs to be reliable and, therefore, well tested, especially for aerospace systems. A common technique to verify programs is the analysis of their abstract syntax tree (AST. Tree structures can be elegantly analyzed with the logic programming language Prolog. Moreover, Prolog offers further advantages for a thorough analysis: On the one hand, it natively provides versatile options to efficiently process tree or graph data structures. On the other hand, Prolog's non-determinism and backtracking eases tests of different variations of the program flow without big effort. A rule-based approach with Prolog allows to characterize the verification goals in a concise and declarative way. In this paper, we describe our approach to verify the source code of a flash file system with the help of Prolog. The flash file system is written in C++ and has been developed particularly for the use in satellites. We transform a given abstract syntax tree of C++ source code into Prolog facts and derive the call graph and the execution sequence (tree, which then are further tested against verification goals. The different program flow branching due to control structures is derived by backtracking as subtrees of the full execution sequence. Finally, these subtrees are verified in Prolog. We illustrate our approach with a case study, where we search for incorrect applications of semaphores in embedded software using the real-time operating system RODOS. We rely on computation tree logic (CTL and have designed an embedded domain specific language (DSL in Prolog to express the verification goals.

  13. A Seminar on Human Cloning: Cloning in Reproductive Medicine

    OpenAIRE

    Illmensee, Karl

    2001-01-01

    This review article summarizes the historical development of mammalian cloning, presents current advances and presumed risk factors in the field of reproductive cloning, discusses possible clinical applications of therapeutic and diagnostic cloning and outlines prospective commercial trends in pharmacytical cloning. Predictable progress in biotechnology and stem cell engineering should prove to be advantageous for patients' health and for novel benefits in reproductive and regenerative medicine.

  14. Multi-rate control over AWGN channels via analog joint source-channel coding

    KAUST Repository

    Khina, Anatoly; Pettersson, Gustav M.; Kostina, Victoria; Hassibi, Babak

    2017-01-01

    We consider the problem of controlling an unstable plant over an additive white Gaussian noise (AWGN) channel with a transmit power constraint, where the signaling rate of communication is larger than the sampling rate (for generating observations and applying control inputs) of the underlying plant. Such a situation is quite common since sampling is done at a rate that captures the dynamics of the plant and which is often much lower than the rate that can be communicated. This setting offers the opportunity of improving the system performance by employing multiple channel uses to convey a single message (output plant observation or control input). Common ways of doing so are through either repeating the message, or by quantizing it to a number of bits and then transmitting a channel coded version of the bits whose length is commensurate with the number of channel uses per sampled message. We argue that such “separated source and channel coding” can be suboptimal and propose to perform joint source-channel coding. Since the block length is short we obviate the need to go to the digital domain altogether and instead consider analog joint source-channel coding. For the case where the communication signaling rate is twice the sampling rate, we employ the Archimedean bi-spiral-based Shannon-Kotel'nikov analog maps to show significant improvement in stability margins and linear-quadratic Gaussian (LQG) costs over simple schemes that employ repetition.

  15. Multi-rate control over AWGN channels via analog joint source-channel coding

    KAUST Repository

    Khina, Anatoly

    2017-01-05

    We consider the problem of controlling an unstable plant over an additive white Gaussian noise (AWGN) channel with a transmit power constraint, where the signaling rate of communication is larger than the sampling rate (for generating observations and applying control inputs) of the underlying plant. Such a situation is quite common since sampling is done at a rate that captures the dynamics of the plant and which is often much lower than the rate that can be communicated. This setting offers the opportunity of improving the system performance by employing multiple channel uses to convey a single message (output plant observation or control input). Common ways of doing so are through either repeating the message, or by quantizing it to a number of bits and then transmitting a channel coded version of the bits whose length is commensurate with the number of channel uses per sampled message. We argue that such “separated source and channel coding” can be suboptimal and propose to perform joint source-channel coding. Since the block length is short we obviate the need to go to the digital domain altogether and instead consider analog joint source-channel coding. For the case where the communication signaling rate is twice the sampling rate, we employ the Archimedean bi-spiral-based Shannon-Kotel\\'nikov analog maps to show significant improvement in stability margins and linear-quadratic Gaussian (LQG) costs over simple schemes that employ repetition.

  16. Running the source term code package in Elebra MX-850

    International Nuclear Information System (INIS)

    Guimaraes, A.C.F.; Goes, A.G.A.

    1988-01-01

    The source term package (STCP) is one of the main tools applied in calculations of behavior of fission products from nuclear power plants. It is a set of computer codes to assist the calculations of the radioactive materials leaving from the metallic containment of power reactors to the environment during a severe reactor accident. The original version of STCP runs in SDC computer systems, but as it has been written in FORTRAN 77, is possible run it in others systems such as IBM, Burroughs, Elebra, etc. The Elebra MX-8500 version of STCP contains 5 codes:March 3, Trapmelt, Tcca, Vanessa and Nava. The example presented in this report has taken into consideration a small LOCA accident into a PWR type reactor. (M.I.)

  17. Code of practice for the use of sealed radioactive sources in borehole logging (1998)

    International Nuclear Information System (INIS)

    1989-12-01

    The purpose of this code is to establish working practices, procedures and protective measures which will aid in keeping doses, arising from the use of borehole logging equipment containing sealed radioactive sources, to as low as reasonably achievable and to ensure that the dose-equivalent limits specified in the National Health and Medical Research Council s radiation protection standards, are not exceeded. This code applies to all situations and practices where a sealed radioactive source or sources are used through wireline logging for investigating the physical properties of the geological sequence, or any fluids contained in the geological sequence, or the properties of the borehole itself, whether casing, mudcake or borehole fluids. The radiation protection standards specify dose-equivalent limits for two categories: radiation workers and members of the public. 3 refs., tabs., ills

  18. Cloning and characterization of DNA complementary to the canine distemper virus mRNA encoding matrix, phosphoprotein, and nucleocapsid protein

    International Nuclear Information System (INIS)

    Rozenblatt, S.; Eizenberg, O.; Englund, G.; Bellini, W.J.

    1985-01-01

    Double-stranded cDNA synthesized from total polyadenylate-containing mRNA, extracted from monkey kidney cells infected with canine distemper virus (CDV), has been cloned into the PstI site of Escherichia coli plasmid pBR322. Clones containing canine distemper virus DNA were identified by hybridization to a canine distemper virus-specific, 32 P-labeled cDNA. Four specific clones containing different classes of sequences have been identified. The cloned plasmids contain inserts of 800 (clone 44-80), 960 (clone 74-16), 1700 (clone 364), and 950 (clone 40-9) base pairs. The sizes of the mRNA species complementary to these inserts are 1500, 1850, 1850 and 2500 nucleotides, respectively, as determined by the Northern technique. Three of the cloned DNA fragments were further identified as the reverse transcripts of the mRNA coding for the matrix, phosphoprotein, and nucleocapsid protein of CDV

  19. Cloning and characterization of DNA complementary to the canine distemper virus mRNA encoding matrix, phosphoprotein, and nucleocapsid protein

    Energy Technology Data Exchange (ETDEWEB)

    Rozenblatt, S.; Eizenberg, O.; Englund, G.; Bellini, W.J.

    1985-02-01

    Double-stranded cDNA synthesized from total polyadenylate-containing mRNA, extracted from monkey kidney cells infected with canine distemper virus (CDV), has been cloned into the PstI site of Escherichia coli plasmid pBR322. Clones containing canine distemper virus DNA were identified by hybridization to a canine distemper virus-specific, /sup 32/P-labeled cDNA. Four specific clones containing different classes of sequences have been identified. The cloned plasmids contain inserts of 800 (clone 44-80), 960 (clone 74-16), 1700 (clone 364), and 950 (clone 40-9) base pairs. The sizes of the mRNA species complementary to these inserts are 1500, 1850, 1850 and 2500 nucleotides, respectively, as determined by the Northern technique. Three of the cloned DNA fragments were further identified as the reverse transcripts of the mRNA coding for the matrix, phosphoprotein, and nucleocapsid protein of CDV.

  20. CACTI: free, open-source software for the sequential coding of behavioral interactions.

    Science.gov (United States)

    Glynn, Lisa H; Hallgren, Kevin A; Houck, Jon M; Moyers, Theresa B

    2012-01-01

    The sequential analysis of client and clinician speech in psychotherapy sessions can help to identify and characterize potential mechanisms of treatment and behavior change. Previous studies required coding systems that were time-consuming, expensive, and error-prone. Existing software can be expensive and inflexible, and furthermore, no single package allows for pre-parsing, sequential coding, and assignment of global ratings. We developed a free, open-source, and adaptable program to meet these needs: The CASAA Application for Coding Treatment Interactions (CACTI). Without transcripts, CACTI facilitates the real-time sequential coding of behavioral interactions using WAV-format audio files. Most elements of the interface are user-modifiable through a simple XML file, and can be further adapted using Java through the terms of the GNU Public License. Coding with this software yields interrater reliabilities comparable to previous methods, but at greatly reduced time and expense. CACTI is a flexible research tool that can simplify psychotherapy process research, and has the potential to contribute to the improvement of treatment content and delivery.

  1. Neutrons Flux Distributions of the Pu-Be Source and its Simulation by the MCNP-4B Code

    Science.gov (United States)

    Faghihi, F.; Mehdizadeh, S.; Hadad, K.

    Neutron Fluence rate of a low intense Pu-Be source is measured by Neutron Activation Analysis (NAA) of 197Au foils. Also, the neutron fluence rate distribution versus energy is calculated using the MCNP-4B code based on ENDF/B-V library. Theoretical simulation as well as our experimental performance are a new experience for Iranians to make reliability with the code for further researches. In our theoretical investigation, an isotropic Pu-Be source with cylindrical volume distribution is simulated and relative neutron fluence rate versus energy is calculated using MCNP-4B code. Variation of the fast and also thermal neutrons fluence rate, which are measured by NAA method and MCNP code, are compared.

  2. Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs

    OpenAIRE

    Natarajan Meghanathan

    2013-01-01

    The high-level contribution of this paper is to illustrate the development of generic solution strategies to remove software security vulnerabilities that could be identified using automated tools for source code analysis on software programs (developed in Java). We use the Source Code Analyzer and Audit Workbench automated tools, developed by HP Fortify Inc., for our testing purposes. We present case studies involving a file writer program embedded with features for password validation, and ...

  3. Cloning of observables

    OpenAIRE

    Ferraro, Alessandro; Galbiati, Matteo; Paris, Matteo G. A.

    2005-01-01

    We introduce the concept of cloning for classes of observables and classify cloning machines for qubit systems according to the number of parameters needed to describe the class under investigation. A no-cloning theorem for observables is derived and the connections between cloning of observables and joint measurements of noncommuting observables are elucidated. Relationships with cloning of states and non-demolition measurements are also analyzed.

  4. Cloning and expression of cDNA coding for bouganin.

    Science.gov (United States)

    den Hartog, Marcel T; Lubelli, Chiara; Boon, Louis; Heerkens, Sijmie; Ortiz Buijsse, Antonio P; de Boer, Mark; Stirpe, Fiorenzo

    2002-03-01

    Bouganin is a ribosome-inactivating protein that recently was isolated from Bougainvillea spectabilis Willd. In this work, the cloning and expression of the cDNA encoding for bouganin is described. From the cDNA, the amino-acid sequence was deduced, which correlated with the primary sequence data obtained by amino-acid sequencing on the native protein. Bouganin is synthesized as a pro-peptide consisting of 305 amino acids, the first 26 of which act as a leader signal while the 29 C-terminal amino acids are cleaved during processing of the molecule. The mature protein consists of 250 amino acids. Using the cDNA sequence encoding the mature protein of 250 amino acids, a recombinant protein was expressed, purified and characterized. The recombinant molecule had similar activity in a cell-free protein synthesis assay and had comparable toxicity on living cells as compared to the isolated native bouganin.

  5. Cloning of observables

    International Nuclear Information System (INIS)

    Ferraro, Alessandro; Galbiati, Matteo; Paris, Matteo G A

    2006-01-01

    We introduce the concept of cloning for classes of observables and classify cloning machines for qubit systems according to the number of parameters needed to describe the class under investigation. A no-cloning theorem for observables is derived and the connections between cloning of observables and joint measurements of noncommuting observables are elucidated. Relationships with cloning of states and non-demolition measurements are also analysed. (letter to the editor)

  6. Nutritional value of milk and meat products derived from cloning.

    Science.gov (United States)

    Tomé, Daniel; Dubarry, Michel; Fromentin, Gilles

    2004-01-01

    The development and use of milk and meat products derived from cloning depends on their safety and on the nutritional advantages they can confer to the products as perceived by consumers. The development of such products thus implies (i) to demonstrate their safety and security, (ii) to show that their nutritional value is equivalent to the traditional products, and (iii) to identify the conditions under which cloning could allow additional nutritional and health benefit in comparison to traditional products for the consumers. Both milk and meat products are a source of high quality protein as determined from their protein content and essential amino acid profile. Milk is a source of calcium, phosphorus, zinc, magnesium and vitamin B2 and B12. Meat is a source of iron, zinc and vitamin B12. An important issue regarding the nutritional quality of meat and milk is the level and quality of fat which usually present a high content in saturated fat and some modification of the fat fraction could improve the nutritional quality of the products. The role of the dietary proteins as potential allergens has to be taken into account and an important aspect regarding this question is to evaluate whether the cloning does not produce the appearance of novel allergenic structures. The presence of bio-activities associated to specific components of milk (lactoferrin, immunoglobulins, growth factors, anti-microbial components) also represents a promising development. Preliminary results obtained in rats fed cow's milk or meat-based diets prepared from control animals or from animals derived from cloning did not show any difference between control and cloning-derived products.

  7. From system requirements to source code: transitions in UML and RUP

    Directory of Open Access Journals (Sweden)

    Stanisław Wrycza

    2011-06-01

    Full Text Available There are many manuals explaining language specification among UML-related books. Only some of books mentioned concentrate on practical aspects of using the UML language in effective way using CASE tools and RUP. The current paper presents transitions from system requirements specification to structural source code, useful while developing an information system.

  8. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system.

    Science.gov (United States)

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  9. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system

    Science.gov (United States)

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  10. RMG An Open Source Electronic Structure Code for Multi-Petaflops Calculations

    Science.gov (United States)

    Briggs, Emil; Lu, Wenchang; Hodak, Miroslav; Bernholc, Jerzy

    RMG (Real-space Multigrid) is an open source, density functional theory code for quantum simulations of materials. It solves the Kohn-Sham equations on real-space grids, which allows for natural parallelization via domain decomposition. Either subspace or Davidson diagonalization, coupled with multigrid methods, are used to accelerate convergence. RMG is a cross platform open source package which has been used in the study of a wide range of systems, including semiconductors, biomolecules, and nanoscale electronic devices. It can optionally use GPU accelerators to improve performance on systems where they are available. The recently released versions (>2.0) support multiple GPU's per compute node, have improved performance and scalability, enhanced accuracy and support for additional hardware platforms. New versions of the code are regularly released at http://www.rmgdft.org. The releases include binaries for Linux, Windows and MacIntosh systems, automated builds for clusters using cmake, as well as versions adapted to the major supercomputing installations and platforms. Several recent, large-scale applications of RMG will be discussed.

  11. The Clone Factory

    Science.gov (United States)

    Stoddard, Beryl

    2005-01-01

    Have humans been cloned? Is it possible? Immediate interest is sparked when students are asked these questions. In response to their curiosity, the clone factory activity was developed to help them understand the process of cloning. In this activity, students reenact the cloning process, in a very simplified simulation. After completing the…

  12. Coded moderator approach for fast neutron source detection and localization at standoff

    Energy Technology Data Exchange (ETDEWEB)

    Littell, Jennifer [Department of Nuclear Engineering, University of Tennessee, 305 Pasqua Engineering Building, Knoxville, TN 37996 (United States); Lukosi, Eric, E-mail: elukosi@utk.edu [Department of Nuclear Engineering, University of Tennessee, 305 Pasqua Engineering Building, Knoxville, TN 37996 (United States); Institute for Nuclear Security, University of Tennessee, 1640 Cumberland Avenue, Knoxville, TN 37996 (United States); Hayward, Jason; Milburn, Robert; Rowan, Allen [Department of Nuclear Engineering, University of Tennessee, 305 Pasqua Engineering Building, Knoxville, TN 37996 (United States)

    2015-06-01

    Considering the need for directional sensing at standoff for some security applications and scenarios where a neutron source may be shielded by high Z material that nearly eliminates the source gamma flux, this work focuses on investigating the feasibility of using thermal neutron sensitive boron straw detectors for fast neutron source detection and localization. We utilized MCNPX simulations to demonstrate that, through surrounding the boron straw detectors by a HDPE coded moderator, a source-detector orientation-specific response enables potential 1D source localization in a high neutron detection efficiency design. An initial test algorithm has been developed in order to confirm the viability of this detector system's localization capabilities which resulted in identification of a 1 MeV neutron source with a strength equivalent to 8 kg WGPu at 50 m standoff within ±11°.

  13. Ethical attitudes on human cloning among professionals in Taiwan and the policy implications for regulation.

    Science.gov (United States)

    Yang, Che-Ming; Chung, Chun-Chih; Lu, Meei-Shiow; Lin, Chiou-Fen; Chen, Jiun-Shyan

    2005-01-01

    This research focused on understanding the attitudes toward human cloning in Taiwan among professionals in healthcare, law, and religion. The study was conducted utilizing a structured questionnaire. 220 healthcare professionals from two regional hospitals located in Taipei, 351 religious professionals in the northern Taiwan and 711 legal professionals were selected by to receive questionnaires. The valid response rate is 42.1% The questions were generated by an expert panel and represented major arguments in the human cloning debate. There were a total of six Likert scaled questions in the questionnaire. The responses were coded from 1 to 5 with 1 representing strong opposition to human cloning, 3 representing a neutral attitude; and 5 representing a strong favorable attitude toward human cloning. Healthcare professionals had the highest overall average score of 2.14 and the religious professionals had the lowest average at 1.58. All three categories of respondents' attitude toward cloning ranged from mild opposition to strong opposition to human cloning. The religious professionals were more strongly opposed to cloning. Age, education, and religion significantly influenced attitudes toward cloning. Professionals between fifty-one and sixty years old, those with less education, and Roman Catholic professionals were more strongly opposed to cloning. Religious professionals were more strongly opposed to human cloning than professionals in healthcare or law. Younger professionals as an age group demonstrated less opposition to human cloning. Regulation of human cloning will be influenced by professionals in healthcare, law, and religion, and the regulatory environment chosen now will play a pivotal role in influencing the acceptance of human cloning in the future.

  14. Preparation of Proper Immunogen by Cloning and Stable Expression of cDNA coding for Human Hematopoietic Stem Cell Marker CD34 in NIH-3T3 Mouse Fibroblast Cell Line

    Science.gov (United States)

    Shafaghat, Farzaneh; Abbasi-Kenarsari, Hajar; Majidi, Jafar; Movassaghpour, Ali Akbar; Shanehbandi, Dariush; Kazemi, Tohid

    2015-01-01

    Purpose: Transmembrane CD34 glycoprotein is the most important marker for identification, isolation and enumeration of hematopoietic stem cells (HSCs). We aimed in this study to clone the cDNA coding for human CD34 from KG1a cell line and stably express in mouse fibroblast cell line NIH-3T3. Such artificial cell line could be useful as proper immunogen for production of mouse monoclonal antibodies. Methods: CD34 cDNA was cloned from KG1a cell line after total RNA extraction and cDNA synthesis. Pfu DNA polymerase-amplified specific band was ligated to pGEMT-easy TA-cloning vector and sub-cloned in pCMV6-Neo expression vector. After transfection of NIH-3T3 cells using 3 μg of recombinant construct and 6 μl of JetPEI transfection reagent, stable expression was obtained by selection of cells by G418 antibiotic and confirmed by surface flow cytometry. Results: 1158 bp specific band was aligned completely to reference sequence in NCBI database corresponding to long isoform of human CD34. Transient and stable expression of human CD34 on transfected NIH-3T3 mouse fibroblast cells was achieved (25% and 95%, respectively) as shown by flow cytometry. Conclusion: Cloning and stable expression of human CD34 cDNA was successfully performed and validated by standard flow cytometric analysis. Due to murine origin of NIH-3T3 cell line, CD34-expressing NIH-3T3 cells could be useful as immunogen in production of diagnostic monoclonal antibodies against human CD34. This approach could bypass the need for purification of recombinant proteins produced in eukaryotic expression systems. PMID:25789221

  15. Source Code Stylometry Improvements in Python

    Science.gov (United States)

    2017-12-14

    grant (Caliskan-Islam et al. 2015) ............. 1 Fig. 2 Corresponding abstract syntax tree from de-anonymizing programmers’ paper (Caliskan-Islam et...person can be identified via their handwriting or an author identified by their style or prose, programmers can be identified by their code...Provided a labelled training set of code samples (example in Fig. 1), the techniques used in stylometry can identify the author of a piece of code or even

  16. Isolation and characterization of two cDNA clones encoding for glutamate dehydrogenase in Nicotiana plumbaginifolia.

    Science.gov (United States)

    Ficarelli, A; Tassi, F; Restivo, F M

    1999-03-01

    We have isolated two full length cDNA clones encoding Nicotiana plumbaginifolia NADH-glutamate dehydrogenase. Both clones share amino acid boxes of homology corresponding to conserved GDH catalytic domains and putative mitochondrial targeting sequence. One clone shows a putative EF-hand loop. The level of the two transcripts is affected differently by carbon source.

  17. Cloning, sequencing, and expression of cDNA for human β-glucuronidase

    International Nuclear Information System (INIS)

    Oshima, A.; Kyle, J.W.; Miller, R.D.

    1987-01-01

    The authors report here the cDNA sequence for human placental β-glucuronidase (β-D-glucuronoside glucuronosohydrolase, EC 3.2.1.31) and demonstrate expression of the human enzyme in transfected COS cells. They also sequenced a partial cDNA clone from human fibroblasts that contained a 153-base-pair deletion within the coding sequence and found a second type of cDNA clone from placenta that contained the same deletion. Nuclease S1 mapping studies demonstrated two types of mRNAs in human placenta that corresponded to the two types of cDNA clones isolated. The NH 2 -terminal amino acid sequence determined for human spleen β-glucuronidase agreed with that inferred from the DNA sequence of the two placental clones, beginning at amino acid 23, suggesting a cleaved signal sequence of 22 amino acids. When transfected into COS cells, plasmids containing either placental clone expressed an immunoprecipitable protein that contained N-linked oligosaccharides as evidenced by sensitivity to endoglycosidase F. However, only transfection with the clone containing the 153-base-pair segment led to expression of human β-glucuronidase activity. These studies provide the sequence for the full-length cDNA for human β-glucuronidase, demonstrate the existence of two populations of mRNA for β-glucuronidase in human placenta, only one of which specifies a catalytically active enzyme, and illustrate the importance of expression studies in verifying that a cDNA is functionally full-length

  18. "Clones," Codes, and Conflicts of Interest in Cartooning: Cartoonists and Editors Look at Ethics.

    Science.gov (United States)

    Riffe, Daniel; And Others

    A study examined differences between political cartoonists and op-ed page editors on both traditional ethical issues (such as conflicts of interest) and the special, style-related concerns of editorial cartoonists. Hypotheses proposed were that editors and cartoonists (1) would condemn "cloning" or copying, reflecting an ethical…

  19. Multipartite asymmetric quantum cloning

    International Nuclear Information System (INIS)

    Iblisdir, S.; Gisin, N.; Acin, A.; Cerf, N.J.; Filip, R.; Fiurasek, J.

    2005-01-01

    We investigate the optimal distribution of quantum information over multipartite systems in asymmetric settings. We introduce cloning transformations that take N identical replicas of a pure state in any dimension as input and yield a collection of clones with nonidentical fidelities. As an example, if the clones are partitioned into a set of M A clones with fidelity F A and another set of M B clones with fidelity F B , the trade-off between these fidelities is analyzed, and particular cases of optimal N→M A +M B cloning machines are exhibited. We also present an optimal 1→1+1+1 cloning machine, which is an example of a tripartite fully asymmetric cloner. Finally, it is shown how these cloning machines can be optically realized

  20. Pre-coding method and apparatus for multiple source or time-shifted single source data and corresponding inverse post-decoding method and apparatus

    Science.gov (United States)

    Yeh, Pen-Shu (Inventor)

    1998-01-01

    A pre-coding method and device for improving data compression performance by removing correlation between a first original data set and a second original data set, each having M members, respectively. The pre-coding method produces a compression-efficiency-enhancing double-difference data set. The method and device produce a double-difference data set, i.e., an adjacent-delta calculation performed on a cross-delta data set or a cross-delta calculation performed on two adjacent-delta data sets, from either one of (1) two adjacent spectral bands coming from two discrete sources, respectively, or (2) two time-shifted data sets coming from a single source. The resulting double-difference data set is then coded using either a distortionless data encoding scheme (entropy encoding) or a lossy data compression scheme. Also, a post-decoding method and device for recovering a second original data set having been represented by such a double-difference data set.

  1. Cloning of the cDNA and gene for a human D2 dopamine receptor

    International Nuclear Information System (INIS)

    Grady, D.K.; Makam, H.; Stofko, R.E.; Bunzow, J.R.; Civelli, O.; Marchionni, M.A.; Alfano, M.; Frothingham, L.; Fischer, J.B.; Burke-Howie, K.J.; Server, A.C.

    1989-01-01

    A clone encoding a human D 2 dopamine receptor was isolated from a pituitary cDNA library and sequenced. The deduced protein sequence is 96% identical with that of the cloned rat receptor with one major difference: the human receptor contains an additional 29 amino acids in its putative third cytoplasmic loop. Southern blotting demonstrated the presence of only one human D 2 receptor gene. Two overlapping phage containing the gene were isolated and characterized. DNA sequence analysis of these clones showed that the coding sequence is interrupted by six introns and that the additional amino acids present in the human pituitary receptor are encoded by a single exon of 87 base pairs. The involvement of this sequence in alternative splicing and its biological significance are discussed

  2. Variation in biological properties of cauliflower mosaic virus clones.

    Science.gov (United States)

    al-Kaff, N; Covey, S N

    1994-11-01

    Infectious clones were prepared from virion DNA of three cauliflower mosaic virus (CaMV) isolates, 11/3, Xinjiang (XJ), and Aust, to investigate pathogenic variation in virus populations. Of 10 infectious clones obtained for isolate 11/3, four pathotypes were identified, each producing symptoms in turnip that differed from those of the 11/3 wild-type. Virus from two clonal groups of 11/3 was transmissible by aphids whereas that from two others was not. Of the five infectious clones obtained from isolate XJ, two groups were identified, one of which differed symptomatically from the wild-type. Only one infectious clone was obtained from isolate Aust and this had properties similar to the wild-type. Restriction enzyme polymorphisms were found in some clonal groups and these correlated with symptoms. Other groups with different pathogenic properties could not be distinguished apart by restriction site polymorphisms. Further variation was observed in the nucleotide sequences of gene II (coding for aphid transmission factor) from these viruses as compared with other CaMV isolates. In the aphid non-transmissible clones of isolate 11/3, one had a Gly to Arg mutation in gene II similar to that of other non-deleted non-transmissible CaMV isolates. The second had a 322 bp deletion at the site of a small direct repeat similar to that of isolate CM4-184 although occurring in a different position. The gene II deletion of isolate 11/3 produced a frame-shift that separated genes II and III by 60 bp. Most CaMV clones studied remained biologically stable producing similar symptoms during subsequent passages. However, one clone (11/3-7) produced two new biotypes during its first passage suggesting that it was relatively unstable. Our results show that wild-type populations of CaMV contain a range of infectious genome variants with contrasting biological properties and differing stability. We suggest that a variety of significant viral phenotypic changes can occur during each

  3. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  4. Bit rates in audio source coding

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    1992-01-01

    The goal is to introduce and solve the audio coding optimization problem. Psychoacoustic results such as masking and excitation pattern models are combined with results from rate distortion theory to formulate the audio coding optimization problem. The solution of the audio optimization problem is a

  5. Analysis of a cDNA clone expressing a human autoimmune antigen: full-length sequence of the U2 small nuclear RNA-associated B antigen

    International Nuclear Information System (INIS)

    Habets, W.J.; Sillekens, P.T.G.; Hoet, M.H.; Schalken, J.A.; Roebroek, A.J.M.; Leunissen, J.A.M.; Van de Ven, W.J.M.; Van Venrooij, W.J.

    1987-01-01

    A U2 small nuclear RNA-associated protein, designated B'', was recently identified as the target antigen for autoimmune sera from certain patients with systemic lupus erythematosus and other rheumatic diseases. Such antibodies enabled them to isolate cDNA clone λHB''-1 from a phage λgt11 expression library. This clone appeared to code for the B'' protein as established by in vitro translation of hybrid-selected mRNA. The identity of clone λHB''-1 was further confirmed by partial peptide mapping and analysis of the reactivity of the recombinant antigen with monospecific and monoclonal antibodies. Analysis of the nucleotide sequence of the 1015-base-pair cDNA insert of clone λHB''-1 revealed a large open reading frame of 800 nucleotides containing the coding sequence for a polypeptide of 25,457 daltons. In vitro transcription of the λHB''-1 cDNA insert and subsequent translation resulted in a protein product with the molecular size of the B'' protein. These data demonstrate that clone λHB''-1 contains the complete coding sequence of this antigen. The deduced polypeptide sequence contains three very hydrophilic regions that might constitute RNA binding sites and/or antigenic determinants. These findings might have implications both for the understanding of the pathogenesis of rheumatic diseases as well as for the elucidation of the biological function of autoimmune antigens

  6. The clone of wheat dehydrin-like gene wzy2 and its functional ...

    African Journals Online (AJOL)

    We used winter wheat (Triticum aestivum) Zhengyin No.1 as the material, the complete cDNA sequence of dehydrin wzy2 was cloned and the code sequence of wzy2 was transformed into yeast (Pichia pastoris) for eukaryotic expression. We also analyzed the relationship between wheat dehydrin wzy2 gene and drought ...

  7. COMPASS: A source term code for investigating capillary barrier performance

    International Nuclear Information System (INIS)

    Zhou, Wei; Apted, J.J.

    1996-01-01

    A computer code COMPASS based on compartment model approach is developed to calculate the near-field source term of the High-Level-Waste repository under unsaturated conditions. COMPASS is applied to evaluate the expected performance of Richard's (capillary) barriers as backfills to divert infiltrating groundwater at Yucca Mountain. Comparing the release rates of four typical nuclides with and without the Richard's barrier, it is shown that the Richard's barrier significantly decreases the peak release rates from the Engineered-Barrier-System (EBS) into the host rock

  8. Time-dependent anisotropic external sources in transient 3-D transport code TORT-TD

    International Nuclear Information System (INIS)

    Seubert, A.; Pautz, A.; Becker, M.; Dagan, R.

    2009-01-01

    This paper describes the implementation of a time-dependent distributed external source in TORT-TD by explicitly considering the external source in the ''fixed-source'' term of the implicitly time-discretised 3-D discrete ordinates transport equation. Anisotropy of the external source is represented by a spherical harmonics series expansion similar to the angular fluxes. The YALINA-Thermal subcritical assembly serves as a test case. The configuration with 280 fuel rods has been analysed with TORT-TD using cross sections in 18 energy groups and P1 scattering order generated by the KAPROS code system. Good agreement is achieved concerning the multiplication factor. The response of the system to an artificial time-dependent source consisting of two square-wave pulses demonstrates the time-dependent external source capability of TORT-TD. The result is physically plausible as judged from validation calculations. (orig.)

  9. Top 5 exotic clones for potato breeding

    Science.gov (United States)

    Wild and cultivated relatives of potato feature prominently in breeding programs. In this short article, I describe five exotic clones that have promising traits for the future of the US potato industry. They include M6, an inbred line of S. chacoense that provides a source of genes for self-compati...

  10. Experimental benchmark of the NINJA code for application to the Linac4 H- ion source plasma

    Science.gov (United States)

    Briefi, S.; Mattei, S.; Rauner, D.; Lettry, J.; Tran, M. Q.; Fantz, U.

    2017-10-01

    For a dedicated performance optimization of negative hydrogen ion sources applied at particle accelerators, a detailed assessment of the plasma processes is required. Due to the compact design of these sources, diagnostic access is typically limited to optical emission spectroscopy yielding only line-of-sight integrated results. In order to allow for a spatially resolved investigation, the electromagnetic particle-in-cell Monte Carlo collision code NINJA has been developed for the Linac4 ion source at CERN. This code considers the RF field generated by the ICP coil as well as the external static magnetic fields and calculates self-consistently the resulting discharge properties. NINJA is benchmarked at the diagnostically well accessible lab experiment CHARLIE (Concept studies for Helicon Assisted RF Low pressure Ion sourcEs) at varying RF power and gas pressure. A good general agreement is observed between experiment and simulation although the simulated electron density trends for varying pressure and power as well as the absolute electron temperature values deviate slightly from the measured ones. This can be explained by the assumption of strong inductive coupling in NINJA, whereas the CHARLIE discharges show the characteristics of loosely coupled plasmas. For the Linac4 plasma, this assumption is valid. Accordingly, both the absolute values of the accessible plasma parameters and their trends for varying RF power agree well in measurement and simulation. At varying RF power, the H- current extracted from the Linac4 source peaks at 40 kW. For volume operation, this is perfectly reflected by assessing the processes in front of the extraction aperture based on the simulation results where the highest H- density is obtained for the same power level. In surface operation, the production of negative hydrogen ions at the converter surface can only be considered by specialized beam formation codes, which require plasma parameters as input. It has been demonstrated that

  11. Uncertainties in source term calculations generated by the ORIGEN2 computer code for Hanford Production Reactors

    International Nuclear Information System (INIS)

    Heeb, C.M.

    1991-03-01

    The ORIGEN2 computer code is the primary calculational tool for computing isotopic source terms for the Hanford Environmental Dose Reconstruction (HEDR) Project. The ORIGEN2 code computes the amounts of radionuclides that are created or remain in spent nuclear fuel after neutron irradiation and radioactive decay have occurred as a result of nuclear reactor operation. ORIGEN2 was chosen as the primary code for these calculations because it is widely used and accepted by the nuclear industry, both in the United States and the rest of the world. Its comprehensive library of over 1,600 nuclides includes any possible isotope of interest to the HEDR Project. It is important to evaluate the uncertainties expected from use of ORIGEN2 in the HEDR Project because these uncertainties may have a pivotal impact on the final accuracy and credibility of the results of the project. There are three primary sources of uncertainty in an ORIGEN2 calculation: basic nuclear data uncertainty in neutron cross sections, radioactive decay constants, energy per fission, and fission product yields; calculational uncertainty due to input data; and code uncertainties (i.e., numerical approximations, and neutron spectrum-averaged cross-section values from the code library). 15 refs., 5 figs., 5 tabs

  12. Human cloning, stem cell research. An Islamic perspective.

    Science.gov (United States)

    Al-Aqeel, Aida I

    2009-12-01

    The rapidly changing technologies that involve human subjects raise complex ethical, legal, social, and religious issues. Recent advances in the field of cloning and stem cell research have introduced new hopes for the treatment of serious diseases. But this promise has raised many complex questions. This field causes debate and challenge, not only among scientists but also among ethicists, religious scholars, governments, and politicians. There is no consensus on the morality of human cloning, even within specific religious traditions. In countries in which religion has a strong influence on political decision making, the moral status of the human embryo is at the center of the debate. Because of the inevitable consequences of reproductive cloning, it is prohibited in Islam. However, stem cell research for therapeutic purposes is permissible with full consideration, and all possible precautions in the pre-ensoulment stages of early fetus development, if the source is legitimate.

  13. Human therapeutic cloning (NTSC): applying research from mammalian reproductive cloning.

    Science.gov (United States)

    French, Andrew J; Wood, Samuel H; Trounson, Alan O

    2006-01-01

    Human therapeutic cloning or nuclear transfer stem cells (NTSC) to produce patient-specific stem cells, holds considerable promise in the field of regenerative medicine. The recent withdrawal of the only scientific publications claiming the successful generation of NTSC lines afford an opportunity to review the available research in mammalian reproductive somatic cell nuclear transfer (SCNT) with the goal of progressing human NTSC. The process of SCNT is prone to epigenetic abnormalities that contribute to very low success rates. Although there are high mortality rates in some species of cloned animals, most surviving clones have been shown to have normal phenotypic and physiological characteristics and to produce healthy offspring. This technology has been applied to an increasing number of mammals for utility in research, agriculture, conservation, and biomedicine. In contrast, attempts at SCNT to produce human embryonic stem cells (hESCs) have been disappointing. Only one group has published reliable evidence of success in deriving a cloned human blastocyst, using an undifferentiated hESC donor cell, and it failed to develop into a hESC line. When optimal conditions are present, it appears that in vitro development of cloned and parthenogenetic embryos, both of which may be utilized to produce hESCs, may be similar to in vitro fertilized embryos. The derivation of ESC lines from cloned embryos is substantially more efficient than the production of viable offspring. This review summarizes developments in mammalian reproductive cloning, cell-to-cell fusion alternatives, and strategies for oocyte procurement that may provide important clues facilitating progress in human therapeutic cloning leading to the successful application of cell-based therapies utilizing autologous hESC lines.

  14. A Comparison of Source Code Plagiarism Detection Engines

    Science.gov (United States)

    Lancaster, Thomas; Culwin, Fintan

    2004-06-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and effective techniques are seen to involve tokenising student submissions then searching pairs of submissions for long common substrings, an example of what is defined to be a paired structural metric. Computing academics are recommended to use one of the two Web-based detection engines, MOSS and JPlag. It is shown that whilst detection is well established there are still places where further research would be useful, particularly where visual support of the investigation process is possible.

  15. Sensitivity analysis and benchmarking of the BLT low-level waste source term code

    International Nuclear Information System (INIS)

    Suen, C.J.; Sullivan, T.M.

    1993-07-01

    To evaluate the source term for low-level waste disposal, a comprehensive model had been developed and incorporated into a computer code, called BLT (Breach-Leach-Transport) Since the release of the original version, many new features and improvements had also been added to the Leach model of the code. This report consists of two different studies based on the new version of the BLT code: (1) a series of verification/sensitivity tests; and (2) benchmarking of the BLT code using field data. Based on the results of the verification/sensitivity tests, the authors concluded that the new version represents a significant improvement and it is capable of providing more realistic simulations of the leaching process. Benchmarking work was carried out to provide a reasonable level of confidence in the model predictions. In this study, the experimentally measured release curves for nitrate, technetium-99 and tritium from the saltstone lysimeters operated by Savannah River Laboratory were used. The model results are observed to be in general agreement with the experimental data, within the acceptable limits of uncertainty

  16. Growth and nutrient efficiency of Betula alnoides clones in response to phosphorus supply

    Directory of Open Access Journals (Sweden)

    Lin Chen

    2016-12-01

    Full Text Available As phosphorus deficiency limits the productivity of many plantation forests in Asia, there is considerable interest in developing phosphorus-efficient clones for the region through targeted breeding programs. Therefore, we determined growth, nutrient concentrations and nutrient absorption and utility efficiencies of four Betula alnoides clones (C5, C6, 1-202 and BY1 in response to six phosphorus levels of 0, 17, 52, 70, 140 and 209 mg P plant-1 coded as P1 to P6, respectively. Maximum growth occurred in the P4, P5 and P6 plants since they had the largest height, biomass, leaf area and branch number. Phosphorus application increased the phosphorus concentrations of all clones. Nutrient loading was achieved with the P6 treatment because growth and biomass were not significantly higher, but root, stem and leaf phosphorus concentrations were approximately twice those of P4 plants. Clone BY1 had the highest phosphorus-efficiency, and is recommended for field application due to its maximum root collar diameter, biomass, root/shoot ratio, leaf area, nutrient absorption and utility efficiency among the four clones. The findings will help to improve the nutrient efficiency of this species in plantation forestry in Asia.

  17. Isolation and expression of a novel chick G-protein cDNA coding for a G alpha i3 protein with a G alpha 0 N-terminus.

    OpenAIRE

    Kilbourne, E J; Galper, J B

    1994-01-01

    We have cloned cDNAs coding for G-protein alpha subunits from a chick brain cDNA library. Based on sequence similarity to G-protein alpha subunits from other eukaryotes, one clone was designated G alpha i3. A second clone, G alpha i3-o, was identical to the G alpha i3 clone over 932 bases on the 3' end. The 5' end of G alpha i3-o, however, contained an alternative sequence in which the first 45 amino acids coded for are 100% identical to the conserved N-terminus of G alpha o from species such...

  18. Ethical issues in animal cloning.

    Science.gov (United States)

    Fiester, Autumn

    2005-01-01

    The issue of human reproductive cloning has recently received a great deal attention in public discourse. Bioethicists, policy makers, and the media have been quick to identify the key ethical issues involved in human reproductive cloning and to argue, almost unanimously, for an international ban on such attempts. Meanwhile, scientists have proceeded with extensive research agendas in the cloning of animals. Despite this research, there has been little public discussion of the ethical issues raised by animal cloning projects. Polling data show that the public is decidedly against the cloning of animals. To understand the public's reaction and fill the void of reasoned debate about the issue, we need to review the possible objections to animal cloning and assess the merits of the anti-animal cloning stance. Some objections to animal cloning (e.g., the impact of cloning on the population of unwanted animals) can be easily addressed, while others (e.g., the health of cloned animals) require more serious attention by the public and policy makers.

  19. Stochasticity or the fatal `imperfection' of cloning

    Indian Academy of Sciences (India)

    2005-01-07

    Jan 7, 2005 ... The concept of clone is analysed with the aim of exploring the limits to which a phenotype can be said to be determined geneticaly. First of all, mutations that result from the replication, topological manipulation or lesion of DNA introduce a source of heritable variation in an otherwise identical genetic ...

  20. Review of the status of validation of the computer codes used in the severe accident source term reassessment study (BMI-2104)

    International Nuclear Information System (INIS)

    Kress, T.S.

    1985-04-01

    The determination of severe accident source terms must, by necessity it seems, rely heavily on the use of complex computer codes. Source term acceptability, therefore, rests on the assessed validity of such codes. Consequently, one element of NRC's recent efforts to reassess LWR severe accident source terms is to provide a review of the status of validation of the computer codes used in the reassessment. The results of this review is the subject of this document. The separate review documents compiled in this report were used as a resource along with the results of the BMI-2104 study by BCL and the QUEST study by SNL to arrive at a more-or-less independent appraisal of the status of source term modeling at this time

  1. Optimally cloned binary coherent states

    DEFF Research Database (Denmark)

    Mueller, C. R.; Leuchs, G.; Marquardt, Ch

    2017-01-01

    their quantum-optimal clones. We analyze the Wigner function and the cumulants of the clones, and we conclude that optimal cloning of binary coherent states requires a nonlinearity above second order. We propose several practical and near-optimal cloning schemes and compare their cloning fidelity to the optimal...

  2. OpenSWPC: an open-source integrated parallel simulation code for modeling seismic wave propagation in 3D heterogeneous viscoelastic media

    Science.gov (United States)

    Maeda, Takuto; Takemura, Shunsuke; Furumura, Takashi

    2017-07-01

    We have developed an open-source software package, Open-source Seismic Wave Propagation Code (OpenSWPC), for parallel numerical simulations of seismic wave propagation in 3D and 2D (P-SV and SH) viscoelastic media based on the finite difference method in local-to-regional scales. This code is equipped with a frequency-independent attenuation model based on the generalized Zener body and an efficient perfectly matched layer for absorbing boundary condition. A hybrid-style programming using OpenMP and the Message Passing Interface (MPI) is adopted for efficient parallel computation. OpenSWPC has wide applicability for seismological studies and great portability to allowing excellent performance from PC clusters to supercomputers. Without modifying the code, users can conduct seismic wave propagation simulations using their own velocity structure models and the necessary source representations by specifying them in an input parameter file. The code has various modes for different types of velocity structure model input and different source representations such as single force, moment tensor and plane-wave incidence, which can easily be selected via the input parameters. Widely used binary data formats, the Network Common Data Form (NetCDF) and the Seismic Analysis Code (SAC) are adopted for the input of the heterogeneous structure model and the outputs of the simulation results, so users can easily handle the input/output datasets. All codes are written in Fortran 2003 and are available with detailed documents in a public repository.[Figure not available: see fulltext.

  3. New Source Term Model for the RESRAD-OFFSITE Code Version 3

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Charley [Argonne National Lab. (ANL), Argonne, IL (United States); Gnanapragasam, Emmanuel [Argonne National Lab. (ANL), Argonne, IL (United States); Cheng, Jing-Jy [Argonne National Lab. (ANL), Argonne, IL (United States); Kamboj, Sunita [Argonne National Lab. (ANL), Argonne, IL (United States); Chen, Shih-Yew [Argonne National Lab. (ANL), Argonne, IL (United States)

    2013-06-01

    This report documents the new source term model developed and implemented in Version 3 of the RESRAD-OFFSITE code. This new source term model includes: (1) "first order release with transport" option, in which the release of the radionuclide is proportional to the inventory in the primary contamination and the user-specified leach rate is the proportionality constant, (2) "equilibrium desorption release" option, in which the user specifies the distribution coefficient which quantifies the partitioning of the radionuclide between the solid and aqueous phases, and (3) "uniform release" option, in which the radionuclides are released from a constant fraction of the initially contaminated material during each time interval and the user specifies the duration over which the radionuclides are released.

  4. An efficient transgenic system by TA cloning vectors and RNAi for C. elegans

    International Nuclear Information System (INIS)

    Gengyo-Ando, Keiko; Yoshina, Sawako; Inoue, Hideshi; Mitani, Shohei

    2006-01-01

    In the nematode, transgenic analyses have been performed by microinjection of DNA from various sources into the syncytium gonad. To expedite these transgenic analyses, we solved two potential problems in this work. First, we constructed an efficient TA-cloning vector system which is useful for any promoter. By amplifying the genomic DNA fragments which contain regulatory sequences with or without the coding region, we could easily construct plasmids expressing fluorescent protein fusion without considering restriction sites. We could dissect motor neurons with three colors in a single animal. Second, we used feeding RNAi to isolate transgenic strains which express lag-2::venus fusion gene. We found that the fusion protein is toxic when ectopically expressed in embryos but is functional to rescue a loss of function mutant in the lag-2 gene. Thus, the transgenic system described here should be useful to examine the protein function in the nematode

  5. Efficient four fragment cloning for the construction of vectors for targeted gene replacement in filamentous fungi

    DEFF Research Database (Denmark)

    Frandsen, Rasmus John Normand; Andersson, Jens A.; Kristensen, Matilde Bylov

    2008-01-01

    Background: The rapid increase in whole genome fungal sequence information allows large scale functional analyses of target genes. Efficient transformation methods to obtain site-directed gene replacement, targeted over-expression by promoter replacement, in-frame epitope tagging or fusion...... of coding sequences with fluorescent markers such as GFP are essential for this process. Construction of vectors for these experiments depends on the directional cloning of two homologous recombination sequences on each side of a selection marker gene. Results: Here, we present a USER Friendly cloning based...

  6. Isolation and characterization of human cDNA clones encoding the α and the α' subunits of casein kinase II

    International Nuclear Information System (INIS)

    Lozeman, F.J.; Litchfield, D.W.; Piening, C.; Takio, Koji; Walsh, K.A.; Krebs, E.G.

    1990-01-01

    Casein kinase II is a widely distributed protein serine/threonine kinase. The holoenzyme appears to be a tetramer, containing two α or α' subunits (or one of each) and two β subunits. Complementary DNA clones encoding the subunits of casein kinase II were isolated from a human T-cell λgt 10 library using cDNA clones isolated from Drosophila melanogasten. One of the human cDNA clones (hT4.1) was 2.2 kb long, including a coding region of 1176 bp preceded by 156 bp (5' untranslated region) and followed by 871 bp (3' untranslated region). The hT4.1 close was nearly identical in size and sequence with a cDNA clone from HepG2 human hepatoma cultured cells. Another of the human T-cell cDNA clones (hT9.1) was 1.8 kb long, containing a coding region of 1053 bp preceded by 171 by (5' untranslated region) and followed by 550 bp (3' untranslated region). Amino acid sequences deduced from these two cDNA clones were about 85% identical. Most of the difference between the two encoded polypeptides was in the carboxy-terminal region, but heterogeneity was distributed throughout the molecules. Partial amino acid sequence was determined in a mixture of α and α' subunits from bovine lung casein kinase II. The bovine sequences aligned with the 2 human cDNA-encoded polypeptides with only 2 discrepancies out of 535 amino acid positions. This confirmed that the two human T-cell cDNA clones encoded the α and α' subunits of casein kinase II. These studies show that there are two distinct catalytic subunits for casein II (α and α') and that the sequence of these subunits is largely conserved between the bovine and the human

  7. The topsy-turvy cloning law.

    Science.gov (United States)

    Brassington, Iain; Oultram, Stuart

    2011-03-01

    In debates about human cloning, a distinction is frequently drawn between therapeutic and reproductive uses of the technology. Naturally enough, this distinction influences the way that the law is framed. The general consensus is that therapeutic cloning is less morally problematic than reproductive cloning--one can hold this position while holding that both are morally unacceptable--and the law frequently leaves the way open for some cloning for the sake of research into new therapeutic techniques while banning it for reproductive purposes. We claim that the position adopted by the law has things the wrong way around: if we accept a moral distinction between therapeutic and reproductive cloning, there are actually more reasons to be morally worried about therapeutic cloning than about reproductive cloning. If cloning is the proper object of legal scrutiny, then, we ought to make sure that we are scrutinising the right kind of clone.

  8. Academic Cloning.

    Science.gov (United States)

    Sikula, John P.; Sikula, Andrew F.

    1980-01-01

    The authors define "cloning" as an integral feature of all educational systems, citing teaching practices which reward students for closely reproducing the teacher's thoughts and/or behaviors and administrative systems which tend to promote like-minded subordinates. They insist, however, that "academic cloning" is not a totally…

  9. Cloning and expression of 130-kd mosquito-larvicidal delta-endotoxin gene of Bacillus thuringiensis var. Israelensis in Escherichia coli.

    Science.gov (United States)

    Angsuthanasombat, C; Chungjatupornchai, W; Kertbundit, S; Luxananil, P; Settasatian, C; Wilairat, P; Panyim, S

    1987-07-01

    Five recombinant E. coli clones exhibiting toxicity to Aedes aegypti larvae were obtained from a library of 800 clones containing XbaI DNA fragments of 110 kb plasmid from B. thuringiensis var. israelensis. All the five clones (pMU 14/258/303/388/679) had the same 3.8-kb insert and encoded a major protein of 130 kDa which was highly toxic to A. aegypti larvae. Three clones (pMU 258/303/388) transcribed the 130 kD a gene in the same direction as that of lac Z promoter of pUC12 vector whereas the transcription of the other two (pMU 14/679) was in the opposite direction. A 1.9-kb fragment of the 3.8 kb insert coded for a protein of 65 kDa. Partial DNA sequence of the 3.8 kb insert, corresponding to the 5'-terminal of the 130 kDa gene, revealed a continuous reading frame, a Shine-Dalgarno sequence and a tentative 5'-regulatory region. These results demonstrated that the 3.8 kb insert is a minimal DNA fragment containing a regulatory region plus the coding sequence of the 130 kDa protein that is highly toxic to mosquito larvae.

  10. Code of practice for the control and safe handling of radioactive sources used for therapeutic purposes (1988)

    International Nuclear Information System (INIS)

    1988-01-01

    This Code is intended as a guide to safe practices in the use of sealed and unsealed radioactive sources and in the management of patients being treated with them. It covers the procedures for the handling, preparation and use of radioactive sources, precautions to be taken for patients undergoing treatment, storage and transport of radioactive sources within a hospital or clinic, and routine testing of sealed sources [fr

  11. Human terminal deoxyribonucleotidyltransferase: molecular cloning and structural analysis of the gene and 5' flanking region

    International Nuclear Information System (INIS)

    Riley, L.K.; Morrow, J.K.; Danton, M.J.; Coleman, M.S.

    1988-01-01

    Human terminal deoxyribonucleotidyltransferase cDNA contains an open reading frame of 1530 base pairs (bp) corresponding to a protein containing 510 amino acids. The encoded protein is a template-independent DNA polymerase found only in a restricted population of normal and malignant prelymphocytes. To begin to investigate the genetic elements responsible for the tissue-specific expression of terminal deoxyribonucleotidyltransferase, genomic clones, containing the entire human gene were isolated and characterized. Initially, cDNA clones were isolated from a library generated from the human lymphoblastoid cell line, MOLT-4R. A cDNA clone containing the entire coding region of the protein was used to isolate a series of overlapping clones from two human genomic libraries. The gene comprises 11 exons and 10 introns and spans 49.4 kilobases. The 5' flanking region (709 bp) including exon 1 was sequenced. Several putative transcription initiation sites were mapped. Within 500 nucleotides of the translation start site, a series of promoter elements was detected. TATA and CAAT sequences, respectively, were found to start at nucleotides -185 and -204, -328 and -370, and -465 and -505. Start sites were found for a cyclic AMP-dependent promoter analog at nucleotide -121, an eight-base sequence corresponding to the IgG promoter enhancer (cd) at nucleotide -455, and an analog of the IgG promoter (pd) at nucleotide -159. These findings suggest that transcripts coding for terminal deoxyribonucleotidyltransferase may be variable in length and that transcription may be influenced by a variety of genetic elements

  12. A single-copy galK promoter cloning vector suitable for cloning strong promoters

    DEFF Research Database (Denmark)

    Dandanell, Gert; Court, Donald L.; Hammer, Karin

    1986-01-01

    We report the construction of lambda galK promoter cloning vectors for cloning and characterization of strong promoters. This phage, which contains a unique HindIII cloning site, was applied to the cloning and analysis of transcription initiations of the regulatory region of the deo-operon of...

  13. MOLECULAR GENE CLONING OF NICOTINE-DEHIDROGENASE FROM THE pAO1 MEGAPLASMID OF ARTHROBACTER NICOTINOVORANS

    Directory of Open Access Journals (Sweden)

    Andreea Andrei

    2013-10-01

    Full Text Available 6-hydroxi-L-nicotine (6HNic has an important potential as a drug for neuro-degenerative disorders and a  suitable simple and reliable method for obtaining contaminant-free 6HNic preparations is required. Here, we envision the in-vitro production of 6HNic by using purified nicotine-dehydrogenase (NDH followed by HPLC or capillary electrophoresis techniques and we focus on the isolation and cloning of the three genes coding the NDH enzyme.  A PCR protocol was established for easy amplification and the DNA fragment containing the ndhLSM genes was directionally cloned into the pART2 vector.

  14. Changes in the gut microbiota of cloned and non-cloned control pigs during development of obesity: gut microbiota during development of obesity in cloned pigs.

    Science.gov (United States)

    Pedersen, Rebecca; Andersen, Anders Daniel; Mølbak, Lars; Stagsted, Jan; Boye, Mette

    2013-02-07

    Obesity induced by a high-caloric diet has previously been associated with changes in the gut microbiota in mice and in humans. In this study, pigs were cloned to minimize genetic and biological variation among the animals with the aim of developing a controlled metabolomic model suitable for a diet-intervention study. Cloning of pigs may be an attractive way to reduce genetic influences when investigating the effect of diet and obesity on different physiological sites. The aim of this study was to assess and compare the changes in the composition of the gut microbiota of cloned vs. non-cloned pigs during development of obesity by a high-fat/high-caloric diet. Furthermore, we investigated the association between diet-induced obesity and the relative abundance of the phyla Firmicutes and Bacteroidetes in the fecal-microbiota. The fecal microbiota from obese cloned (n = 5) and non-cloned control pigs (n= 6) was investigated biweekly over a period of 136 days, by terminal restriction fragment length polymorphism (T-RFLP) and quantitative real time PCR (qPCR). A positive correlation was observed between body-weight at endpoint and percent body-fat in cloned (r=0.9, Pmicrobiota between the cloned pigs or between cloned and non-cloned control pigs. Body-weight correlated positively with the relative abundance of Firmicutes in both cloned (r=0.37; Pgut microbiota in neither the obese nor the lean state. Diet-induced obesity was associated with an increase in the relative abundance of Firmicutes over time. Our results suggest that cloned pigs are not a more suitable animal model for gut microbiota-obesity related studies than non-cloned pigs. This study is the first to evaluate if cloned pigs provide a better animal model than conventional pigs in diet-intervention, obesity and gut microbiota research.

  15. Putative porcine embryonic stem cell lines derived from aggregated four-celled cloned embryos produced by oocyte bisection cloning.

    Science.gov (United States)

    Siriboon, Chawalit; Lin, Yu-Hsuan; Kere, Michel; Chen, Chun-Da; Chen, Lih-Ren; Chen, Chien-Hong; Tu, Ching-Fu; Lo, Neng-Wen; Ju, Jyh-Cherng

    2015-01-01

    We attempted to isolate ES cell lines using inner cell masses from high-quality cloned porcine blastocysts. After being seeded onto feeders, embryos had better (P cloned embryos (62.8, 42.6 and 12.8% vs. 76.2, 55.2 and 26.2%, respectively) compared to the non-aggregated group (41.6, 23.4 and 3.9%). Effects of feeder types (STO vs. MEF) and serum sources (FBS vs. KSR) on extraction of cloned embryo-derived porcine ES cells were examined. More (17.1%) ntES cell lines over Passage 3 were generated in the MEF/KSR group. However, ntES cells cultured in KSR-supplemented medium had a low proliferation rate with defective morphology, and eventually underwent differentiation or apoptosis subsequently. Approximately 26.1, 22.7 and 35.7% of primary colonies were formed after plating embryos in DMEM, DMEM/F12 and α-MEM media, respectively. Survival rates of ntES cells cultured in α-MEM, DMEM and DMEM/F12 were 16.7, 4.3 and 6.8%, respectively (P > 0.05). We further examined the beneficial effect of TSA treatment of 3× aggregated cloned embryos on establishment of ntES cell lines. Primary colony numbers and survival rates of ntES cells beyond passage 3 were higher (P cells, remaining undifferentiated over 25 passages, had alkaline phosphatase activity and expressed ES specific markers Oct4, Nanog, Sox2, and Rex01. Moreover, these ntES cells successfully differentiated into embryoid bodies (EBs) that expressed specific genes of all three germ layers after being cultured in LIF-free medium. In conclusion, we have successfully derived putative porcine ntES cells with high efficiency from quality cloned embryos produced by embryo aggregation, and optimized the ES cell culture system suitable for establishing and maintaining ntES cell lines in undifferentiated state.

  16. Quantum cloning machines and the applications

    Energy Technology Data Exchange (ETDEWEB)

    Fan, Heng, E-mail: hfan@iphy.ac.cn [Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China); Collaborative Innovation Center of Quantum Matter, Beijing 100190 (China); Wang, Yi-Nan; Jing, Li [School of Physics, Peking University, Beijing 100871 (China); Yue, Jie-Dong [Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China); Shi, Han-Duo; Zhang, Yong-Liang; Mu, Liang-Zhu [School of Physics, Peking University, Beijing 100871 (China)

    2014-11-20

    No-cloning theorem is fundamental for quantum mechanics and for quantum information science that states an unknown quantum state cannot be cloned perfectly. However, we can try to clone a quantum state approximately with the optimal fidelity, or instead, we can try to clone it perfectly with the largest probability. Thus various quantum cloning machines have been designed for different quantum information protocols. Specifically, quantum cloning machines can be designed to analyze the security of quantum key distribution protocols such as BB84 protocol, six-state protocol, B92 protocol and their generalizations. Some well-known quantum cloning machines include universal quantum cloning machine, phase-covariant cloning machine, the asymmetric quantum cloning machine and the probabilistic quantum cloning machine. In the past years, much progress has been made in studying quantum cloning machines and their applications and implementations, both theoretically and experimentally. In this review, we will give a complete description of those important developments about quantum cloning and some related topics. On the other hand, this review is self-consistent, and in particular, we try to present some detailed formulations so that further study can be taken based on those results.

  17. Quantum cloning machines and the applications

    International Nuclear Information System (INIS)

    Fan, Heng; Wang, Yi-Nan; Jing, Li; Yue, Jie-Dong; Shi, Han-Duo; Zhang, Yong-Liang; Mu, Liang-Zhu

    2014-01-01

    No-cloning theorem is fundamental for quantum mechanics and for quantum information science that states an unknown quantum state cannot be cloned perfectly. However, we can try to clone a quantum state approximately with the optimal fidelity, or instead, we can try to clone it perfectly with the largest probability. Thus various quantum cloning machines have been designed for different quantum information protocols. Specifically, quantum cloning machines can be designed to analyze the security of quantum key distribution protocols such as BB84 protocol, six-state protocol, B92 protocol and their generalizations. Some well-known quantum cloning machines include universal quantum cloning machine, phase-covariant cloning machine, the asymmetric quantum cloning machine and the probabilistic quantum cloning machine. In the past years, much progress has been made in studying quantum cloning machines and their applications and implementations, both theoretically and experimentally. In this review, we will give a complete description of those important developments about quantum cloning and some related topics. On the other hand, this review is self-consistent, and in particular, we try to present some detailed formulations so that further study can be taken based on those results

  18. cDNA cloning and immunological characterization of the rye grass allergen Lol p I.

    Science.gov (United States)

    Perez, M; Ishioka, G Y; Walker, L E; Chesnut, R W

    1990-09-25

    The complete amino acid sequence of two "isoallergenic" forms of Lol p I, the major rye grass (Lolium perenne) pollen allergen, was deduced from cDNA sequence analysis. cDNA clones isolated from a Lolium perenne pollen library contained an open reading frame coding for a 240-amino acid protein. Comparison of the nucleotide and deduced amino acid sequence of two of these clones revealed four changes at the amino acid level and numerous nucleotide differences. Both clones contained one possible asparagine-linked glycosylation site. Northern blot analysis shows one RNA species of 1.2 kilobases. Based on the complete amino acid sequence of Lol p I, overlapping peptides covering the entire molecule were synthesized. Utilizing these peptides we have identified a determinant within the Lol p I molecule that is recognized by human leukocyte antigen class II-restricted T cells obtained from persons allergic to rye grass pollen.

  19. [Nuclear transfer and therapeutic cloning].

    Science.gov (United States)

    Xu, Xiao-Ming; Lei, An-Min; Hua, Jin-Lian; Dou, Zhong-Ying

    2005-03-01

    Nuclear transfer and therapeutic cloning have widespread and attractive prospects in animal agriculture and biomedical applications. We reviewed that the quality of oocytes and nuclear reprogramming of somatic donor cells were the main reasons of the common abnormalities in cloned animals and the low efficiency of cloning and showed the problems and outlets in therapeutic cloning, such as some basic problems in nuclear transfer affected clinical applications of therapeutic cloning. Study on isolation and culture of nuclear transfer embryonic stem (ntES) cells and specific differentiation of ntES cells into important functional cells should be emphasized and could enhance the efficiency. Adult stem cells could help to cure some great diseases, but could not replace therapeutic cloning. Ethics also impeded the development of therapeutic cloning. It is necessary to improve many techniques and reinforce the research of some basic theories, then somatic nuclear transfer and therapeutic cloning may apply to agriculture reproduction and benefit to human life better.

  20. Proteins interacting with cloning scars: a source of false positive protein-protein interactions.

    Science.gov (United States)

    Banks, Charles A S; Boanca, Gina; Lee, Zachary T; Florens, Laurence; Washburn, Michael P

    2015-02-23

    A common approach for exploring the interactome, the network of protein-protein interactions in cells, uses a commercially available ORF library to express affinity tagged bait proteins; these can be expressed in cells and endogenous cellular proteins that copurify with the bait can be identified as putative interacting proteins using mass spectrometry. Control experiments can be used to limit false-positive results, but in many cases, there are still a surprising number of prey proteins that appear to copurify specifically with the bait. Here, we have identified one source of false-positive interactions in such studies. We have found that a combination of: 1) the variable sequence of the C-terminus of the bait with 2) a C-terminal valine "cloning scar" present in a commercially available ORF library, can in some cases create a peptide motif that results in the aberrant co-purification of endogenous cellular proteins. Control experiments may not identify false positives resulting from such artificial motifs, as aberrant binding depends on sequences that vary from one bait to another. It is possible that such cryptic protein binding might occur in other systems using affinity tagged proteins; this study highlights the importance of conducting careful follow-up studies where novel protein-protein interactions are suspected.

  1. A proposed metamodel for the implementation of object oriented software through the automatic generation of source code

    Directory of Open Access Journals (Sweden)

    CARVALHO, J. S. C.

    2008-12-01

    Full Text Available During the development of software one of the most visible risks and perhaps the biggest implementation obstacle relates to the time management. All delivery deadlines software versions must be followed, but it is not always possible, sometimes due to delay in coding. This paper presents a metamodel for software implementation, which will rise to a development tool for automatic generation of source code, in order to make any development pattern transparent to the programmer, significantly reducing the time spent in coding artifacts that make up the software.

  2. Probabilistic cloning of equidistant states

    International Nuclear Information System (INIS)

    Jimenez, O.; Roa, Luis; Delgado, A.

    2010-01-01

    We study the probabilistic cloning of equidistant states. These states are such that the inner product between them is a complex constant or its conjugate. Thereby, it is possible to study their cloning in a simple way. In particular, we are interested in the behavior of the cloning probability as a function of the phase of the overlap among the involved states. We show that for certain families of equidistant states Duan and Guo's cloning machine leads to cloning probabilities lower than the optimal unambiguous discrimination probability of equidistant states. We propose an alternative cloning machine whose cloning probability is higher than or equal to the optimal unambiguous discrimination probability for any family of equidistant states. Both machines achieve the same probability for equidistant states whose inner product is a positive real number.

  3. Quantum cloning and signaling

    International Nuclear Information System (INIS)

    Simon, C.; Weihs, G.; Zeilinger, A.

    1999-01-01

    We discuss the close connections between cloning of quantum states and superluminal signaling. We present an optimal universal cloning machine based on stimulated emission recently proposed by the authors. As an instructive example, we show how a scheme for superluminal communication based on this cloning machine fails. (Authors)

  4. Chronos sickness: digital reality in Duncan Jones’s Source Code

    Directory of Open Access Journals (Sweden)

    Marcia Tiemy Morita Kawamoto

    2017-01-01

    Full Text Available http://dx.doi.org/10.5007/2175-8026.2017v70n1p249 The advent of the digital technologies unquestionably affected the cinema. The indexical relation and realistic effect with the photographed world much praised by André Bazin and Roland Barthes is just one of the affected aspects. This article discusses cinema in light of the new digital possibilities, reflecting on Steven Shaviro’s consideration of “how a nonindexical realism might be possible” (63 and how in fact a new kind of reality, a digital one, might emerge in the science fiction film Source Code (2013 by Duncan Jones.

  5. Coded aperture detector for high precision gamma-ray burst source locations

    International Nuclear Information System (INIS)

    Helmken, H.; Gorenstein, P.

    1977-01-01

    Coded aperture collimators in conjunction with position-sensitive detectors are very useful in the study of transient phenomenon because they combine broad field of view, high sensitivity, and an ability for precise source locations. Since the preceeding conference, a series of computer simulations of various detector designs have been carried out with the aid of a CDC 6400. Particular emphasis was placed on the development of a unit consisting of a one-dimensional random or periodic collimator in conjunction with a two-dimensional position-sensitive Xenon proportional counter. A configuration involving four of these units has been incorporated into the preliminary design study of the Transient Explorer (ATREX) satellite and are applicable to any SAS or HEAO type satellite mission. Results of this study, including detector response, fields of view, and source location precision, will be presented

  6. Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information

    Science.gov (United States)

    Frantzeskou, Georgia; Stamatatos, Efstathios; Gritzalis, Stefanos

    Source code authorship analysis is the particular field that attempts to identify the author of a computer program by treating each program as a linguistically analyzable entity. This is usually based on other undisputed program samples from the same author. There are several cases where the application of such a method could be of a major benefit, such as tracing the source of code left in the system after a cyber attack, authorship disputes, proof of authorship in court, etc. In this paper, we present our approach which is based on byte-level n-gram profiles and is an extension of a method that has been successfully applied to natural language text authorship attribution. We propose a simplified profile and a new similarity measure which is less complicated than the algorithm followed in text authorship attribution and it seems more suitable for source code identification since is better able to deal with very small training sets. Experiments were performed on two different data sets, one with programs written in C++ and the second with programs written in Java. Unlike the traditional language-dependent metrics used by previous studies, our approach can be applied to any programming language with no additional cost. The presented accuracy rates are much better than the best reported results for the same data sets.

  7. Recombination-assisted megaprimer (RAM) cloning

    Science.gov (United States)

    Mathieu, Jacques; Alvarez, Emilia; Alvarez, Pedro J.J.

    2014-01-01

    No molecular cloning technique is considered universally reliable, and many suffer from being too laborious, complex, or expensive. Restriction-free cloning is among the simplest, most rapid, and cost-effective methods, but does not always provide successful results. We modified this method to enhance its success rate through the use of exponential amplification coupled with homologous end-joining. This new method, recombination-assisted megaprimer (RAM) cloning, significantly extends the application of restriction-free cloning, and allows efficient vector construction with much less time and effort when restriction-free cloning fails to provide satisfactory results. The following modifications were made to the protocol:•Limited number of PCR cycles for both megaprimer synthesis and the cloning reaction to reduce error propagation.•Elimination of phosphorylation and ligation steps previously reported for cloning methods that used exponential amplification, through the inclusion of a reverse primer in the cloning reaction with a 20 base pair region of homology to the forward primer.•The inclusion of 1 M betaine to enhance both reaction specificity and yield. PMID:26150930

  8. Development of Coupled Interface System between the FADAS Code and a Source-term Evaluation Code XSOR for CANDU Reactors

    International Nuclear Information System (INIS)

    Son, Han Seong; Song, Deok Yong; Kim, Ma Woong; Shin, Hyeong Ki; Lee, Sang Kyu; Kim, Hyun Koon

    2006-01-01

    An accident prevention system is essential to the industrial security of nuclear industry. Thus, the more effective accident prevention system will be helpful to promote safety culture as well as to acquire public acceptance for nuclear power industry. The FADAS(Following Accident Dose Assessment System) which is a part of the Computerized Advisory System for a Radiological Emergency (CARE) system in KINS is used for the prevention against nuclear accident. In order to enhance the FADAS system more effective for CANDU reactors, it is necessary to develop the various accident scenarios and reliable database of source terms. This study introduces the construction of the coupled interface system between the FADAS and the source-term evaluation code aimed to improve the applicability of the CANDU Integrated Safety Analysis System (CISAS) for CANDU reactors

  9. Isolation of full-length putative rat lysophospholipase cDNA using improved methods for mRNA isolation and cDNA cloning

    International Nuclear Information System (INIS)

    Han, J.H.; Stratowa, C.; Rutter, W.J.

    1987-01-01

    The authors have cloned a full-length putative rat pancreatic lysophospholipase cDNA by an improved mRNA isolation method and cDNA cloning strategy using [ 32 P]-labelled nucleotides. These new methods allow the construction of a cDNA library from the adult rat pancreas in which the majority of recombinant clones contained complete sequences for the corresponding mRNAs. A previously recognized but unidentified long and relatively rare cDNA clone containing the entire sequence from the cap site at the 5' end to the poly(A) tail at the 3' end of the mRNA was isolated by single-step screening of the library. The size, amino acid composition, and the activity of the protein expressed in heterologous cells strongly suggest this mRNA codes for lysophospholipase

  10. Human cloning and child welfare.

    Science.gov (United States)

    Burley, J; Harris, J

    1999-01-01

    In this paper we discuss an objection to human cloning which appeals to the welfare of the child. This objection varies according to the sort of harm it is expected the clone will suffer. The three formulations of it that we will consider are: 1. Clones will be harmed by the fearful or prejudicial attitudes people may have about or towards them (H1); 2. Clones will be harmed by the demands and expectations of parents or genotype donors (H2); 3. Clones will be harmed by their own awareness of their origins, for example the knowledge that the genetic donor is a stranger (H3). We will show why these three versions of the child welfare objection do not necessarily supply compelling reasons to ban human reproductive cloning. The claim that we will develop and defend in the course of our discussion is that even if it is the case that a cloned child will suffer harms of the type H1-H3, it is none the less permissible to conceive by cloning so long as these cloning-induced welfare deficits are not such as to blight the existence of the resultant child, whoever this may be. PMID:10226914

  11. Cloning of a GH5 endoglucanase from genus Penicillium and its binding to different lignins

    DEFF Research Database (Denmark)

    Krogh, Kristian Bertel Rømer; Kastberg, H.; Jørgensen, C. I.

    2009-01-01

    The cel5C gene, coding for an endoglucanase (Cel5C) of Penicillium brasilianum was cloned and heterologously expressed in Aspergillus oryzae. This is only the second GH5 EG from the genus penicillium reported in the CAZy database. The promoter region of the gene has I)putative binding sites...

  12. Survey of source code metrics for evaluating testability of object oriented systems

    OpenAIRE

    Shaheen , Muhammad Rabee; Du Bousquet , Lydie

    2010-01-01

    Software testing is costly in terms of time and funds. Testability is a software characteristic that aims at producing systems easy to test. Several metrics have been proposed to identify the testability weaknesses. But it is sometimes difficult to be convinced that those metrics are really related with testability. This article is a critical survey of the source-code based metrics proposed in the literature for object-oriented software testability. It underlines the necessity to provide test...

  13. Social behavior and kin discrimination in a mixed group of cloned and non cloned heifers (Bos taurus).

    Science.gov (United States)

    Coulon, M; Baudoin, C; Abdi, H; Heyman, Y; Deputte, B L

    2010-12-01

    For more than ten years, reproductive biotechnologies using somatic cell nuclear transfer have made possible the production of cloned animals in various domestic and laboratory species. The influence of the cloning process on offspring characteristics has been studied in various developmental aspects, however, it has not yet been documented in detail for behavioral traits. Behavioral studies of cloned animals have failed to show clear inter-individual differences associated with the cloning process. Preliminary results showed that clones favor each other's company. Preferential social interactions were observed among cloned heifers from the same donor in a mixed herd that also included cloned heifers and control heifers produced by artificial insemination (AI). These results suggest behavioral differences between cloned and non-cloned animals and similarities between clones from the same donor. The aim of the present study was to replicate and to extend these previous results and to study behavioral and cognitive mechanisms of this preferential grouping. We studied a group composed of five cloned heifers derived from the same donor cow, two cloned heifers derived from another donor cow, and AI heifers. Cloned heifers from the same donor were more spatially associated and interacted more between themselves than with heifers derived from another donor or with the AI individuals. This pattern indicates a possible kin discrimination in clones. To study this process, we performed an experiment (using an instrumental conditioning procedure with food reward) of visual discrimination between images of heads of familiar heifers, either related to the subjects or not. The results showed that all subjects (AI and cloned heifers) discriminated between images of familiar cloned heifers produced from the same donor and images of familiar unrelated heifers. Cattle discriminated well between images and used morphological similarities characteristic of cloned related heifers. Our

  14. NEACRP comparison of source term codes for the radiation protection assessment of transportation packages

    International Nuclear Information System (INIS)

    Broadhead, B.L.; Locke, H.F.; Avery, A.F.

    1994-01-01

    The results for Problems 5 and 6 of the NEACRP code comparison as submitted by six participating countries are presented in summary. These problems concentrate on the prediction of the neutron and gamma-ray sources arising in fuel after a specified irradiation, the fuel being uranium oxide for problem 5 and a mixture of uranium and plutonium oxides for problem 6. In both problems the predicted neutron sources are in good agreement for all participants. For gamma rays, however, there are differences, largely due to the omission of bremsstrahlung in some calculations

  15. Optimally cloned binary coherent states

    Science.gov (United States)

    Müller, C. R.; Leuchs, G.; Marquardt, Ch.; Andersen, U. L.

    2017-10-01

    Binary coherent state alphabets can be represented in a two-dimensional Hilbert space. We capitalize this formal connection between the otherwise distinct domains of qubits and continuous variable states to map binary phase-shift keyed coherent states onto the Bloch sphere and to derive their quantum-optimal clones. We analyze the Wigner function and the cumulants of the clones, and we conclude that optimal cloning of binary coherent states requires a nonlinearity above second order. We propose several practical and near-optimal cloning schemes and compare their cloning fidelity to the optimal cloner.

  16. Optimal source coding, removable noise elimination, and natural coordinate system construction for general vector sources using replicator neural networks

    Science.gov (United States)

    Hecht-Nielsen, Robert

    1997-04-01

    A new universal one-chart smooth manifold model for vector information sources is introduced. Natural coordinates (a particular type of chart) for such data manifolds are then defined. Uniformly quantized natural coordinates form an optimal vector quantization code for a general vector source. Replicator neural networks (a specialized type of multilayer perceptron with three hidden layers) are the introduced. As properly configured examples of replicator networks approach minimum mean squared error (e.g., via training and architecture adjustment using randomly chosen vectors from the source), these networks automatically develop a mapping which, in the limit, produces natural coordinates for arbitrary source vectors. The new concept of removable noise (a noise model applicable to a wide variety of real-world noise processes) is then discussed. Replicator neural networks, when configured to approach minimum mean squared reconstruction error (e.g., via training and architecture adjustment on randomly chosen examples from a vector source, each with randomly chosen additive removable noise contamination), in the limit eliminate removable noise and produce natural coordinates for the data vector portions of the noise-corrupted source vectors. Consideration regarding selection of the dimension of a data manifold source model and the training/configuration of replicator neural networks are discussed.

  17. Three concepts of cloning in human beings.

    Science.gov (United States)

    Cui, Ke-Hui

    2005-07-01

    Human cloning, organ cloning and tissue cloning are various types of cloning that occur at different levels with different methodologies. According to three standards of terminology for an embryo (fertilization through germ cells, development in the uterus and having the potential to produce a human life), tissue cloning and type I organ cloning will not produce an embryo. In contrast, human cloning and type II organ cloning will produce an embryo. Thus, only non-germinal tissue cloning and type I organ cloning are beyond the ethical question and will not change human beings as a species. Using cloned tissues to make new tissues or organs is promising for the future of medicine.

  18. Isolation and sequence analysis of a cDNA clone encoding the fifth complement component

    DEFF Research Database (Denmark)

    Lundwall, Åke B; Wetsel, Rick A; Kristensen, Torsten

    1985-01-01

    DNA clone of 1.85 kilobase pairs was isolated. Hybridization of the mixed-sequence probe to the complementary strand of the plasmid insert and sequence analysis by the dideoxy method predicted the expected protein sequence of C5a (positions 1-12), amino-terminal to the anticipated priming site. The sequence......, subcloned into M13 mp8, and sequenced at random by the dideoxy technique, thereby generating a contiguous sequence of 1703 base pairs. This clone contained coding sequence for the C-terminal 262 amino acid residues of the beta-chain, the entire C5a fragment, and the N-terminal 98 residues of the alpha......'-chain. The 3' end of the clone had a polyadenylated tail preceded by a polyadenylation recognition site, a 3'-untranslated region, and base pairs homologous to the human Alu concensus sequence. Comparison of the derived partial human C5 protein sequence with that previously determined for murine C3 and human...

  19. Local cloning of CAT states

    International Nuclear Information System (INIS)

    Rahaman, Ramij

    2011-01-01

    In this Letter we analyze the (im)possibility of the exact cloning of orthogonal three-qubit CAT states under local operation and classical communication (LOCC) with the help of a restricted entangled state. We also classify the three-qubit CAT states that can (not) be cloned under LOCC restrictions and extend the results to the n-qubit case. -- Highlights: → We analyze the (im)possibility of exact cloning of orthogonal CAT states under LOCC. → We also classify the set of CAT states that can(not) be cloned by LOCC. → No set of orthogonal CAT states can be cloned by LOCC with help of similar CAT state. → Any two orthogonal n-qubit GHZ-states can be cloned by LOCC with help of a GHZ state.

  20. Effects of donor fibroblast cell type and transferred cloned embryo number on the efficiency of pig cloning.

    Science.gov (United States)

    Li, Zicong; Shi, Junsong; Liu, Dewu; Zhou, Rong; Zeng, Haiyu; Zhou, Xiu; Mai, Ranbiao; Zeng, Shaofen; Luo, Lvhua; Yu, Wanxian; Zhang, Shouquan; Wu, Zhenfang

    2013-02-01

    Currently, cloning efficiency in pigs is very low. Donor cell type and number of cloned embryos transferred to an individual surrogate are two major factors that affect the successful rate of somatic cell nuclear transfer (SCNT) in pigs. This study aimed to compare the influence of different donor fibroblast cell types and different transferred embryo numbers on recipients' pregnancy rate and delivery rate, the average number of total clones born, clones born alive and clones born healthy per litter, and the birth rate of healthy clones (=total number of healthy cloned piglets born /total number of transferred cloned embryos). Three types of donor fibroblasts were tested in large-scale production of cloned pigs, including fetal fibroblasts (FFBs) from four genetically similar Western swine breeds of Pietrain (P), Duroc (D), Landrace (L), and Yorkshire (Y), which are referred to as P,D,LY-FFBs, adult fibroblasts (AFBs) from the same four breeds, which are designated P,D,L,Y-AFBs, and AFBs from a Chinese pig breed of Laiwu (LW), which is referred to as LW-AFBs. Within each donor fibroblast cell type group, five transferred cloned embryo number groups were tested. In each embryo number group, 150-199, 200-249, 250-299, 300-349, or 350-450 cloned embryos were transferred to each individual recipient sow. For the entire experiment, 92,005 cloned embryos were generated from nearly 115,000 matured oocytes and transferred to 328 recipients; in total, 488 cloned piglets were produced. The results showed that the mean clones born healthy per litter resulted from transfer of embryos cloned from LW-AFBs (2.53 ± 0.34) was similar with that associated with P,D,L,Y-FFBs (2.72 ± 0.29), but was significantly higher than that resulted from P,D,L,Y-AFBs (1.47 ± 0.18). Use of LW-AFBs as donor cells for SCNT resulted in a significantly higher pregnancy rate (72.00% vs. 59.30% and 48.11%) and delivery rate (60.00% vs. 45.93% and 35.85%) for cloned embryo recipients, and a

  1. Time-dependent anisotropic distributed source capability in transient 3-d transport code tort-TD

    International Nuclear Information System (INIS)

    Seubert, A.; Pautz, A.; Becker, M.; Dagan, R.

    2009-01-01

    The transient 3-D discrete ordinates transport code TORT-TD has been extended to account for time-dependent anisotropic distributed external sources. The extension aims at the simulation of the pulsed neutron source in the YALINA-Thermal subcritical assembly. Since feedback effects are not relevant in this zero-power configuration, this offers a unique opportunity to validate the time-dependent neutron kinetics of TORT-TD with experimental data. The extensions made in TORT-TD to incorporate a time-dependent anisotropic external source are described. The steady state of the YALINA-Thermal assembly and its response to an artificial square-wave source pulse sequence have been analysed with TORT-TD using pin-wise homogenised cross sections in 18 prompt energy groups with P 1 scattering order and 8 delayed neutron groups. The results demonstrate the applicability of TORT-TD to subcritical problems with a time-dependent external source. (authors)

  2. Numerical modeling of the Linac4 negative ion source extraction region by 3D PIC-MCC code ONIX

    CERN Document Server

    Mochalskyy, S; Minea, T; Lifschitz, AF; Schmitzer, C; Midttun, O; Steyaert, D

    2013-01-01

    At CERN, a high performance negative ion (NI) source is required for the 160 MeV H- linear accelerator Linac4. The source is planned to produce 80 mA of H- with an emittance of 0.25 mm mradN-RMS which is technically and scientifically very challenging. The optimization of the NI source requires a deep understanding of the underling physics concerning the production and extraction of the negative ions. The extraction mechanism from the negative ion source is complex involving a magnetic filter in order to cool down electrons’ temperature. The ONIX (Orsay Negative Ion eXtraction) code is used to address this problem. The ONIX is a selfconsistent 3D electrostatic code using Particles-in-Cell Monte Carlo Collisions (PIC-MCC) approach. It was written to handle the complex boundary conditions between plasma, source walls, and beam formation at the extraction hole. Both, the positive extraction potential (25kV) and the magnetic field map are taken from the experimental set-up, in construction at CERN. This contrib...

  3. An Evolving Worldview: Making Open Source Easy

    Science.gov (United States)

    Rice, Z.

    2017-12-01

    NASA Worldview is an interactive interface for browsing full-resolution, global satellite imagery. Worldview supports an open data policy so that academia, private industries and the general public can use NASA's satellite data to address Earth science related issues. Worldview was open sourced in 2014. By shifting to an open source approach, the Worldview application has evolved to better serve end-users. Project developers are able to have discussions with end-users and community developers to understand issues and develop new features. Community developers are able to track upcoming features, collaborate on them and make their own contributions. Developers who discover issues are able to address those issues and submit a fix. This reduces the time it takes for a project developer to reproduce an issue or develop a new feature. Getting new developers to contribute to the project has been one of the most important and difficult aspects of open sourcing Worldview. After witnessing potential outside contributors struggle, a focus has been made on making the installation of Worldview simple to reduce the initial learning curve and make contributing code easy. One way we have addressed this is through a simplified setup process. Our setup documentation includes a set of prerequisites and a set of straightforward commands to clone, configure, install and run. This presentation will emphasize our focus to simplify and standardize Worldview's open source code so that more people are able to contribute. The more people who contribute, the better the application will become over time.

  4. EchoSeed Model 6733 Iodine-125 brachytherapy source: Improved dosimetric characterization using the MCNP5 Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Mosleh-Shirazi, M. A.; Hadad, K.; Faghihi, R.; Baradaran-Ghahfarokhi, M.; Naghshnezhad, Z.; Meigooni, A. S. [Center for Research in Medical Physics and Biomedical Engineering and Physics Unit, Radiotherapy Department, Shiraz University of Medical Sciences, Shiraz 71936-13311 (Iran, Islamic Republic of); Radiation Research Center and Medical Radiation Department, School of Engineering, Shiraz University, Shiraz 71936-13311 (Iran, Islamic Republic of); Comprehensive Cancer Center of Nevada, Las Vegas, Nevada 89169 (United States)

    2012-08-15

    This study primarily aimed to obtain the dosimetric characteristics of the Model 6733 {sup 125}I seed (EchoSeed) with improved precision and accuracy using a more up-to-date Monte-Carlo code and data (MCNP5) compared to previously published results, including an uncertainty analysis. Its secondary aim was to compare the results obtained using the MCNP5, MCNP4c2, and PTRAN codes for simulation of this low-energy photon-emitting source. The EchoSeed geometry and chemical compositions together with a published {sup 125}I spectrum were used to perform dosimetric characterization of this source as per the updated AAPM TG-43 protocol. These simulations were performed in liquid water material in order to obtain the clinically applicable dosimetric parameters for this source model. Dose rate constants in liquid water, derived from MCNP4c2 and MCNP5 simulations, were found to be 0.993 cGyh{sup -1} U{sup -1} ({+-}1.73%) and 0.965 cGyh{sup -1} U{sup -1} ({+-}1.68%), respectively. Overall, the MCNP5 derived radial dose and 2D anisotropy functions results were generally closer to the measured data (within {+-}4%) than MCNP4c and the published data for PTRAN code (Version 7.43), while the opposite was seen for dose rate constant. The generally improved MCNP5 Monte Carlo simulation may be attributed to a more recent and accurate cross-section library. However, some of the data points in the results obtained from the above-mentioned Monte Carlo codes showed no statistically significant differences. Derived dosimetric characteristics in liquid water are provided for clinical applications of this source model.

  5. Lessons learned from cloning dogs.

    Science.gov (United States)

    Kim, M J; Oh, H J; Kim, G A; Park, J E; Park, E J; Jang, G; Ra, J C; Kang, S K; Lee, B C

    2012-08-01

    The aim of this article is to review dog cloning research and to suggest its applications based on a discussion about the normality of cloned dogs. Somatic cell nuclear transfer was successfully used for production of viable cloned puppies despite limited understanding of in vitro dog embryo production. Cloned dogs have similar growth characteristics to those born from natural fertilization, with no evidence of serious adverse effects. The offspring of cloned dogs also have similar growth performance and health to those of naturally bred puppies. Therefore, cloning in domestic dogs can be applied as an assisted reproductive technique to conserve endangered species, to treat sterile canids or aged dogs, to improve reproductive performance of valuable individuals and to generate disease model animals. © 2012 Blackwell Verlag GmbH.

  6. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  7. Consumers' attitudes toward consumption of cloned beef. The impact of exposure to technological information about animal cloning.

    Science.gov (United States)

    Aizaki, Hideo; Sawada, Manabu; Sato, Kazuo

    2011-10-01

    Novel food technologies, such as cloning, have been introduced into the meat production sector; however, their use is not widely supported by many consumers. This study was designed to assess whether Japanese consumers' attitudes toward consumption of cloned beef (specifically, beef derived from bovine embryo and somatic cell-cloned cattle) would change after they were provided with technological information on animal cloning through a web-based survey. The results revealed that most respondents did not discriminate between their attitudes toward the consumption of the two types of cloned beef, and that most respondents did not change their attitudes toward cloned beef after receiving the technological information. The respondents' individual characteristics, including their knowledge about the food safety of cloned beef and their basic knowledge about animal cloning, influenced the likelihood of a change in their attitudes after they received the information. In conclusion, some consumers might become less uncomfortable about the consumption of cloned beef by the straightforward provision of technological information about animal cloning; however, most consumers are likely to maintain their attitudes. Copyright © 2011 Elsevier Ltd. All rights reserved.

  8. Cloning and characterization of novel fast ω-gliadin genes in ...

    Indian Academy of Sciences (India)

    2015-06-02

    Jun 2, 2015 ... In this study, the novel fast u-gliadin genes were cloned from genome A of ... Wheat is one of the most important sources of food in the human diet. In the ..... This work was financially supported by the National Natural Sci-.

  9. The European source-term evaluation code ASTEC: status and applications, including CANDU plant applications

    International Nuclear Information System (INIS)

    Van Dorsselaere, J.P.; Giordano, P.; Kissane, M.P.; Montanelli, T.; Schwinges, B.; Ganju, S.; Dickson, L.

    2004-01-01

    Research on light-water reactor severe accidents (SA) is still required in a limited number of areas in order to confirm accident-management plans. Thus, 49 European organizations have linked their SA research in a durable way through SARNET (Severe Accident Research and management NETwork), part of the European 6th Framework Programme. One goal of SARNET is to consolidate the integral code ASTEC (Accident Source Term Evaluation Code, developed by IRSN and GRS) as the European reference tool for safety studies; SARNET efforts include extending the application scope to reactor types other than PWR (including VVER) such as BWR and CANDU. ASTEC is used in IRSN's Probabilistic Safety Analysis level 2 of 900 MWe French PWRs. An earlier version of ASTEC's SOPHAEROS module, including improvements by AECL, is being validated as the Canadian Industry Standard Toolset code for FP-transport analysis in the CANDU Heat Transport System. Work with ASTEC has also been performed by Bhabha Atomic Research Centre, Mumbai, on IPHWR containment thermal hydraulics. (author)

  10. Variations and voids: the regulation of human cloning around the world.

    Science.gov (United States)

    Pattinson, Shaun D; Caulfield, Timothy

    2004-12-13

    No two countries have adopted identical regulatory measures on cloning. Understanding the complexity of these regulatory variations is essential. It highlights the challenges associated with the regulation of a controversial and rapidly evolving area of science and sheds light on a regulatory framework that can accommodate this reality. Using the most reliable information available, we have performed a survey of the regulatory position of thirty countries around the world regarding the creation and use of cloned embryos (see Table 1). We have relied on original and translated legislation, as well as published sources and personal communications. We have examined the regulation of both reproductive cloning (RC) and non-reproductive cloning (NRC). While most of the countries studied have enacted national legislation, the absence of legislation in seven of these countries should not be equated with the absence of regulation. Senator Morin was not correct in stating that the majority of recent legislation bans both RC and NRC. Recent regulatory moves are united only with regard to the banning of RC. While NRC is not permitted in seventeen of the countries examined, it could be permitted in up to thirteen countries. There is little consensus on the various approaches to cloning laws and policies, and the regulatory position in many countries remains uncertain.

  11. [Cloning of Clostridium perfringens alpha-toxin gene and extracellular expression in Escherichia coli].

    Science.gov (United States)

    Inoue, Masaharu; Kikuchi, Maho; Komoriya, Tomoe; Watanabe, Kunitomo; Kouno, Hideki

    2007-01-01

    Clostridium perfringens (C. perfringens) is a Gram-positive bacterial pathogen that widely propagets in the soil and the gastrointestinal tract of human and animals. This bacteria causes food poisoning, gas gangrene and other various range of infectious diseases. But there is no standard diagnosis method of C. perfringens. In order to develop a new type of immunoassay for clinical purpose, we studied expression and extracellular secretion of recombinant alpha-toxin having enzyme activity in E. coli expression system. Cloning was carried out after PCR amplification from C. perfringens GAI 94074 which was clinical isolate. Three kinds of fragment were cloned using pET100/D-TOPO vector. These fragments coded for ribosome binding site, signal peptide, and alpha-toxin gene respectively. Recombinant pET100 plasmid transformed into TOP 10 cells and the obtained plasmids were transformed into BL21 (DE3) cells. Then, the transformants were induced expression with IPTG. In conclusion, we successfully cloned, expressed and exteracellular secreted C. perfringens alpha-toxin containing signal peptide. Biologically, the obtained recombinant protein was positive for phospholipase C activity.

  12. Cloning, expression, and crystallization of Cpn60 proteins from Thermococcus litoralis.

    Science.gov (United States)

    Osipiuk, J; Sriram, M; Mai, X; Adams, M W; Joachimiak, A

    2000-01-01

    Two genes of the extreme thermophilic archaeon Thermococcus litoralis homologous to those that code for Cpn60 chaperonins were cloned and expressed in Escherichia coli. Each of the Cpn60 subunits as well as the entire Cpn60 complex crystallize in a variety of morphological forms. The best crystals diffract to 3.6 A resolution at room temperature and belong to the space group 1422 with unit cell parameters a = b = 193.5 A, c = 204.2 A.

  13. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  14. Cloning and sequencing of the casein kinase 2 alpha subunit from Zea mays

    DEFF Research Database (Denmark)

    Dobrowolska, G; Boldyreff, B; Issinger, O G

    1991-01-01

    The nucleotide sequence of the cDNA coding for the alpha subunit of casein kinase 2 of Zea mays has been determined. The cDNA clone contains an open reading frame of 996 nucleotides encoding a polypeptide comprising 332 amino acids. The primary amino acid sequence exhibits 75% identity to the alpha...... subunit and 71% identity to the alpha' subunit of human casein kinase 2....

  15. FastCloning: a highly simplified, purification-free, sequence- and ligation-independent PCR cloning method

    Directory of Open Access Journals (Sweden)

    Lu Jia

    2011-10-01

    Full Text Available Abstract Background Although a variety of methods and expensive kits are available, molecular cloning can be a time-consuming and frustrating process. Results Here we report a highly simplified, reliable, and efficient PCR-based cloning technique to insert any DNA fragment into a plasmid vector or into a gene (cDNA in a vector at any desired position. With this method, the vector and insert are PCR amplified separately, with only 18 cycles, using a high fidelity DNA polymerase. The amplified insert has the ends with ~16-base overlapping with the ends of the amplified vector. After DpnI digestion of the mixture of the amplified vector and insert to eliminate the DNA templates used in PCR reactions, the mixture is directly transformed into competent E. coli cells to obtain the desired clones. This technique has many advantages over other cloning methods. First, it does not need gel purification of the PCR product or linearized vector. Second, there is no need of any cloning kit or specialized enzyme for cloning. Furthermore, with reduced number of PCR cycles, it also decreases the chance of random mutations. In addition, this method is highly effective and reproducible. Finally, since this cloning method is also sequence independent, we demonstrated that it can be used for chimera construction, insertion, and multiple mutations spanning a stretch of DNA up to 120 bp. Conclusion Our FastCloning technique provides a very simple, effective, reliable, and versatile tool for molecular cloning, chimera construction, insertion of any DNA sequences of interest and also for multiple mutations in a short stretch of a cDNA.

  16. Cloning: What Do They Know? A Report on the General Knowledge of a Sample of Midwestern Citizens.

    Science.gov (United States)

    Mascazine, John R.; Titterington, Lynda; Khalaf, Ali K.

    This study, part of a larger research project, explored the knowledge of the general population regarding cloning. It also sought to determine where people gather information on cloning. Such awareness of the general public's knowledge of important scientific topics and sources from which people retrieve information can help scientific and…

  17. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  18. Generation of an infectious clone of VR-2332, a highly virulent North American type isolate of porcine reproductive and respiratory syndrome virus

    DEFF Research Database (Denmark)

    Nielsen, H.S.; Liu, G.; Nielsen, Jens

    2003-01-01

    A full-length cDNA clone of the prototypical North American porcine reproductive and respiratory syndrome virus (PRRSV) isolate VR-2332 was assembled in the plasmid vector pOK(12). To rescue infectious virus, capped RNA was transcribed in vitro from the pOK(12) clone and transfected into BHK-21C...... cells. The supernatant from transfected monolayers were serially passaged on Marc-145 cells and porcine pulmonary alveolar macrophages. Infectious PRRSV was recovered on Marc-145 cells as well as porcine pulmonary macrophages; thus, the cloned virus exhibited the same cell tropism as the parental VR......-2332 strain. However, the cloned virus was clearly distinguishable from the parental VR-2332 strain by an engineered marker, a BstZ171 restriction site. The full-length cDNA clone had 11 nucleotide changes, 2 of which affected coding, compared to the parental VR-2332 strain. Additionally...

  19. Cloning-free CRISPR

    NARCIS (Netherlands)

    Arbab, Mandana; Srinivasan, Sharanya; Hashimoto, Tatsunori; Geijsen, Niels; Sherwood, Richard I.

    2015-01-01

    We present self-cloning CRISPR/Cas9 (scCRISPR), a technology that allows for CRISPR/Cas9-mediated genomic mutation and site-specific knockin transgene creation within several hours by circumventing the need to clone a site-specific single-guide RNA (sgRNA) or knockin homology construct for each

  20. SCRIC: a code dedicated to the detailed emission and absorption of heterogeneous NLTE plasmas; application to xenon EUV sources

    International Nuclear Information System (INIS)

    Gaufridy de Dortan, F. de

    2006-01-01

    Nearly all spectral opacity codes for LTE and NLTE plasmas rely on configurations approximate modelling or even supra-configurations modelling for mid Z plasmas. But in some cases, configurations interaction (either relativistic and non relativistic) induces dramatic changes in spectral shapes. We propose here a new detailed emissivity code with configuration mixing to allow for a realistic description of complex mid Z plasmas. A collisional radiative calculation. based on HULLAC precise energies and cross sections. determines the populations. Detailed emissivities and opacities are then calculated and radiative transfer equation is resolved for wide inhomogeneous plasmas. This code is able to cope rapidly with very large amount of atomic data. It is therefore possible to use complex hydrodynamic files even on personal computers in a very limited time. We used this code for comparison with Xenon EUV sources within the framework of nano-lithography developments. It appears that configurations mixing strongly shifts satellite lines and must be included in the description of these sources to enhance their efficiency. (author)

  1. Animal cloning: problems and prospects.

    Science.gov (United States)

    Wells, D N

    2005-04-01

    An efficient animal cloning technology would provide many new opportunities for livestock agriculture, human medicine, and animal conservation. Nuclear cloning involves the production of animals that are genetically identical to the donor cells used in a technique known as nuclear transfer (NT). However, at present it is an inefficient process: in cattle, only around 6% of the embryos transferred to the reproductive tracts of recipient cows result in healthy, longterm surviving clones. Of concern are the high losses throughout gestation, during birth and in the post-natal period through to adulthood. Many of the pregnancy losses relate to failure of the placenta to develop and function correctly. Placental dysfunction may also have an adverse influence on postnatal health. These anomalies are probably due to incorrect epigenetic reprogramming of the donor genome following NT, leading to inappropriate patterns of gene expression during the development of clones. Whilst some physiological tests on surviving clones suggest normality, other reports indicate a variety of post-natal clone-associated abnormalities. This variability in outcome may reflect species-specific and/or cloning methodological differences. Importantly, to date it appears that these clone-associated phenotypes are not transmitted to offspring following sexual reproduction. This indicates that they represent epigenetic errors, rather than genetic errors, which are corrected during gametogenesis. Whilst this needs confirmation at the molecular level, it provides initial confidence in the first application of NT in agriculture, namely, the production of small numbers of cloned sires from genetically elite bulls, for natural mating, to effectively disseminate genetic gain. In addition to the animal welfare concerns with the technology, the underlying health of the animals and the consequential effect on food safety are critical aspects that require investigation to gain regulatory and consumer

  2. Reversibility of continuous-variable quantum cloning

    International Nuclear Information System (INIS)

    Filip, Radim; Marek, Petr; Fiurasek, Jaromir

    2004-01-01

    We analyze a reversibility of optimal Gaussian 1→2 quantum cloning of a coherent state using only local operations on the clones and classical communication between them and propose a feasible experimental test of this feature. Performing Bell-type homodyne measurement on one clone and anticlone, an arbitrary unknown input state (not only a coherent state) can be restored in the other clone by applying appropriate local unitary displacement operation. We generalize this concept to a partial reversal of the cloning using only local operations and classical communication (LOCC) and we show that this procedure converts the symmetric cloner to an asymmetric cloner. Further, we discuss a distributed LOCC reversal in optimal 1→M Gaussian cloning of coherent states which transforms it to optimal 1→M ' cloning for M ' < M. Assuming the quantum cloning as a possible eavesdropping attack on quantum communication link, the reversibility can be utilized to improve the security of the link even after the attack

  3. Joint design of QC-LDPC codes for coded cooperation system with joint iterative decoding

    Science.gov (United States)

    Zhang, Shunwai; Yang, Fengfan; Tang, Lei; Ejaz, Saqib; Luo, Lin; Maharaj, B. T.

    2016-03-01

    In this paper, we investigate joint design of quasi-cyclic low-density-parity-check (QC-LDPC) codes for coded cooperation system with joint iterative decoding in the destination. First, QC-LDPC codes based on the base matrix and exponent matrix are introduced, and then we describe two types of girth-4 cycles in QC-LDPC codes employed by the source and relay. In the equivalent parity-check matrix corresponding to the jointly designed QC-LDPC codes employed by the source and relay, all girth-4 cycles including both type I and type II are cancelled. Theoretical analysis and numerical simulations show that the jointly designed QC-LDPC coded cooperation well combines cooperation gain and channel coding gain, and outperforms the coded non-cooperation under the same conditions. Furthermore, the bit error rate performance of the coded cooperation employing jointly designed QC-LDPC codes is better than those of random LDPC codes and separately designed QC-LDPC codes over AWGN channels.

  4. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  5. Phage display used for gene cloning of human recombinant antibody against the erythrocyte surface antigen, rhesus D

    DEFF Research Database (Denmark)

    Dziegiel, M; Nielsen, L K; Andersen, P S

    1995-01-01

    A novel phage display system has been developed for PCR amplification and cloning of the Fab fragments of human immunoglobulin genes. Using this system, we have cloned an antibody from a mouse-human hybridoma cell line directed against the erythrocyte antigen rhesus D. Intact erythrocytes were used...... for absorption of the Fab phages. Soluble Fab fragments produced from the cloned material showed identical performance to the parental antibody in agglutination assays. Gel filtration confirmed that the Fab fragment consists of a kappa-Fd heterodimer. The successful use of intact cells for selection of specific...... Fab phages demonstrates that it is possible to by-pass purification of the antigen of interest. Comparison with published germline sequences demonstrated that the immunoglobulin coding regions had the highest homology to the VH 1.9III and V kappa Hum kappa v325 germline genes, respectively....

  6. Human cloning. Fact or fiction

    International Nuclear Information System (INIS)

    Abushama, Mandy D.; Ahmed, Badreldeen I.

    2003-01-01

    Cloning is the production of one or more individual plants or animals that are genetically identical to other plant, animal or human. Scientists even demonstrated that they were able to clone frog tadpoles from frog embryonic cells using nuclear transfer.Many animals have been cloned from adult cells using nuclear transfer. Somatic cell nuclear transfer which refers to the transfer of the nucleous from a somatic cell to an egg cell. Article further deals with benefits and misuses of human cloning

  7. Local cloning of two product states

    International Nuclear Information System (INIS)

    Ji Zhengfeng; Feng Yuan; Ying Mingsheng

    2005-01-01

    Local quantum operations and classical communication (LOCC) put considerable constraints on many quantum information processing tasks such as cloning and discrimination. Surprisingly, however, discrimination of any two pure states survives such constraints in some sense. We show that cloning is not that lucky; namely, probabilistic LOCC cloning of two product states is strictly less efficient than global cloning. We prove our result by giving explicitly the efficiency formula of local cloning of any two product states

  8. Cloning, purification, crystallization and preliminary crystallographic analysis of SecA from Enterococcus faecalis

    International Nuclear Information System (INIS)

    Meining, Winfried; Scheuring, Johannes; Fischer, Markus; Weinkauf, Sevil

    2006-01-01

    SecA ATPase from E. faecalis has been cloned, overexpressed, purified and crystallized. Crystals belong to space group C2 and diffract to 2.4 Å resolution. The gene coding for SecA from Enterococcus faecalis was cloned and overexpressed in Escherichia coli. In this protein, the lysine at position 6 was replaced by an asparagine in order to reduce sensitivity towards proteases. The modified protein was purified and crystallized. Crystals diffracting to 2.4 Å resolution were obtained using the vapour-diffusion technique. The crystals belong to the monoclinic space group C2, with unit-cell parameters a = 203.4, b = 49.8, c = 100.8 Å, α = γ = 90.0, β = 119.1°. A selenomethionine derivative was prepared and is currently being tested in crystallization trials

  9. Modelling RF sources using 2-D PIC codes

    Energy Technology Data Exchange (ETDEWEB)

    Eppley, K.R.

    1993-03-01

    In recent years, many types of RF sources have been successfully modelled using 2-D PIC codes. Both cross field devices (magnetrons, cross field amplifiers, etc.) and pencil beam devices (klystrons, gyrotrons, TWT'S, lasertrons, etc.) have been simulated. All these devices involve the interaction of an electron beam with an RF circuit. For many applications, the RF structure may be approximated by an equivalent circuit, which appears in the simulation as a boundary condition on the electric field ( port approximation''). The drive term for the circuit is calculated from the energy transfer between beam and field in the drift space. For some applications it may be necessary to model the actual geometry of the structure, although this is more expensive. One problem not entirely solved is how to accurately model in 2-D the coupling to an external waveguide. Frequently this is approximated by a radial transmission line, but this sometimes yields incorrect results. We also discuss issues in modelling the cathode and injecting the beam into the PIC simulation.

  10. Modelling RF sources using 2-D PIC codes

    Energy Technology Data Exchange (ETDEWEB)

    Eppley, K.R.

    1993-03-01

    In recent years, many types of RF sources have been successfully modelled using 2-D PIC codes. Both cross field devices (magnetrons, cross field amplifiers, etc.) and pencil beam devices (klystrons, gyrotrons, TWT`S, lasertrons, etc.) have been simulated. All these devices involve the interaction of an electron beam with an RF circuit. For many applications, the RF structure may be approximated by an equivalent circuit, which appears in the simulation as a boundary condition on the electric field (``port approximation``). The drive term for the circuit is calculated from the energy transfer between beam and field in the drift space. For some applications it may be necessary to model the actual geometry of the structure, although this is more expensive. One problem not entirely solved is how to accurately model in 2-D the coupling to an external waveguide. Frequently this is approximated by a radial transmission line, but this sometimes yields incorrect results. We also discuss issues in modelling the cathode and injecting the beam into the PIC simulation.

  11. Modelling RF sources using 2-D PIC codes

    International Nuclear Information System (INIS)

    Eppley, K.R.

    1993-03-01

    In recent years, many types of RF sources have been successfully modelled using 2-D PIC codes. Both cross field devices (magnetrons, cross field amplifiers, etc.) and pencil beam devices (klystrons, gyrotrons, TWT'S, lasertrons, etc.) have been simulated. All these devices involve the interaction of an electron beam with an RF circuit. For many applications, the RF structure may be approximated by an equivalent circuit, which appears in the simulation as a boundary condition on the electric field (''port approximation''). The drive term for the circuit is calculated from the energy transfer between beam and field in the drift space. For some applications it may be necessary to model the actual geometry of the structure, although this is more expensive. One problem not entirely solved is how to accurately model in 2-D the coupling to an external waveguide. Frequently this is approximated by a radial transmission line, but this sometimes yields incorrect results. We also discuss issues in modelling the cathode and injecting the beam into the PIC simulation

  12. An alternative method for cDNA cloning from surrogate eukaryotic cells transfected with the corresponding genomic DNA.

    Science.gov (United States)

    Hu, Lin-Yong; Cui, Chen-Chen; Song, Yu-Jie; Wang, Xiang-Guo; Jin, Ya-Ping; Wang, Ai-Hua; Zhang, Yong

    2012-07-01

    cDNA is widely used in gene function elucidation and/or transgenics research but often suitable tissues or cells from which to isolate mRNA for reverse transcription are unavailable. Here, an alternative method for cDNA cloning is described and tested by cloning the cDNA of human LALBA (human alpha-lactalbumin) from genomic DNA. First, genomic DNA containing all of the coding exons was cloned from human peripheral blood and inserted into a eukaryotic expression vector. Next, by delivering the plasmids into either 293T or fibroblast cells, surrogate cells were constructed. Finally, the total RNA was extracted from the surrogate cells and cDNA was obtained by RT-PCR. The human LALBA cDNA that was obtained was compared with the corresponding mRNA published in GenBank. The comparison showed that the two sequences were identical. The novel method for cDNA cloning from surrogate eukaryotic cells described here uses well-established techniques that are feasible and simple to use. We anticipate that this alternative method will have widespread applications.

  13. Validation of the Open Source Code_Aster Software Used in the Modal Analysis of the Fluid-filled Cylindrical Shell

    Directory of Open Access Journals (Sweden)

    B D. Kashfutdinov

    2017-01-01

    Full Text Available The paper deals with a modal analysis of the elastic cylindrical shell with a clamped bottom partially filled with fluid in open source Code_Aster software using the finite element method. Natural frequencies and modes obtained in Code_Aster are compared to experimental and theoretical data. The aim of this paper is to prove that Code_Aster has all necessary tools for solving fluid structure interaction problems. Also, Code_Aster can be used in the industrial projects as an alternative to commercial software. The available free pre- and post-processors with a graphical user interface that is compatible with Code_Aster allow creating complex models and processing the results.The paper presents new validation results of open source Code_Aster software used to calculate small natural modes of the cylindrical shell partially filled with non-viscous compressible barotropic fluid under gravity field.The displacement of the middle surface of thin shell and the displacement of the fluid relative to the equilibrium position are described by coupled hydro-elasticity problem. The fluid flow is considered to be potential. The finite element method (FEM is used. The features of computational model are described. The resolution equation has symmetrical block matrices. To compare the results, is discussed the well-known modal analysis problem of cylindrical shell with flat non-deformable bottom, filled with a compressible fluid. The numerical parameters of the scheme were chosen in accordance with well-known experimental and analytical data. Three cases were taken into account: an empty, a partially filled and a full-filled cylindrical shell.The frequencies of Code_Aster are in good agreement with those, obtained in experiment, analytical solution, as well as with results obtained by FEM in other software. The difference between experiment and analytical solution in software is approximately the same. The obtained results extend a set of validation tests for

  14. Cloning of cDNA encoding steroid 11β-hydroxylase (P450c11)

    International Nuclear Information System (INIS)

    Chua, S.C.; Szabo, P.; Vitek, A.; Grzeschik, K.H.; John, M.; White, P.C.

    1987-01-01

    The authors have isolated bovine and human adrenal cDNA clones encoding the adrenal cytochrome P-450 specific for 11β-hydroxylation (P450c11). A bovine adrenal cDNA library constructed in the bacteriophage λ vector gt10 was probed with a previously isolated cDNA clone corresponding to part of the 3' untranslated region of the 4.2-kilobase (kb) mRNA encoding P450c11. Several clones with 3.2-kb cDNA inserts were isolated. Sequence analysis showed that they overlapped the original probe by 300 base pairs (bp). Combined cDNA and RNA sequence data demonstrated a continuous open reading frame of 1509 bases. P450c11 is predicted to contain 479 amino acid residues in the mature protein in addition to a 24-residue amino-terminal mitochondrial signal sequence. A bovine clone was used to isolate a homologous clone with a 3.5-kb insert from a human adrenal cDNA library. A region of 1100 bp was 81% homologous to 769 bp of the coding sequence of the bovine cDNA except for a 400-bp segment presumed to be an unprocessed intron. Hybridization of the human cDNA to DNA from a panel of human-rodent somatic cell hybrid lines and in situ hybridization to metaphase spreads of human chromosomes localized the gene to the middle of the long arm of chromosome 8. These data should be useful in developing reagents for heterozygote detection and prenatal diagnosis of 11β-hydroxylase deficiency, the second most frequent cause of congenital adrenal hyperplasia

  15. Multiple Site-Directed and Saturation Mutagenesis by the Patch Cloning Method.

    Science.gov (United States)

    Taniguchi, Naohiro; Murakami, Hiroshi

    2017-01-01

    Constructing protein-coding genes with desired mutations is a basic step for protein engineering. Herein, we describe a multiple site-directed and saturation mutagenesis method, termed MUPAC. This method has been used to introduce multiple site-directed mutations in the green fluorescent protein gene and in the moloney murine leukemia virus reverse transcriptase gene. Moreover, this method was also successfully used to introduce randomized codons at five desired positions in the green fluorescent protein gene, and for simple DNA assembly for cloning.

  16. Primer sets for cloning the human repertoire of T cell Receptor Variable regions.

    Science.gov (United States)

    Boria, Ilenia; Cotella, Diego; Dianzani, Irma; Santoro, Claudio; Sblattero, Daniele

    2008-08-29

    Amplification and cloning of naïve T cell Receptor (TR) repertoires or antigen-specific TR is crucial to shape immune response and to develop immuno-based therapies. TR variable (V) regions are encoded by several genes that recombine during T cell development. The cloning of expressed genes as large diverse libraries from natural sources relies upon the availability of primers able to amplify as many V genes as possible. Here, we present a list of primers computationally designed on all functional TR V and J genes listed in the IMGT, the ImMunoGeneTics information system. The list consists of unambiguous or degenerate primers suitable to theoretically amplify and clone the entire TR repertoire. We show that it is possible to selectively amplify and clone expressed TR V genes in one single RT-PCR step and from as little as 1000 cells. This new primer set will facilitate the creation of more diverse TR libraries than has been possible using currently available primer sets.

  17. Human cloning: can it be made safe?

    Science.gov (United States)

    Rhind, Susan M; Taylor, Jane E; De Sousa, Paul A; King, Tim J; McGarry, Michelle; Wilmut, Ian

    2003-11-01

    There are continued claims of attempts to clone humans using nuclear transfer, despite the serious problems that have been encountered in cloning other mammals. It is known that epigenetic and genetic mechanisms are involved in clone failure, but we still do not know exactly how. Human reproductive cloning is unethical, but the production of cells from cloned embryos could offer many potential benefits. So, can human cloning be made safe?

  18. Cloning and expression of a widely expressed receptor tyrosine phosphatase

    DEFF Research Database (Denmark)

    Sap, J; D'Eustachio, P; Givol, D

    1990-01-01

    We describe the identification of a widely expressed receptor-type (transmembrane) protein tyrosine phosphatase (PTPase; EC 3.1.3.48). Screening of a mouse brain cDNA library under low-stringency conditions with a probe encompassing the intracellular (phosphatase) domain of the CD45 lymphocyte...... antigen yielded cDNA clones coding for a 794-amino acid transmembrane protein [hereafter referred to as receptor protein tyrosine phosphatase alpha (R-PTP-alpha)] with an intracellular domain displaying clear homology to the catalytic domains of CD45 and LAR (45% and 53%, respectively). The 142-amino acid...

  19. Probabilistic cloning and deleting of quantum states

    International Nuclear Information System (INIS)

    Feng Yuan; Zhang Shengyu; Ying Mingsheng

    2002-01-01

    We construct a probabilistic cloning and deleting machine which, taking several copies of an input quantum state, can output a linear superposition of multiple cloning and deleting states. Since the machine can perform cloning and deleting in a single unitary evolution, the probabilistic cloning and other cloning machines proposed in the previous literature can be thought of as special cases of our machine. A sufficient and necessary condition for successful cloning and deleting is presented, and it requires that the copies of an arbitrarily presumed number of the input states are linearly independent. This simply generalizes some results for cloning. We also derive an upper bound for the success probability of the cloning and deleting machine

  20. Asymmetric quantum cloning machines

    International Nuclear Information System (INIS)

    Cerf, N.J.

    1998-01-01

    A family of asymmetric cloning machines for quantum bits and N-dimensional quantum states is introduced. These machines produce two approximate copies of a single quantum state that emerge from two distinct channels. In particular, an asymmetric Pauli cloning machine is defined that makes two imperfect copies of a quantum bit, while the overall input-to-output operation for each copy is a Pauli channel. A no-cloning inequality is derived, characterizing the impossibility of copying imposed by quantum mechanics. If p and p ' are the probabilities of the depolarizing channels associated with the two outputs, the domain in (√p,√p ' )-space located inside a particular ellipse representing close-to-perfect cloning is forbidden. This ellipse tends to a circle when copying an N-dimensional state with N→∞, which has a simple semi-classical interpretation. The symmetric Pauli cloning machines are then used to provide an upper bound on the quantum capacity of the Pauli channel of probabilities p x , p y and p z . The capacity is proven to be vanishing if (√p x , √p y , √p z ) lies outside an ellipsoid whose pole coincides with the depolarizing channel that underlies the universal cloning machine. Finally, the tradeoff between the quality of the two copies is shown to result from a complementarity akin to Heisenberg uncertainty principle. (author)

  1. Variations and voids: the regulation of human cloning around the world

    Directory of Open Access Journals (Sweden)

    Caulfield Timothy

    2004-12-01

    Full Text Available Abstract Background No two countries have adopted identical regulatory measures on cloning. Understanding the complexity of these regulatory variations is essential. It highlights the challenges associated with the regulation of a controversial and rapidly evolving area of science and sheds light on a regulatory framework that can accommodate this reality. Methods Using the most reliable information available, we have performed a survey of the regulatory position of thirty countries around the world regarding the creation and use of cloned embryos (see Table 1. We have relied on original and translated legislation, as well as published sources and personal communications. We have examined the regulation of both reproductive cloning (RC and non-reproductive cloning (NRC. Results While most of the countries studied have enacted national legislation, the absence of legislation in seven of these countries should not be equated with the absence of regulation. Senator Morin was not correct in stating that the majority of recent legislation bans both RC and NRC. Recent regulatory moves are united only with regard to the banning of RC. While NRC is not permitted in seventeen of the countries examined, it could be permitted in up to thirteen countries. Conclusions There is little consensus on the various approaches to cloning laws and policies, and the regulatory position in many countries remains uncertain.

  2. GRHydro: a new open-source general-relativistic magnetohydrodynamics code for the Einstein toolkit

    International Nuclear Information System (INIS)

    Mösta, Philipp; Haas, Roland; Ott, Christian D; Reisswig, Christian; Mundim, Bruno C; Faber, Joshua A; Noble, Scott C; Bode, Tanja; Löffler, Frank; Schnetter, Erik

    2014-01-01

    We present the new general-relativistic magnetohydrodynamics (GRMHD) capabilities of the Einstein toolkit, an open-source community-driven numerical relativity and computational relativistic astrophysics code. The GRMHD extension of the toolkit builds upon previous releases and implements the evolution of relativistic magnetized fluids in the ideal MHD limit in fully dynamical spacetimes using the same shock-capturing techniques previously applied to hydrodynamical evolution. In order to maintain the divergence-free character of the magnetic field, the code implements both constrained transport and hyperbolic divergence cleaning schemes. We present test results for a number of MHD tests in Minkowski and curved spacetimes. Minkowski tests include aligned and oblique planar shocks, cylindrical explosions, magnetic rotors, Alfvén waves and advected loops, as well as a set of tests designed to study the response of the divergence cleaning scheme to numerically generated monopoles. We study the code’s performance in curved spacetimes with spherical accretion onto a black hole on a fixed background spacetime and in fully dynamical spacetimes by evolutions of a magnetized polytropic neutron star and of the collapse of a magnetized stellar core. Our results agree well with exact solutions where these are available and we demonstrate convergence. All code and input files used to generate the results are available on http://einsteintoolkit.org. This makes our work fully reproducible and provides new users with an introduction to applications of the code. (paper)

  3. [Cloning of human CD45 gene and its expression in Hela cells].

    Science.gov (United States)

    Li, Jie; Xu, Tianyu; Wu, Lulin; Zhang, Liyun; Lu, Xiao; Zuo, Daming; Chen, Zhengliang

    2015-11-01

    To clone human CD45 gene PTPRC and establish Hela cells overexpressing recombinant human CD45 protein. The intact cDNA encoding human CD45 amplified using RT-PCR from the total RNA extracted from peripheral blood mononuclear cells (PBMCs) of a healthy donor was cloned into pMD-18T vector. The CD45 cDNA fragment amplified from the pMD-18T-CD45 by PCR was inserted to the coding region of the PcDNA3.1-3xflag vector, and the resultant recombinant expression vector PcDNA3.1-3xflag-CD45 was transfected into Hela cells. The expression of CD45 in Hela cells was detected by flow cytometry and Western blotting, and the phosphastase activity of CD45 was quantified using an alkaline phosphatase assay kit. The cDNA fragment of about 3 900 bp was amplified from human PBMCs and cloned into pMD-18T vector. The recombinant expression vector PcDNA3.1-3xflag-CD45 was constructed, whose restriction maps and sequence were consistent with those expected. The expression of CD45 in transfected Hela cells was detected by flow cytometry and Western blotting, and the expressed recombinant CD45 protein in Hela cells showed a phosphastase activity. The cDNA of human CD45 was successfully cloned and effectively expressed in Hela cells, which provides a basis for further exploration of the functions of CD45.

  4. Molecular Cloning Expression And Purification Studies With An ORF Of Mycobacterium Tuberculosis

    Directory of Open Access Journals (Sweden)

    Chiranjibi Chaudhary

    2017-08-01

    Full Text Available The study was initiated to develop a recombinant strain for expression and production of large scale protein and to develop its purification protocol. The MRAORF-X was amplified from the genomic DNA of M. tuberculosis H37Ra. The amplicon was successfully cloned in a cloning vector pGEM-T Easy and transformed in cloning host DH5amp945. Recombinant clones were identified by blue-white screening and insert presence was confirmed by restriction digestion of plasmid isolated from white colonies. Expression vector pET32a was used for protein expression. The recombinant plasmid was transformed into expression host BL21 and protein expression was checked by SDS-PAGE. The desired protein was approximately 60 kDa in size including tags. The purification protocol was established for purification from inclusion bodies. The purity of purified protein was assessed by SDS-PAGE gel run and presence of a single band at 60 kDa suggested that the inclusion bodies were a good source of purified protein.

  5. Wildlife conservation and reproductive cloning.

    Science.gov (United States)

    Holt, William V; Pickard, Amanda R; Prather, Randall S

    2004-03-01

    Reproductive cloning, or the production of offspring by nuclear transfer, is often regarded as having potential for conserving endangered species of wildlife. Currently, however, low success rates for reproductive cloning limit the practical application of this technique to experimental use and proof of principle investigations. In this review, we consider how cloning may contribute to wildlife conservation strategies. The cloning of endangered mammals presents practical problems, many of which stem from the paucity of knowledge about their basic reproductive biology. However, situations may arise where resources could be targeted at recovering lost or under-represented genetic lines; these could then contribute to the future fitness of the population. Approaches of this type would be preferable to the indiscriminate generation of large numbers of identical individuals. Applying cloning technology to non-mammalian vertebrates may be more practical than attempting to use conventional reproductive technologies. As the scientific background to cloning technology was pioneered using amphibians, it may be possible to breed imminently threatened amphibians, or even restore extinct amphibian species, by the use of cloning. In this respect species with external embryonic development may have an advantage over mammals as developmental abnormalities associated with inappropriate embryonic reprogramming would not be relevant.

  6. Cloning and characterization of a human orphan family C G-protein coupled receptor GPRC5D

    DEFF Research Database (Denmark)

    Bräuner-Osborne, H; Jensen, A A; Sheppard, P O

    2001-01-01

    predicted to encode an additional subtype. The full length coding regions of mouse mGprc5d and human GPRC5D were cloned and shown to contain predicted open reading frames of 300 and 345 amino acids, respectively. GPRC5D has seven putative transmembrane segments and is expressed in the cell membrane...

  7. Neutron spallation source and the Dubna cascade code

    CERN Document Server

    Kumar, V; Goel, U; Barashenkov, V S

    2003-01-01

    Neutron multiplicity per incident proton, n/p, in collision of high energy proton beam with voluminous Pb and W targets has been estimated from the Dubna cascade code and compared with the available experimental data for the purpose of benchmarking of the code. Contributions of various atomic and nuclear processes for heat production and isotopic yield of secondary nuclei are also estimated to assess the heat and radioactivity conditions of the targets. Results obtained from the code show excellent agreement with the experimental data at beam energy, E < 1.2 GeV and differ maximum up to 25% at higher energy. (author)

  8. Islamic perspectives on human cloning.

    Science.gov (United States)

    Sadeghi, Mahmoud

    2007-01-01

    The present paper seeks to assess various views from Islamic jurists relating to human cloning, which is one of the controversial topics in the recent past. Taking Islamic jurisprudence principles, such as the rule of necessity for self preservation and respect for human beings, the rule of la darar wa la dirar ('the necessity to refrain from causing harm to oneself and others') and the rule of usr wa haraj, one may indicate that if human cloning could not be prohibited, as such, it could still be opposed because it gives way to various harmful consequences, which include family disorder, chaos in the clone's family relationships, physical and mental diseases for clones and suffering of egg donors and surrogate mothers. However with due attention to the fact that the reasons behind the prohibition of abortion only restrict the destruction of human embryos in their post-implantation stages, human cloning for biomedical research and exploitation of stem cells from cloned embryos at the blastocyst stage for therapeutic purposes would be acceptable.

  9. Quantum cloning machines for equatorial qubits

    International Nuclear Information System (INIS)

    Fan Heng; Matsumoto, Keiji; Wang Xiangbin; Wadati, Miki

    2002-01-01

    Quantum cloning machines for equatorial qubits are studied. For the case of a one to two phase-covariant quantum cloning machine, we present the networks consisting of quantum gates to realize the quantum cloning transformations. The copied equatorial qubits are shown to be separable by using Peres-Horodecki criterion. The optimal one to M phase-covariant quantum cloning transformations are given

  10. A Gateway MultiSite recombination cloning toolkit.

    Directory of Open Access Journals (Sweden)

    Lena K Petersen

    Full Text Available The generation of DNA constructs is often a rate-limiting step in conducting biological experiments. Recombination cloning of single DNA fragments using the Gateway system provided an advance over traditional restriction enzyme cloning due to increases in efficiency and reliability. Here we introduce a series of entry clones and a destination vector for use in two, three, and four fragment Gateway MultiSite recombination cloning whose advantages include increased flexibility and versatility. In contrast to Gateway single-fragment cloning approaches where variations are typically incorporated into model system-specific destination vectors, our Gateway MultiSite cloning strategy incorporates variations in easily generated entry clones that are model system-independent. In particular, we present entry clones containing insertions of GAL4, QF, UAS, QUAS, eGFP, and mCherry, among others, and demonstrate their in vivo functionality in Drosophila by using them to generate expression clones including GAL4 and QF drivers for various trp ion channel family members, UAS and QUAS excitatory and inhibitory light-gated ion channels, and QUAS red and green fluorescent synaptic vesicle markers. We thus establish a starter toolkit of modular Gateway MultiSite entry clones potentially adaptable to any model system. An inventory of entry clones and destination vectors for Gateway MultiSite cloning has also been established (www.gatewaymultisite.org.

  11. Update on the First Cloned Dog and Outlook for Canine Cloning.

    Science.gov (United States)

    Jang, Goo; Lee, ByeongChun

    2015-10-01

    As man's best friend, dogs have an important position in human society. Ten years ago, we reported the first cloned dog, and his birth has raised various scientific issues, such as those related to health, reproduction, and life span. He has developed without any unique health issues. In this article, we summarize and present perspectives on canine cloning.

  12. Cloning and expression of gene encoding P23 protein from Cryptosporidium parvum

    Directory of Open Access Journals (Sweden)

    Dinh Thi Bich Lan

    2014-12-01

    Full Text Available We cloned the cp23 gene coding P23 (glycoprotein from Cryptosporidium parvum isolated from Thua Thien Hue province, Vietnam. The coding region of cp23 gene from C. parvum is 99% similar with cp23 gene deposited in NCBI (accession number: U34390. SDS-PAGE and Western blot analysis showed that the cp23 gene in E. coli BL21 StarTM (DE3 produced polypeptides with molecular weights of approximately 37, 40 and 49 kDa. These molecules may be non-glycosylated or glycosylated P23 fusion polypeptides. Recombinant P23 protein purified by GST (glutathione S-transferase affinity chromatography can be used as an antigen for C. parvum antibody production as well as to develop diagnostic kit for C. parvum.

  13. ANEMOS: A computer code to estimate air concentrations and ground deposition rates for atmospheric nuclides emitted from multiple operating sources

    Energy Technology Data Exchange (ETDEWEB)

    Miller, C.W.; Sjoreen, A.L.; Begovich, C.L.; Hermann, O.W.

    1986-11-01

    This code estimates concentrations in air and ground deposition rates for Atmospheric Nuclides Emitted from Multiple Operating Sources. ANEMOS is one component of an integrated Computerized Radiological Risk Investigation System (CRRIS) developed for the US Environmental Protection Agency (EPA) for use in performing radiological assessments and in developing radiation standards. The concentrations and deposition rates calculated by ANEMOS are used in subsequent portions of the CRRIS for estimating doses and risks to man. The calculations made in ANEMOS are based on the use of a straight-line Gaussian plume atmospheric dispersion model with both dry and wet deposition parameter options. The code will accommodate a ground-level or elevated point and area source or windblown source. Adjustments may be made during the calculations for surface roughness, building wake effects, terrain height, wind speed at the height of release, the variation in plume rise as a function of downwind distance, and the in-growth and decay of daughter products in the plume as it travels downwind. ANEMOS can also accommodate multiple particle sizes and clearance classes, and it may be used to calculate the dose from a finite plume of gamma-ray-emitting radionuclides passing overhead. The output of this code is presented for 16 sectors of a circular grid. ANEMOS can calculate both the sector-average concentrations and deposition rates at a given set of downwind distances in each sector and the average of these quantities over an area within each sector bounded by two successive downwind distances. ANEMOS is designed to be used primarily for continuous, long-term radionuclide releases. This report describes the models used in the code, their computer implementation, the uncertainty associated with their use, and the use of ANEMOS in conjunction with other codes in the CRRIS. A listing of the code is included in Appendix C.

  14. ANEMOS: A computer code to estimate air concentrations and ground deposition rates for atmospheric nuclides emitted from multiple operating sources

    International Nuclear Information System (INIS)

    Miller, C.W.; Sjoreen, A.L.; Begovich, C.L.; Hermann, O.W.

    1986-11-01

    This code estimates concentrations in air and ground deposition rates for Atmospheric Nuclides Emitted from Multiple Operating Sources. ANEMOS is one component of an integrated Computerized Radiological Risk Investigation System (CRRIS) developed for the US Environmental Protection Agency (EPA) for use in performing radiological assessments and in developing radiation standards. The concentrations and deposition rates calculated by ANEMOS are used in subsequent portions of the CRRIS for estimating doses and risks to man. The calculations made in ANEMOS are based on the use of a straight-line Gaussian plume atmospheric dispersion model with both dry and wet deposition parameter options. The code will accommodate a ground-level or elevated point and area source or windblown source. Adjustments may be made during the calculations for surface roughness, building wake effects, terrain height, wind speed at the height of release, the variation in plume rise as a function of downwind distance, and the in-growth and decay of daughter products in the plume as it travels downwind. ANEMOS can also accommodate multiple particle sizes and clearance classes, and it may be used to calculate the dose from a finite plume of gamma-ray-emitting radionuclides passing overhead. The output of this code is presented for 16 sectors of a circular grid. ANEMOS can calculate both the sector-average concentrations and deposition rates at a given set of downwind distances in each sector and the average of these quantities over an area within each sector bounded by two successive downwind distances. ANEMOS is designed to be used primarily for continuous, long-term radionuclide releases. This report describes the models used in the code, their computer implementation, the uncertainty associated with their use, and the use of ANEMOS in conjunction with other codes in the CRRIS. A listing of the code is included in Appendix C

  15. A statistical–mechanical view on source coding: physical compression and data compression

    International Nuclear Information System (INIS)

    Merhav, Neri

    2011-01-01

    We draw a certain analogy between the classical information-theoretic problem of lossy data compression (source coding) of memoryless information sources and the statistical–mechanical behavior of a certain model of a chain of connected particles (e.g. a polymer) that is subjected to a contracting force. The free energy difference pertaining to such a contraction turns out to be proportional to the rate-distortion function in the analogous data compression model, and the contracting force is proportional to the derivative of this function. Beyond the fact that this analogy may be interesting in its own right, it may provide a physical perspective on the behavior of optimum schemes for lossy data compression (and perhaps also an information-theoretic perspective on certain physical system models). Moreover, it triggers the derivation of lossy compression performance for systems with memory, using analysis tools and insights from statistical mechanics

  16. SU-E-T-212: Comparison of TG-43 Dosimetric Parameters of Low and High Energy Brachytherapy Sources Obtained by MCNP Code Versions of 4C, X and 5

    Energy Technology Data Exchange (ETDEWEB)

    Zehtabian, M; Zaker, N; Sina, S [Shiraz University, Shiraz, Fars (Iran, Islamic Republic of); Meigooni, A Soleimani [Comprehensive Cancer Center of Nevada, Las Vegas, Nevada (United States)

    2015-06-15

    Purpose: Different versions of MCNP code are widely used for dosimetry purposes. The purpose of this study is to compare different versions of the MCNP codes in dosimetric evaluation of different brachytherapy sources. Methods: The TG-43 parameters such as dose rate constant, radial dose function, and anisotropy function of different brachytherapy sources, i.e. Pd-103, I-125, Ir-192, and Cs-137 were calculated in water phantom. The results obtained by three versions of Monte Carlo codes (MCNP4C, MCNPX, MCNP5) were compared for low and high energy brachytherapy sources. Then the cross section library of MCNP4C code was changed to ENDF/B-VI release 8 which is used in MCNP5 and MCNPX codes. Finally, the TG-43 parameters obtained using the MCNP4C-revised code, were compared with other codes. Results: The results of these investigations indicate that for high energy sources, the differences in TG-43 parameters between the codes are less than 1% for Ir-192 and less than 0.5% for Cs-137. However for low energy sources like I-125 and Pd-103, large discrepancies are observed in the g(r) values obtained by MCNP4C and the two other codes. The differences between g(r) values calculated using MCNP4C and MCNP5 at the distance of 6cm were found to be about 17% and 28% for I-125 and Pd-103 respectively. The results obtained with MCNP4C-revised and MCNPX were similar. However, the maximum difference between the results obtained with the MCNP5 and MCNP4C-revised codes was 2% at 6cm. Conclusion: The results indicate that using MCNP4C code for dosimetry of low energy brachytherapy sources can cause large errors in the results. Therefore it is recommended not to use this code for low energy sources, unless its cross section library is changed. Since the results obtained with MCNP4C-revised and MCNPX were similar, it is concluded that the difference between MCNP4C and MCNPX is their cross section libraries.

  17. Stable MSAP markers for the distinction of Vitis vinifera cv Pinot noir clones.

    Science.gov (United States)

    Ocaña, Juan; Walter, Bernard; Schellenbaum, Paul

    2013-11-01

    Grapevine is one of the most economically important fruit crops. Molecular markers have been used to study grapevine diversity. For instance, simple sequence repeats are a powerful tool for identification of grapevine cultivars, while amplified fragment length polymorphisms have shown their usefulness in intra-varietal diversity studies. Other techniques such as sequence-specific amplified polymorphism are based on the presence of mobile elements in the genome, but their detection lies upon their activity. Relevant attention has been drawn toward epigenetic sources of variation. In this study, a set of Vitis vinifera cv Pinot noir clones were analyzed using the methylation-sensitive amplified polymorphism technique with isoschizomers MspI and HpaII. Nine out of fourteen selective primer combinations were informative and generated two types of polymorphic fragments which were categorized as "stable" and "unstable." In total, 23 stable fragments were detected and they discriminated 92.5 % of the studied clones. Detected stable polymorphisms were either common to several clones, restricted to a few clones or unique to a single clone. The identification of these stable epigenetic markers will be useful in clonal diversity studies. We highlight the relevance of stable epigenetic variation in V. vinifera clones and analyze at which level these markers could be applicable for the development of forthright techniques for clonal distinction.

  18. MPEG-compliant joint source/channel coding using discrete cosine transform and substream scheduling for visual communication over packet networks

    Science.gov (United States)

    Kim, Seong-Whan; Suthaharan, Shan; Lee, Heung-Kyu; Rao, K. R.

    2001-01-01

    Quality of Service (QoS)-guarantee in real-time communication for multimedia applications is significantly important. An architectural framework for multimedia networks based on substreams or flows is effectively exploited for combining source and channel coding for multimedia data. But the existing frame by frame approach which includes Moving Pictures Expert Group (MPEG) cannot be neglected because it is a standard. In this paper, first, we designed an MPEG transcoder which converts an MPEG coded stream into variable rate packet sequences to be used for our joint source/channel coding (JSCC) scheme. Second, we designed a classification scheme to partition the packet stream into multiple substreams which have their own QoS requirements. Finally, we designed a management (reservation and scheduling) scheme for substreams to support better perceptual video quality such as the bound of end-to-end jitter. We have shown that our JSCC scheme is better than two other two popular techniques by simulation and real video experiments on the TCP/IP environment.

  19. Therapeutic and reproductive cloning: a critique.

    Science.gov (United States)

    Bowring, Finn

    2004-01-01

    This article is a critical examination of the science and ethics of human cloning. It summarises the key scientific milestones in the development of nuclear transplantation, explains the importance of cloning to research into the medical potential of embryonic stem cells, and discusses the well-worn distinction between 'therapeutic' and 'reproductive' cloning. Suggesting that this distinction will be impossible to police, it goes on to consider the ethics of full human cloning. It is concluded that it represents an unacceptable form of parental despotism, and that the genetic engineering and cloning of future human beings will fracture the foundations of modern humanism.

  20. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  1. Novel cloning machine with supplementary information

    International Nuclear Information System (INIS)

    Qiu Daowen

    2006-01-01

    Probabilistic cloning was first proposed by Duan and Guo. Then Pati established a novel cloning machine (NCM) for copying superposition of multiple clones simultaneously. In this paper, we deal with the novel cloning machine with supplementary information (NCMSI). For the case of cloning two states, we demonstrate that the optimal efficiency of the NCMSI in which the original party and the supplementary party can perform quantum communication equals that achieved by a two-step cloning protocol wherein classical communication is only allowed between the original and the supplementary parties. From this equivalence, it follows that NCMSI may increase the success probabilities for copying. Also, an upper bound on the unambiguous discrimination of two nonorthogonal pure product states is derived. Our investigation generalizes and completes the results in the literature

  2. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  3. Open-source tool for automatic import of coded surveying data to multiple vector layers in GIS environment

    Directory of Open Access Journals (Sweden)

    Eva Stopková

    2016-12-01

    Full Text Available This paper deals with a tool that enables import of the coded data in a singletext file to more than one vector layers (including attribute tables, together withautomatic drawing of line and polygon objects and with optional conversion toCAD. Python script v.in.survey is available as an add-on for open-source softwareGRASS GIS (GRASS Development Team. The paper describes a case study basedon surveying at the archaeological mission at Tell-el Retaba (Egypt. Advantagesof the tool (e.g. significant optimization of surveying work and its limits (demandson keeping conventions for the points’ names coding are discussed here as well.Possibilities of future development are suggested (e.g. generalization of points’names coding or more complex attribute table creation.

  4. The European source term code ESTER - basic ideas and tools for coupling of ATHLET and ESTER

    International Nuclear Information System (INIS)

    Schmidt, F.; Schuch, A.; Hinkelmann, M.

    1993-04-01

    The French software house CISI and IKE of the University of Stuttgart have developed during 1990 and 1991 in the frame of the Shared Cost Action Reactor Safety the informatic structure of the European Source TERm Evaluation System (ESTER). Due to this work tools became available which allow to unify on an European basis both code development and code application in the area of severe core accident research. The behaviour of reactor cores is determined by thermal hydraulic conditions. Therefore for the development of ESTER it was important to investigate how to integrate thermal hydraulic code systems with ESTER applications. This report describes the basic ideas of ESTER and improvements of ESTER tools in view of a possible coupling of the thermal hydraulic code system ATHLET and ESTER. Due to the work performed during this project the ESTER tools became the most modern informatic tools presently available in the area of severe accident research. A sample application is given which demonstrates the use of the new tools. (orig.) [de

  5. Calculation Of Fuel Burnup And Radionuclide Inventory In The Syrian Miniature Neutron Source Reactor Using The GETERA Code

    International Nuclear Information System (INIS)

    Khattab, K.; Dawahra, S.

    2011-01-01

    Calculations of the fuel burnup and radionuclide inventory in the Syrian Miniature Neutron Source Reactor (MNSR) after 10 years (the reactor core expected life) of the reactor operation time are presented in this paper using the GETERA code. The code is used to calculate the fuel group constants and the infinite multiplication factor versus the reactor operating time for 10, 20, and 30 kW operating power levels. The amounts of uranium burnup and plutonium produced in the reactor core, the concentrations and radionuclides of the most important fission product and actinide radionuclides accumulated in the reactor core, and the total radioactivity of the reactor core were calculated using the GETERA code as well. It is found that the GETERA code is better than the WIMSD4 code for the fuel burnup calculation in the MNSR reactor since it is newer and has a bigger library of isotopes and more accurate. (author)

  6. [Scientific ethics of human cloning].

    Science.gov (United States)

    Valenzuela, Carlos Y

    2005-01-01

    True cloning is fission, budding or other types of asexual reproduction. In humans it occurs in monozygote twinning. This type of cloning is ethically and religiously good. Human cloning can be performed by twinning (TWClo) or nuclear transfer (NTClo). Both methods need a zygote or a nuclear transferred cell, obtained in vitro (IVTec). They are under the IVTec ethics. IVTecs use humans (zygotes, embryos) as drugs or things; increase the risk of malformations; increase development and size of abnormalities and may cause long-term changes. Cloning for preserving extinct (or almost extinct) animals or humans when sexual reproduction is not possible is ethically valid. The previous selection of a phenotype in human cloning violates some ethical principles. NTClo for reproductive or therapeutic purposes is dangerous since it increases the risk for nucleotide or chromosome mutations, de-programming or re-programming errors, aging or malignancy of the embryo cells thus obtained.

  7. The ethics of human reproductive cloning.

    Science.gov (United States)

    Strong, Carson

    2005-03-01

    This article addresses the question of whether human reproductive cloning could be ethically justifiable in at least some cases involving infertile couples who would choose cloning as a way to have a genetically related child. At present, the risk of congenital anomalies constitutes a compelling argument against human reproductive cloning. The article explores whether reproductive cloning could be ethically justifiable if, at some future time, cloning becomes possible without an elevated risk of anomalies. It is argued that freedom to use cloning is a form of procreative freedom and, as such, deserves respect. All of the objections that have been raised against human reproductive cloning fall under three main categories: those that appeal to the interests of the child, those based on consequences for society, and those arising from teleological views. Objections that appeal to the child's interests are, in turn, of two main kinds: consequentialist and deontological. All of these types of objections are examined, and it is found that each involves serious problems that prevent it from being a reasonable objection in the context of the infertility cases considered. It is concluded that human reproductive cloning would be ethically justifiable in at least some cases involving infertile couples, provided that it could be performed without an elevated risk of anomalies.

  8. Economical quantum cloning in any dimension

    International Nuclear Information System (INIS)

    Durt, Thomas; Fiurasek, Jaromir; Cerf, Nicolas J.

    2005-01-01

    The possibility of cloning a d-dimensional quantum system without an ancilla is explored, extending on the economical phase-covariant cloning machine for qubits found in Phys. Rev. A 60, 2764 (1999). We prove the impossibility of constructing an economical version of the optimal universal 1→2 cloning machine in any dimension. We also show, using an ansatz on the generic form of cloning machines, that the d-dimensional 1→2 phase-covariant cloner, which optimally clones all balanced superpositions with arbitrary phases, can be realized economically only in dimension d=2. The used ansatz is supported by numerical evidence up to d=7. An economical phase-covariant cloner can nevertheless be constructed for d>2, albeit with a slightly lower fidelity than that of the optimal cloner requiring an ancilla. Finally, using again an ansatz on cloning machines, we show that an economical version of the 1→2 Fourier-covariant cloner, which optimally clones the computational basis and its Fourier transform, is also possible only in dimension d=2

  9. No-cloning theorem on quantum logics

    International Nuclear Information System (INIS)

    Miyadera, Takayuki; Imai, Hideki

    2009-01-01

    This paper discusses the no-cloning theorem in a logicoalgebraic approach. In this approach, an orthoalgebra is considered as a general structure for propositions in a physical theory. We proved that an orthoalgebra admits cloning operation if and only if it is a Boolean algebra. That is, only classical theory admits the cloning of states. If unsharp propositions are to be included in the theory, then a notion of effect algebra is considered. We proved that an atomic Archimedean effect algebra admitting cloning operation is a Boolean algebra. This paper also presents a partial result, indicating a relation between the cloning on effect algebras and hidden variables.

  10. Phase-covariant quantum cloning of qudits

    International Nuclear Information System (INIS)

    Fan Heng; Imai, Hiroshi; Matsumoto, Keiji; Wang, Xiang-Bin

    2003-01-01

    We study the phase-covariant quantum cloning machine for qudits, i.e., the input states in a d-level quantum system have complex coefficients with arbitrary phase but constant module. A cloning unitary transformation is proposed. After optimizing the fidelity between input state and single qudit reduced density operator of output state, we obtain the optimal fidelity for 1 to 2 phase-covariant quantum cloning of qudits and the corresponding cloning transformation

  11. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  12. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  13. Effect of TH-lines and clones on the growth and differentiation of B cell clones in microculture.

    Science.gov (United States)

    Kotloff, D B; Cebra, J J

    1988-02-01

    Antibody isotype expression by B cell clones was analyzed using in vitro microcultures containing low numbers of hapten-gelatin-enriched B cells and higher numbers of hemocyanin-specific helper T cell lines or clones. Twenty-eight to sixty-three percent of clones grown in microculture with haptenated hemocyanin and T cells from established lines expressed IgG and/or IgA isotypes in random mixtures, almost always accompanied by IgM. Helper T cells from hemocyanin-specific clones also supported the expression of non-IgM isotypes by the B cell clones, suggesting that a single specificity of T cell can provide sufficient growth and differentiation factors for the display of isotype switching. A positive correlation between the antibody output of clones and the expression of non-IgM isotypes indicated that the switching process may be associated with cell division. Although memory B cells that give clones expressing IgG and/or IgA in the absence of IgM are also enriched on haptenated gelatin, they are not stimulable under conditions of this microculture assay.

  14. Human reproductive cloning: a conflict of liberties.

    Science.gov (United States)

    Havstad, Joyce C

    2010-02-01

    Proponents of human reproductive cloning do not dispute that cloning may lead to violations of clones' right to self-determination, or that these violations could cause psychological harms. But they proceed with their endorsement of human reproductive cloning by dismissing these psychological harms, mainly in two ways. The first tactic is to point out that to commit the genetic fallacy is indeed a mistake; the second is to invoke Parfit's non-identity problem. The argument of this paper is that neither approach succeeds in removing our moral responsibility to consider and to prevent psychological harms to cloned individuals. In fact, the same commitment to personal liberty that generates the right to reproduce by means of cloning also creates the need to limit that right appropriately. Discussion of human reproductive cloning ought to involve a careful and balanced consideration of both the relevant aspects of personal liberty - the parents' right to reproductive freedom and the cloned child's right to self-determination.

  15. Primer sets for cloning the human repertoire of T cell Receptor Variable regions

    Directory of Open Access Journals (Sweden)

    Santoro Claudio

    2008-08-01

    Full Text Available Abstract Background Amplification and cloning of naïve T cell Receptor (TR repertoires or antigen-specific TR is crucial to shape immune response and to develop immuno-based therapies. TR variable (V regions are encoded by several genes that recombine during T cell development. The cloning of expressed genes as large diverse libraries from natural sources relies upon the availability of primers able to amplify as many V genes as possible. Results Here, we present a list of primers computationally designed on all functional TR V and J genes listed in the IMGT®, the ImMunoGeneTics information system®. The list consists of unambiguous or degenerate primers suitable to theoretically amplify and clone the entire TR repertoire. We show that it is possible to selectively amplify and clone expressed TR V genes in one single RT-PCR step and from as little as 1000 cells. Conclusion This new primer set will facilitate the creation of more diverse TR libraries than has been possible using currently available primer sets.

  16. Changes in the gut microbiota of cloned and non-cloned control pigs during development of obesity: gut microbiota during development of obesity in cloned pigs

    DEFF Research Database (Denmark)

    Pedersen, Rebecca; Andersen, Anders Daniel; Mølbak, Lars

    2013-01-01

    Background Obesity induced by a high-caloric diet has previously been associated with changes in the gut microbiota in mice and in humans. In this study, pigs were cloned to minimize genetic and biological variation among the animals with the aim of developing a controlled metabolomic model...... suitable for a diet-intervention study. Cloning of pigs may be an attractive way to reduce genetic influences when investigating the effect of diet and obesity on different physiological sites. The aim of this study was to assess and compare the changes in the composition of the gut microbiota of cloned vs....... non-cloned pigs during development of obesity by a high-fat/high-caloric diet. Furthermore, we investigated the association between diet-induced obesity and the relative abundance of the phyla Firmicutes and Bacteroidetes in the fecal-microbiota. The fecal microbiota from obese cloned (n = 5) and non...

  17. Probabilistic cloning of three symmetric states

    International Nuclear Information System (INIS)

    Jimenez, O.; Bergou, J.; Delgado, A.

    2010-01-01

    We study the probabilistic cloning of three symmetric states. These states are defined by a single complex quantity, the inner product among them. We show that three different probabilistic cloning machines are necessary to optimally clone all possible families of three symmetric states. We also show that the optimal cloning probability of generating M copies out of one original can be cast as the quotient between the success probability of unambiguously discriminating one and M copies of symmetric states.

  18. Molecular Cloning and Characterization of Carbonic Anhydrase XII from Pufferfish (Takifugu rubripes

    Directory of Open Access Journals (Sweden)

    Kanij Rukshana Sumi

    2018-03-01

    Full Text Available In this study, an 1888-bp carbonic anhydrase XII (CA XII sequence was cloned from the brain of the pufferfish, Takifugu rubripes. The cloned sequence contained a coding region of 1470-bp, which was predicted to translate into a protein of 490 amino acid residues. The predicted protein showed between 68–56% identity with the large yellow croaker (Larimichthys crocea, tilapia (Oreochromis niloticus, and Asian arowana (Scleropages formosus CA XII proteins. It also exhibited 36% and 53% identity with human CA II and CA XII, respectively. The cloned sequence contained a 22 amino acid NH2-terminal signal sequence and three Asn-Xaa-Ser/Thr sequons, among which one was potentially glycosylated. Four cysteine residues were also identified (Cys-21, Cys-201, Cys-355, and Cys-358, two of which (Cys-21 and Cys-201 could potentially form a disulfide bond. A 22-amino acid COOH-terminal cytoplasmic tail containing a potential site for phosphorylation by protein kinase A was also found. The cloned sequence might be a transmembrane protein, as predicted from in silico and phylogenetic analyses. The active site analysis of the predicted protein showed that its active site residues were highly conserved with tilapia CA XII protein. Homology modeling of the pufferfish CA XII was done using the crystal structure of the extracellular domain of human carbonic anhydrase XII at 1.55 Å resolution as a template. Semi-quantitative reverse transcription (RT-PCR, quantitative PCR (q-PCR, and in situ hybridization confirmed that pufferfish CA XII is highly expressed in the brain.

  19. SCRIC: a code dedicated to the detailed emission and absorption of heterogeneous NLTE plasmas; application to xenon EUV sources; SCRIC: un code pour calculer l'absorption et l'emission detaillees de plasmas hors equilibre, inhomogenes et etendus; application aux sources EUV a base de xenon

    Energy Technology Data Exchange (ETDEWEB)

    Gaufridy de Dortan, F. de

    2006-07-01

    Nearly all spectral opacity codes for LTE and NLTE plasmas rely on configurations approximate modelling or even supra-configurations modelling for mid Z plasmas. But in some cases, configurations interaction (either relativistic and non relativistic) induces dramatic changes in spectral shapes. We propose here a new detailed emissivity code with configuration mixing to allow for a realistic description of complex mid Z plasmas. A collisional radiative calculation. based on HULLAC precise energies and cross sections. determines the populations. Detailed emissivities and opacities are then calculated and radiative transfer equation is resolved for wide inhomogeneous plasmas. This code is able to cope rapidly with very large amount of atomic data. It is therefore possible to use complex hydrodynamic files even on personal computers in a very limited time. We used this code for comparison with Xenon EUV sources within the framework of nano-lithography developments. It appears that configurations mixing strongly shifts satellite lines and must be included in the description of these sources to enhance their efficiency. (author)

  20. Gaze strategies can reveal the impact of source code features on the cognitive load of novice programmers

    DEFF Research Database (Denmark)

    Wulff-Jensen, Andreas; Ruder, Kevin Vignola; Triantafyllou, Evangelia

    2018-01-01

    As shown by several studies, programmers’ readability of source code is influenced by its structural and the textual features. In order to assess the importance of these features, we conducted an eye-tracking experiment with programming students. To assess the readability and comprehensibility of...

  1. BIOETHICS AND HUMAN CLONING

    Directory of Open Access Journals (Sweden)

    Željko Kaluđerović

    2011-12-01

    Full Text Available In this paper the authors analyze the process of negotiating and beginning of the United Nations Declaration on Human Cloning as well as the paragraphs of the very Declaration. The negotiation was originally conceived as a clear bioethical debate that should have led to a general agreement to ban human cloning. However, more often it had been discussed about human rights, cultural, civil and religious differences between people and about priorities in case of eventual conflicts between different value systems. In the end, a non-binding Declaration on Human Cloning had been adopted, full of numerous compromises and ambiguous formulations, that relativized the original intention of proposer states. According to authors, it would have been better if bioethical discussion and eventual regulations on cloning mentioned in the following text had been left over to certain professional bodies, and only after the public had been fully informed about it should relevant supranational organizations have taken that into consideration.

  2. Fast space-varying convolution using matrix source coding with applications to camera stray light reduction.

    Science.gov (United States)

    Wei, Jianing; Bouman, Charles A; Allebach, Jan P

    2014-05-01

    Many imaging applications require the implementation of space-varying convolution for accurate restoration and reconstruction of images. Here, we use the term space-varying convolution to refer to linear operators whose impulse response has slow spatial variation. In addition, these space-varying convolution operators are often dense, so direct implementation of the convolution operator is typically computationally impractical. One such example is the problem of stray light reduction in digital cameras, which requires the implementation of a dense space-varying deconvolution operator. However, other inverse problems, such as iterative tomographic reconstruction, can also depend on the implementation of dense space-varying convolution. While space-invariant convolution can be efficiently implemented with the fast Fourier transform, this approach does not work for space-varying operators. So direct convolution is often the only option for implementing space-varying convolution. In this paper, we develop a general approach to the efficient implementation of space-varying convolution, and demonstrate its use in the application of stray light reduction. Our approach, which we call matrix source coding, is based on lossy source coding of the dense space-varying convolution matrix. Importantly, by coding the transformation matrix, we not only reduce the memory required to store it; we also dramatically reduce the computation required to implement matrix-vector products. Our algorithm is able to reduce computation by approximately factoring the dense space-varying convolution operator into a product of sparse transforms. Experimental results show that our method can dramatically reduce the computation required for stray light reduction while maintaining high accuracy.

  3. Construction of a full-length infectious bacterial artificial chromosome clone of duck enteritis virus vaccine strain

    Science.gov (United States)

    2013-01-01

    -length genome without any deletions or destruction of the viral coding sequence, and the viruses rescued from the DEV-BAC clone exhibited wild-type phenotypes both in vitro and in vivo. The generated infectious clone will greatly facilitate studies on the individual genes of DEV and applications in gene deletion or live vector vaccines. PMID:24195756

  4. Cloning, expression and characterization of alcohol dehydrogenases in the silkworm Bombyx mori

    Directory of Open Access Journals (Sweden)

    Nan Wang

    2011-01-01

    Full Text Available Alcohol dehydrogenases (ADH are a class of enzymes that catalyze the reversible oxidation of alcohols to corresponding aldehydes or ketones, by using either nicotinamide adenine dinucleotide (NAD or nicotinamide adenine dinucleotide phosphate (NADP, as coenzymes. In this study, a short-chain ADH gene was identified in Bombyx mori by 5'-RACE PCR. This is the first time the coding region of BmADH has been cloned, expressed, purified and then characterized. The cDNA fragment encoding the BmADH protein was amplified from a pool of silkworm cDNAs by PCR, and then cloned into E. coli expression vector pET-30a(+. The recombinant His-tagged BmADH protein was expressed in E. coli BL21 (DE3, and then purified by metal chelating affinity chromatography. The soluble recombinant BmADH, produced at low-growth temperature, was instrumental in catalyzing the ethanol-dependent reduction of NAD+, thereby indicating ethanol as one of the substrates of BmADH.

  5. The First Human Cloned Embryo.

    Science.gov (United States)

    Cibelli, Jose B.; Lanza, Robert P.; West, Michael D.; Ezzell, Carol

    2002-01-01

    Describes a process known as parthenogenesis which produces cloned, early-stage embryos and human embryos generated only from eggs. Speculates that this technology puts therapeutic cloning within reach. (DDR)

  6. Characterization of a pollen-specific cDNA clone from Nicotiana tabacum expressed during microgametogenesis and germination.

    Science.gov (United States)

    Weterings, K; Reijnen, W; van Aarssen, R; Kortstee, A; Spijkers, J; van Herpen, M; Schrauwen, J; Wullems, G

    1992-04-01

    This report describes the isolation and characterization of a cDNA clone representing a gene specifically expressed in pollen. A cDNA library was constructed against mRNA from mature pollen of Nicotiana tabacum. It was screened differentially against cDNA from mRNA of leaf and of pollen. One clone, NTPc303, was further characterized. On northern blot this clone hybridizes to a transcript 2100 nucleotides in length. NTPc303 is abundant in pollen. Expression of the corresponding gene is restricted to pollen, because no other generative or vegetative tissue contains transcripts hybridizing to NTPc303. Expression of NTP303 is evolutionarily conserved: homologous transcripts are present in pollen from various plant species. The first NTP303 transcripts are detectable on northern blot at the early bi-nucleate stage and accumulate until the pollen has reached maturity. During germination and pollen tube growth in vitro new NTP303 transcripts appear. This transcription has been proved by northern blots as well as by pulse labelling experiments. Nucleotide sequence analysis revealed that NTPc303 has an open reading frame coding for a predicted protein of 62 kDa. This protein shares homology to ascorbate oxidase and other members of the blue copper oxidase family. A possible function for this clone during pollen germination is discussed.

  7. Variable code gamma ray imaging system

    International Nuclear Information System (INIS)

    Macovski, A.; Rosenfeld, D.

    1979-01-01

    A gamma-ray source distribution in the body is imaged onto a detector using an array of apertures. The transmission of each aperture is modulated using a code such that the individual views of the source through each aperture can be decoded and separated. The codes are chosen to maximize the signal to noise ratio for each source distribution. These codes determine the photon collection efficiency of the aperture array. Planar arrays are used for volumetric reconstructions and circular arrays for cross-sectional reconstructions. 14 claims

  8. The IAEA code of conduct on the safety of radiation sources and the security of radioactive materials. A step forwards or backwards?

    International Nuclear Information System (INIS)

    Boustany, K.

    2001-01-01

    About the finalization of the Code of Conduct on the Safety and Security of radioactive Sources, it appeared that two distinct but interrelated subject areas have been identified: the prevention of accidents involving radiation sources and the prevention of theft or any other unauthorized use of radioactive materials. What analysis reveals is rather that there are gaps in both the content of the Code and the processes relating to it. Nevertheless, new standards have been introduced as a result of this exercise and have thus, as an enactment of what constitutes appropriate behaviour in the field of the safety and security of radioactive sources, emerged into the arena of international relations. (N.C.)

  9. Phosphoribosylpyrophosphate synthetase of Bacillus subtilis. Cloning, characterization and chromosomal mapping of the prs gene

    DEFF Research Database (Denmark)

    Nilsson, Dan; Hove-Jensen, Bjarne

    1987-01-01

    The gene (prs) encoding phosphoribosylpyrophosphate (PRPP) synthetase has been cloned from a library of Bacillus subtilis DNA by complementation of an Escherichia coli prs mutation. Flanking DNA sequences were pruned away by restriction endonuclease and exonuclease BAL 31 digestions, resulting...... in a DNA fragment of approx. 1.8 kb complementing the E. coli prs mutation. Minicell experiments revealed that this DNA fragment coded for a polypeptide, shown to be the PRPP synthetase subunit, with an Mr of approx. 40,000. B. subtilis strains harbouring the prs gene in a multicopy plasmid contained up...... to nine-fold increased PRPP synthetase activity. The prs gene was cloned in an integration vector and the resulting hybrid plasmid inserted into the B. subtilis chromosome by homologous recombination. The integration site was mapped by transduction and the gene order established as purA-guaA-prs-cysA....

  10. Skewed X-inactivation in cloned mice

    International Nuclear Information System (INIS)

    Senda, Sho; Wakayama, Teruhiko; Yamazaki, Yukiko; Ohgane, Jun; Hattori, Naka; Tanaka, Satoshi; Yanagimachi, Ryuzo; Shiota, Kunio

    2004-01-01

    In female mammals, dosage compensation for X-linked genes is accomplished by inactivation of one of two X chromosomes. The X-inactivation ratio (a percentage of the cells with inactivated maternal X chromosomes in the whole cells) is skewed as a consequence of various genetic mutations, and has been observed in a number of X-linked disorders. We previously reported that phenotypically normal full-term cloned mouse fetuses had loci with inappropriate DNA methylation. Thus, cloned mice are excellent models to study abnormal epigenetic events in mammalian development. In the present study, we analyzed X-inactivation ratios in adult female cloned mice (B6C3F1). Kidneys of eight naturally produced controls and 11 cloned mice were analyzed. Although variations in X-inactivation ratio among the mice were observed in both groups, the distributions were significantly different (Ansary-Bradley test, P < 0.01). In particular, 2 of 11 cloned mice showed skewed X-inactivation ratios (19.2% and 86.8%). Similarly, in intestine, 1 of 10 cloned mice had a skewed ratio (75.7%). Skewed X-inactivation was observed to various degrees in different tissues of different individuals, suggesting that skewed X-inactivation in cloned mice is the result of secondary cell selection in combination with stochastic distortion of primary choice. The present study is the first demonstration that skewed X-inactivation occurs in cloned animals. This finding is important for understanding both nuclear transfer technology and etiology of X-linked disorders

  11. Species-specific challenges in dog cloning.

    Science.gov (United States)

    Kim, G A; Oh, H J; Park, J E; Kim, M J; Park, E J; Jo, Y K; Jang, G; Kim, M K; Kim, H J; Lee, B C

    2012-12-01

    Somatic cell nuclear transfer (SCNT) is now an established procedure used in cloning of several species. SCNT in dogs involves multiple steps including the removal of the nuclear material, injection of a donor cell, fusion, activation of the reconstructed oocytes and finally transfer to a synchronized female recipient. There are therefore many factors that contribute to cloning efficiency. By performing a retrospective analysis of 2005-2012 published papers regarding dog cloning, we define the optimum procedure and summarize the specific feature for dog cloning. © 2012 Blackwell Verlag GmbH.

  12. SMILEI: A collaborative, open-source, multi-purpose PIC code for the next generation of super-computers

    Science.gov (United States)

    Grech, Mickael; Derouillat, J.; Beck, A.; Chiaramello, M.; Grassi, A.; Niel, F.; Perez, F.; Vinci, T.; Fle, M.; Aunai, N.; Dargent, J.; Plotnikov, I.; Bouchard, G.; Savoini, P.; Riconda, C.

    2016-10-01

    Over the last decades, Particle-In-Cell (PIC) codes have been central tools for plasma simulations. Today, new trends in High-Performance Computing (HPC) are emerging, dramatically changing HPC-relevant software design and putting some - if not most - legacy codes far beyond the level of performance expected on the new and future massively-parallel super computers. SMILEI is a new open-source PIC code co-developed by both plasma physicists and HPC specialists, and applied to a wide range of physics-related studies: from laser-plasma interaction to astrophysical plasmas. It benefits from an innovative parallelization strategy that relies on a super-domain-decomposition allowing for enhanced cache-use and efficient dynamic load balancing. Beyond these HPC-related developments, SMILEI also benefits from additional physics modules allowing to deal with binary collisions, field and collisional ionization and radiation back-reaction. This poster presents the SMILEI project, its HPC capabilities and illustrates some of the physics problems tackled with SMILEI.

  13. Study of the source term of radiation of the CDTN GE-PET trace 8 cyclotron with the MCNPX code

    Energy Technology Data Exchange (ETDEWEB)

    Benavente C, J. A.; Lacerda, M. A. S.; Fonseca, T. C. F.; Da Silva, T. A. [Centro de Desenvolvimento da Tecnologia Nuclear / CNEN, Av. Pte. Antonio Carlos 6627, 31270-901 Belo Horizonte, Minas Gerais (Brazil); Vega C, H. R., E-mail: jhonnybenavente@gmail.com [Universidad Autonoma de Zacatecas, Unidad Academica de Estudios Nucleares, Cipres No. 10, Fracc. La Penuela, 98068 Zacatecas, Zac. (Mexico)

    2015-10-15

    Full text: The knowledge of the neutron spectra in a PET cyclotron is important for the optimization of radiation protection of the workers and individuals of the public. The main objective of this work is to study the source term of radiation of the GE-PET trace 8 cyclotron of the Development Center of Nuclear Technology (CDTN/CNEN) using computer simulation by the Monte Carlo method. The MCNPX version 2.7 code was used to calculate the flux of neutrons produced from the interaction of the primary proton beam with the target body and other cyclotron components, during 18F production. The estimate of the source term and the corresponding radiation field was performed from the bombardment of a H{sub 2}{sup 18}O target with protons of 75 μA current and 16.5 MeV of energy. The values of the simulated fluxes were compared with those reported by the accelerator manufacturer (GE Health care Company). Results showed that the fluxes estimated with the MCNPX codes were about 70% lower than the reported by the manufacturer. The mean energies of the neutrons were also different of that reported by GE Health Care. It is recommended to investigate other cross sections data and the use of physical models of the code itself for a complete characterization of the source term of radiation. (Author)

  14. Assessment of the genetic diversity of natural rubber tree clones of the SINCHI Institutes clone collection, using of morphological descriptors

    International Nuclear Information System (INIS)

    Quesada Mendez, Isaac; Quintero Barrera, Lorena; Aristizabal, Fabio A; Rodriguez Acuna, Olga

    2011-01-01

    Genetic diversity of natural rubber clones of the in SINCHI Institute’s clone collection was assessed. Clones of Hevea brasiliensis (Willd. ex Adr. De Juss.) Muell.Arg., Hevea spp. (H. brasiliensis x H. benthamiana), and three more species of Hevea genus are a part of the collection. Seventy-two materials were characterized with twenty-eight morphological descriptors. They were later used to generate a similarity matrix through the analysis of multi-categorical variables, and to obtain clusters based on the matrix. A low variability between clones of H. brasiliensis and H. spp. was observed, presumably because of the direct descendants of most of the materials from crosses of parental PB 80, PB 5/51, PB 49 and Tjir, exception made of clone GU 1410. Clustering between some materials product of exclusive cross of PB series, a group between clones descendants of parental clones PB 86, and clustering between descendants of parental clones PB 5/51, were observed. Clones from other species of Hevea differ from this big group.

  15. Cloning goes to the movies A clonagem vai ao cinema

    Directory of Open Access Journals (Sweden)

    Craig Cormick

    2006-10-01

    Full Text Available Public attitude research conducted by Biotechnology Australia shows that one of the major sources of information on human reproductive cloning is movies. Traditionally, understanding of new and emerging technologies has come through the mass media but human cloning, being so widely addressed through the popular culture of movies, is more effectively defined by Hollywood than the news media or science media. But how well are the science and social issues of cloning portrayed in box office hits such as The Island, Multiplicity, Star Wars: Attack of the Clones and Jurassic Park? These movies have enormous reach and undoubted influence, and are therefore worth analyzing in some detail. This study looks at 33 movies made between 1971 and 2005 that address human reproductive cloning, and it categorizes the films based on their genre and potential influence. Yet rather than simply rating the quality of the science portrayed, the study compares the key messages in these movies with public attitudes towards cloning, to examine the correlations.Pesquisa de opinião pública conduzida pela Biotechnology Australia mostra que o cinema é uma das maiores fontes de informação sobre clonagem humana. Tradicionalmente, o conhecimento de tecnologias emergentes se dá através dos meios de comunicação, mas a clonagem humana, sendo tão amplamente difundida pela popular cultura cinematográfica, é definida por Hollywood de forma faz eficaz do que pelos noticiários ou publicações científicas. Mas como é que as questões sociais e científicas da clonagem são retratadas em sucessos de bilheteria como A Ilha, Multiplicidade, Guerra nas Estrelas: Ataque dos Clones e Parque dos Dinossauros? Esses filmes tiveram grande alcance e influência inquestionável e, portanto, merecem uma análise mais detalhada. O presente estudo examina 33 filmes sobre clonagem humana feitos entre 1971 e 2005 e classifica os filmes por gênero e potencial de influência. No entanto

  16. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  17. Unified universal quantum cloning machine and fidelities

    Energy Technology Data Exchange (ETDEWEB)

    Wang Yinan; Shi Handuo; Xiong Zhaoxi; Jing Li; Mu Liangzhu [School of Physics, Peking University, Beijing 100871 (China); Ren Xijun [School of Physics and Electronics, Henan University, Kaifeng 4750011 (China); Fan Heng [Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China)

    2011-09-15

    We present a unified universal quantum cloning machine, which combines several different existing universal cloning machines together, including the asymmetric case. In this unified framework, the identical pure states are projected equally into each copy initially constituted by input and one half of the maximally entangled states. We show explicitly that the output states of those universal cloning machines are the same. One importance of this unified cloning machine is that the cloning procession is always the symmetric projection, which reduces dramatically the difficulties for implementation. Also, it is found that this unified cloning machine can be directly modified to the general asymmetric case. Besides the global fidelity and the single-copy fidelity, we also present all possible arbitrary-copy fidelities.

  18. Analysis of source term aspects in the experiment Phebus FPT1 with the MELCOR and CFX codes

    Energy Technology Data Exchange (ETDEWEB)

    Martin-Fuertes, F. [Universidad Politecnica de Madrid, UPM, Nuclear Engineering Department, Jose Gutierrez Abascal 2, 28006 Madrid (Spain)]. E-mail: francisco.martinfuertes@upm.es; Barbero, R. [Universidad Politecnica de Madrid, UPM, Nuclear Engineering Department, Jose Gutierrez Abascal 2, 28006 Madrid (Spain); Martin-Valdepenas, J.M. [Universidad Politecnica de Madrid, UPM, Nuclear Engineering Department, Jose Gutierrez Abascal 2, 28006 Madrid (Spain); Jimenez, M.A. [Universidad Politecnica de Madrid, UPM, Nuclear Engineering Department, Jose Gutierrez Abascal 2, 28006 Madrid (Spain)

    2007-03-15

    Several aspects related to the source term in the Phebus FPT1 experiment have been analyzed with the help of MELCOR 1.8.5 and CFX 5.7 codes. Integral aspects covering circuit thermalhydraulics, fission product and structural material release, vapours and aerosol retention in the circuit and containment were studied with MELCOR, and the strong and weak points after comparison to experimental results are stated. Then, sensitivity calculations dealing with chemical speciation upon release, vertical line aerosol deposition and steam generator aerosol deposition were performed. Finally, detailed calculations concerning aerosol deposition in the steam generator tube are presented. They were obtained by means of an in-house code application, named COCOA, as well as with CFX computational fluid dynamics code, in which several models for aerosol deposition were implemented and tested, while the models themselves are discussed.

  19. Survival of Skin Graft between Transgenic Cloned Dogs and Non-Transgenic Cloned Dogs

    Science.gov (United States)

    Kim, Geon A; Oh, Hyun Ju; Kim, Min Jung; Jo, Young Kwang; Choi, Jin; Park, Jung Eun; Park, Eun Jung; Lim, Sang Hyun; Yoon, Byung Il; Kang, Sung Keun; Jang, Goo; Lee, Byeong Chun

    2014-01-01

    Whereas it has been assumed that genetically modified tissues or cells derived from somatic cell nuclear transfer (SCNT) should be accepted by a host of the same species, their immune compatibility has not been extensively explored. To identify acceptance of SCNT-derived cells or tissues, skin grafts were performed between cloned dogs that were identical except for their mitochondrial DNA (mtDNA) haplotypes and foreign gene. We showed here that differences in mtDNA haplotypes and genetic modification did not elicit immune responses in these dogs: 1) skin tissues from genetically-modified cloned dogs were successfully transplanted into genetically-modified cloned dogs with different mtDNA haplotype under three successive grafts over 63 days; and 2) non-transgenic cloned tissues were accepted into transgenic cloned syngeneic recipients with different mtDNA haplotypes and vice versa under two successive grafts over 63 days. In addition, expression of the inserted gene was maintained, being functional without eliciting graft rejection. In conclusion, these results show that transplanting genetically-modified tissues into normal, syngeneic or genetically-modified recipient dogs with different mtDNA haplotypes do not elicit skin graft rejection or affect expression of the inserted gene. Therefore, therapeutically valuable tissue derived from SCNT with genetic modification might be used safely in clinical applications for patients with diseased tissues. PMID:25372489

  20. Knowledge and attitudes toward human cloning in Israel.

    Science.gov (United States)

    Barnoy, Sivia; Ehrenfeld, Malka; Sharon, Rina; Tabak, Nili

    2006-04-01

    The success of mammal cloning in 1997 has brought the issue of human cloning into public discussion. Human cloning has several aspects and potential applications for use in both reproductive and non-reproductive matters. The aim of this study was to evaluate the knowledge and attitudes toward human cloning in Israel. Data from 120 respondents (68 health professionals and 52 non-health professionals), all Jewish, Hebrew speaking with at least 15 years of education each, were collected using two questionnaires that dealt with knowledge and attitudes toward human cloning. Results showed that although health professionals had significantly more knowledge that non-health professionals, all respondents had poor knowledge about cloning. No difference in attitudes was found between the groups. Most respondents opposed human cloning, but more positive attitudes toward non-reproductive cloning were found. The results are discussed in the context of the deficit model. The findings indicate a need to provide information about human cloning to allow people to form their attitudes based on factual knowledge.

  1. Cloning and cDNA sequence of the dihydrolipoamide dehydrogenase component of human α-ketoacid dehydrogenase complexes

    International Nuclear Information System (INIS)

    Pons, G.; Raefsky-Estrin, C.; Carothers, D.J.; Pepin, R.A.; Javed, A.A.; Jesse, B.W.; Ganapathi, M.K.; Samols, D.; Patel, M.S.

    1988-01-01

    cDNA clones comprising the entire coding region for human dihydrolipoamide dehydrogenase have been isolated from a human liver cDNA library. The cDNA sequence of the largest clone consisted of 2082 base pairs and contained a 1527-base open reading frame that encodes a precursor dihydrolipoamide dehydrogenase of 509 amino acid residues. The first 35-amino acid residues of the open reading frame probably correspond to a typical mitochondrial import leader sequence. The predicted amino acid sequence of the mature protein, starting at the residue number 36 of the open reading frame, is almost identical (>98% homology) with the known partial amino acid sequence of the pig heart dihydrolipoamide dehydrogenase. The cDNA clone also contains a 3' untranslated region of 505 bases with an unusual polyadenylylation signal (TATAAA) and a short poly(A) track. By blot-hybridization analysis with the cDNA as probe, two mRNAs, 2.2 and 2.4 kilobases in size, have been detected in human tissues and fibroblasts, whereas only one mRNA (2.4 kilobases) was detected in rat tissues

  2. Reproductive cloning combined with genetic modification.

    Science.gov (United States)

    Strong, C

    2005-11-01

    Although there is widespread opposition to reproductive cloning, some have argued that its use by infertile couples to have genetically related children would be ethically justifiable. Others have suggested that lesbian or gay couples might wish to use cloning to have genetically related children. Most of the main objections to human reproductive cloning are based on the child's lack of unique nuclear DNA. In the future, it may be possible safely to create children using cloning combined with genetic modifications, so that they have unique nuclear DNA. The genetic modifications could be aimed at giving such children genetic characteristics of both members of the couple concerned. Thus, cloning combined with genetic modification could be appealing to infertile, lesbian, or gay couples who seek genetically related children who have genetic characteristics of both members. In such scenarios, the various objections to human reproductive cloning that are based on the lack of genetic uniqueness would no longer be applicable. The author argues that it would be ethically justifiable for such couples to create children in this manner, assuming these techniques could be used safely.

  3. Human cloning and 'posthuman' society.

    Science.gov (United States)

    Blackford, Russell

    2005-01-01

    Since early 1997, when the creation of Dolly the sheep by somatic cell nuclear transfer was announced in Nature, numerous government reports, essays, articles and books have considered the ethical problems and policy issues surrounding human reproductive cloning. In this article, I consider what response a modern liberal society should give to the prospect of human cloning, if it became safe and practical. Some opponents of human cloning have argued that permitting it would place us on a slippery slope to a repugnant future society, comparable to that portrayed in Aldous Huxley's novel, Brave New World. I conclude that, leaving aside concerns about safety, none of the psychological or social considerations discussed in this article provides an adequate policy justification for invoking the state's coercive powers to prevent human cloning.

  4. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    Science.gov (United States)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  5. Gene cloning and heterologous expression of pyranose 2-oxidase from the brown-rot fungus, Gloeophyllum trabeum

    Science.gov (United States)

    Diane Dietrich; Casey Crooks

    2009-01-01

    A pyranose 2-oxidase gene from the brown-rot basidiomycete Gloeophyllum trabeum was isolated using homology-based degenerate PCR. The gene structure was determined and compared to that of several pyranose 2-oxidases cloned from white-rot fungi. The G. trabeum pyranose 2-oxidase gene consists of 16 coding exons with canonical promoter CAAT and TATA elements in the 5’UTR...

  6. Methodology and Toolset for Model Verification, Hardware/Software co-simulation, Performance Optimisation and Customisable Source-code generation

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Yu, Hao

    2013-01-01

    The MODUS project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. The MODUS tool will provide a model verification and Hardware/Software co-simulation tool (TRIAL) and a performance...... optimisation and customisable source-code generation tool (TUNE). The concept is depicted in automated modelling and optimisation of embedded-systems development. The tool will enable model verification by guiding the selection of existing open-source model verification engines, based on the automated analysis...

  7. Cloning of a glutathione S-transferase decreasing during differentiation of HL60 cell line

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae Chul; Park, In Kyu; Lee, Kyu Bo; Sohn, Sang Kyun; Kim, Moo Kyu; Kim, Jung Chul [College of Medicine, Kyungpook National Univ., Taegu (Korea, Republic of)

    1999-06-01

    By sequencing the Expressed Sequence Tags of human dermal papilla cDNA library, we identified a clone named K872 of which the expression decreased during differentiation of HL60 cell line. K872 plasmid DNA was isolated according to QIA plasmid extraction kit (Qiagen GmbH, Germany). The nucleotide sequencing was performed by Sanger's method with K872 plasmid DNA. The most updated GenBank EMBL necleic acid banks were searched through the internet by using BLAST (Basic Local Alignment Search Tools) program. Northern bots were performed using RNA isolated from various human tissues and cancer cell lines. The gene expression of the fusion protein was achieved by His-Patch Thiofusion expression system and the protein product was identified on SDS-PAGE. K872 clone is 1006 nucleotides long, and has a coding region of 675 nucleotides and a 3' non-coding region of 280 nucleotides. The presumed open reading frame starting at the 5' terminus of K872 encodes 226 amino acids, including the initiation methionine residue. The amino acid sequence deduced from the open reading frame of K872 shares 70% identity with that of rat glutathione S-transferase kappa 1 (rGSTK1). The transcripts were expressed inh a variety of human tissues and cancer cells. The levels of transcript were relatively high in those tissues such as heart, skeletal muscle, and peripheral blood leukocyte. It is noteworthy that K872 was found to be abundantly expressed in colorectal cancer and melanoma cell lines. Homology search result suggests that K872 clone is the human homolog of the rGSTK1 which is known to be involved in the resistance of cytotoxic therapy. We propose that meticulous functional analysis should be followed to confirm that.

  8. U.S. consumers attitudes toward farm animal cloning.

    Science.gov (United States)

    Brooks, Kathleen R; Lusk, Jayson L

    2011-10-01

    In January 2008, the United States Food and Drug Administration concluded "meat and milk from cattle, swine, and goat clones or their offspring are as safe to eat as food we eat from those species now" (U.S. FDA, 2010). However, cloning remains a very controversial topic. A web-based survey administered by Knowledge Networks was used to determine U.S. consumers' awareness of and attitudes toward meat and milk from cloned cattle. Findings reveal consumers do not differentiate much between products from cloned animals and products from non-cloned animals. Overall consumers are concerned that animal cloning is an unnatural process and that it will lead to human cloning. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. Somatic embryogenesis and plant regeneration in elite clones of Theobroma cacao Embriogênese somática e regeneração in vitro de clones elite de Theobroma cacao

    Directory of Open Access Journals (Sweden)

    Thiago Édson Ribeiro da Silva

    2008-10-01

    Full Text Available The objective of this work was to evaluated a procedure for somatic embryogenesis and regeneration of cacao (Theobroma cacao L. elite clones. Petal explants from cacao clones TSH 565 and TSH 1188 were cultured on PCG and SCG-2 media, for calli growth. Somatic embryos were formed on the surface of embryogenic calli after transfer to embryo development (ED medium. Clone TSH 565 showed a higher embryogenic potential than TSH 1188. The best combination of carbon source for embryo induction in ED medium was genotype-specific. Embryogenic callus formations increased in micropore tape-sealed Petri dishes, irrespective of cacao genotype. Mature somatic embryos were successfully converted into plantlets.O objetivo deste trabalho foi avaliar um procedimento para embriogênese somática e regeneração de clones elite de cacau. Pétalas dos clones de cacau TSH 565 e TSH 1188 foram cultivadas em meios PCG e SCG-2 para o crescimento de calos. Embriões somáticos desenvolveram-se na superfície dos calos embriogênicos, após a transferência para o meio ED. O clone TSH 565 apresentou maior potencial embriogênico do que o TSH 1188. A melhor combinação de fonte de carbono quanto à indução de embriões em meio ED foi específica do genótipo. A formação de calos embriogênicos foi superior em placas de Petri seladas com fita hipoalergênica, independentemente do genótipo. Embriões maduros de ambos os genótipos foram convertidos em plântulas.

  10. Local circulating clones of Staphylococcus aureus in Ecuador.

    Science.gov (United States)

    Zurita, Jeannete; Barba, Pedro; Ortega-Paredes, David; Mora, Marcelo; Rivadeneira, Sebastián

    The spread of pandemic Staphylococcus aureus clones, mainly methicillin-resistant S. aureus (MRSA), must be kept under surveillance to assemble an accurate, local epidemiological analysis. In Ecuador, the prevalence of the USA300 Latin American variant clone (USA300-LV) is well known; however, there is little information about other circulating clones. The aim of this work was to identify the sequence types (ST) using a Multiple-Locus Variable number tandem repeat Analysis 14-locus genotyping approach. We analyzed 132 S. aureus strains that were recovered from 2005 to 2013 and isolated in several clinical settings in Quito, Ecuador. MRSA isolates composed 46.97% (62/132) of the study population. Within MRSA, 37 isolates were related to the USA300-LV clone (ST8-MRSA-IV, Panton-Valentine Leukocidin [PVL] +) and 10 were related to the Brazilian clone (ST239-MRSA-III, PVL-). Additionally, two isolates (ST5-MRSA-II, PVL-) were related to the New York/Japan clone. One isolate was related to the Pediatric clone (ST5-MRSA-IV, PVL-), one isolate (ST45-MRSA-II, PVL-) was related to the USA600 clone, and one (ST22-MRSA-IV, PVL-) was related to the epidemic UK-EMRSA-15 clone. Moreover, the most prevalent MSSA sequence types were ST8 (11 isolates), ST45 (8 isolates), ST30 (8 isolates), ST5 (7 isolates) and ST22 (6 isolates). Additionally, we found one isolate that was related to the livestock associated S. aureus clone ST398. We conclude that in addition to the high prevalence of clone LV-ST8-MRSA-IV, other epidemic clones are circulating in Quito, such as the Brazilian, Pediatric and New York/Japan clones. The USA600 and UK-EMRSA-15 clones, which were not previously described in Ecuador, were also found. Moreover, we found evidence of the presence of the livestock associated clone ST398 in a hospital environment. Copyright © 2016 Sociedade Brasileira de Infectologia. Published by Elsevier Editora Ltda. All rights reserved.

  11. PRIMUS: a computer code for the preparation of radionuclide ingrowth matrices from user-specified sources

    International Nuclear Information System (INIS)

    Hermann, O.W.; Baes, C.F. III; Miller, C.W.; Begovich, C.L.; Sjoreen, A.L.

    1984-10-01

    The computer program, PRIMUS, reads a library of radionuclide branching fractions and half-lives and constructs a decay-chain data library and a problem-specific decay-chain data file. PRIMUS reads the decay data compiled for 496 nuclides from the Evaluated Nuclear Structure Data File (ENSDF). The ease of adding radionuclides to the input library allows the CRRIS system to further expand its comprehensive data base. The decay-chain library produced is input to the ANEMOS code. Also, PRIMUS produces a data set reduced to only the decay chains required in a particular problem, for input to the SUMIT, TERRA, MLSOIL, and ANDROS codes. Air concentrations and deposition rates from the PRIMUS decay-chain data file. Source term data may be entered directly to PRIMUS to be read by MLSOIL, TERRA, and ANDROS. The decay-chain data prepared by PRIMUS is needed for a matrix-operator method that computes either time-dependent decay products from an initial concentration generated from a constant input source. This document describes the input requirements and the output obtained. Also, sections are included on methods, applications, subroutines, and sample cases. A short appendix indicates a method of utilizing PRIMUS and the associated decay subroutines from TERRA or ANDROS for applications to other decay problems. 18 references

  12. Local cloning of entangled states

    International Nuclear Information System (INIS)

    Gheorghiu, Vlad; Yu Li; Cohen, Scott M.

    2010-01-01

    We investigate the conditions under which a set S of pure bipartite quantum states on a DxD system can be locally cloned deterministically by separable operations, when at least one of the states is full Schmidt rank. We allow for the possibility of cloning using a resource state that is less than maximally entangled. Our results include that: (i) all states in S must be full Schmidt rank and equally entangled under the G-concurrence measure, and (ii) the set S can be extended to a larger clonable set generated by a finite group G of order |G|=N, the number of states in the larger set. It is then shown that any local cloning apparatus is capable of cloning a number of states that divides D exactly. We provide a complete solution for two central problems in local cloning, giving necessary and sufficient conditions for (i) when a set of maximally entangled states can be locally cloned, valid for all D; and (ii) local cloning of entangled qubit states with nonvanishing entanglement. In both of these cases, we show that a maximally entangled resource is necessary and sufficient, and the states must be related to each other by local unitary 'shift' operations. These shifts are determined by the group structure, so need not be simple cyclic permutations. Assuming this shifted form and partially entangled states, then in D=3 we show that a maximally entangled resource is again necessary and sufficient, while for higher-dimensional systems, we find that the resource state must be strictly more entangled than the states in S. All of our necessary conditions for separable operations are also necessary conditions for local operations and classical communication (LOCC), since the latter is a proper subset of the former. In fact, all our results hold for LOCC, as our sufficient conditions are demonstrated for LOCC, directly.

  13. Quantum cloning of mixed states in symmetric subspaces

    International Nuclear Information System (INIS)

    Fan Heng

    2003-01-01

    Quantum-cloning machine for arbitrary mixed states in symmetric subspaces is proposed. This quantum-cloning machine can be used to copy part of the output state of another quantum-cloning machine and is useful in quantum computation and quantum information. The shrinking factor of this quantum cloning achieves the well-known upper bound. When the input is identical pure states, two different fidelities of this cloning machine are optimal

  14. Cloning of a quantum measurement

    International Nuclear Information System (INIS)

    Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Sedlak, Michal

    2011-01-01

    We analyze quantum algorithms for cloning of a quantum measurement. Our aim is to mimic two uses of a device performing an unknown von Neumann measurement with a single use of the device. When the unknown device has to be used before the bipartite state to be measured is available we talk about 1→2 learning of the measurement, otherwise the task is called 1→2 cloning of a measurement. We perform the optimization for both learning and cloning for arbitrary dimension d of the Hilbert space. For 1→2 cloning we also propose a simple quantum network that achieves the optimal fidelity. The optimal fidelity for 1→2 learning just slightly outperforms the estimate and prepare strategy in which one first estimates the unknown measurement and depending on the result suitably prepares the duplicate.

  15. Cloning of a quantum measurement

    Energy Technology Data Exchange (ETDEWEB)

    Bisio, Alessandro; D' Ariano, Giacomo Mauro; Perinotti, Paolo; Sedlak, Michal [QUIT Group, Dipartimento di Fisica ' ' A. Volta' ' and INFN, via Bassi 6, I-27100 Pavia (Italy); QUIT Group, Dipartimento di Fisica ' ' A. Volta' ' via Bassi 6, I-27100 Pavia (Italy) and Institute of Physics, Slovak Academy of Sciences, Dubravska cesta 9, SK-845 11 Bratislava (Slovakia)

    2011-10-15

    We analyze quantum algorithms for cloning of a quantum measurement. Our aim is to mimic two uses of a device performing an unknown von Neumann measurement with a single use of the device. When the unknown device has to be used before the bipartite state to be measured is available we talk about 1{yields}2 learning of the measurement, otherwise the task is called 1{yields}2 cloning of a measurement. We perform the optimization for both learning and cloning for arbitrary dimension d of the Hilbert space. For 1{yields}2 cloning we also propose a simple quantum network that achieves the optimal fidelity. The optimal fidelity for 1{yields}2 learning just slightly outperforms the estimate and prepare strategy in which one first estimates the unknown measurement and depending on the result suitably prepares the duplicate.

  16. Intraclonal genome diversity of Pseudomonas aeruginosa clones CHA and TB

    Science.gov (United States)

    2013-01-01

    Background Adaptation of Pseudomonas aeruginosa to different living conditions is accompanied by microevolution resulting in genomic diversity between strains of the same clonal lineage. In order to detect the impact of colonized habitats on P. aeruginosa microevolution we determined the genomic diversity between the highly virulent cystic fibrosis (CF) isolate CHA and two temporally and geographically unrelated clonal variants. The outcome was compared with the intraclonal genome diversity between three more closely related isolates of another clonal complex. Results The three clone CHA isolates differed in their core genome in several dozen strain specific nucleotide exchanges and small deletions from each other. Loss of function mutations and non-conservative amino acid replacements affected several habitat- and lifestyle-associated traits, for example, the key regulator GacS of the switch between acute and chronic disease phenotypes was disrupted in strain CHA. Intraclonal genome diversity manifested in an individual composition of the respective accessory genome whereby the highest number of accessory DNA elements was observed for isolate PT22 from a polluted aquatic habitat. Little intraclonal diversity was observed between three spatiotemporally related outbreak isolates of clone TB. Although phenotypically different, only a few individual SNPs and deletions were detected in the clone TB isolates. Their accessory genome mainly differed in prophage-like DNA elements taken up by one of the strains. Conclusions The higher geographical and temporal distance of the clone CHA isolates was associated with an increased intraclonal genome diversity compared to the more closely related clone TB isolates derived from a common source demonstrating the impact of habitat adaptation on the microevolution of P. aeruginosa. However, even short-term habitat differentiation can cause major phenotypic diversification driven by single genomic variation events and uptake of phage

  17. Human embryo cloning prohibited in Hong Kong.

    Science.gov (United States)

    Liu, Athena

    2005-12-01

    Since the birth of Dolly (the cloned sheep) in 1997, debates have arisen on the ethical and legal questions of cloning-for-biomedical-research (more commonly termed "therapeutic cloning") and of reproductive cloning using human gametes. Hong Kong enacted the Human Reproductive Technology Ordinance (Cap 561) in 2000. Section 15(1)(e) of this Ordinance prohibits the "replacing of the nucleus of a cell of an embryo with a nucleus taken from any other cell," i.e., nucleus substitution. Section 15(1)(f) prohibits the cloning of any embryo. The scope of the latter, therefore, is arguably the widest, prohibiting all cloning techniques such as cell nucleus replacement, embryo splitting, parthenogenesis, and cloning using stem cell lines. Although the Human Reproductive Technology Ordinance is not yet fully operative, this article examines how these prohibitions may adversely impact on basic research and the vision of the Hong Kong scientific community. It concludes that in light of recent scientific developments, it is time to review if the law offers a coherent set of policies in this area.

  18. Multiple-clone activation of hypnozoites is the leading cause of relapse in Plasmodium vivax infection.

    Directory of Open Access Journals (Sweden)

    Flávia Carolina F de Araujo

    Full Text Available BACKGROUND: Plasmodium vivax infection is characterized by a dormant hepatic stage, the hypnozoite that is activated at varying periods of time after clearance of the primary acute blood-stage, resulting in relapse. Differentiation between treatment failure and new infections requires characterization of initial infections, relapses, and clone multiplicity in vivax malaria infections. METHODOLOGY/PRINCIPAL FINDINGS: Parasite DNA obtained from primary/relapse paired blood samples of 30 patients with P. vivax infection in Brazil was analyzed using 10 molecular markers (8 microsatellites and MSP-1 blocks 2 and 10. Cloning of PCR products and genotyping was used to identify low-frequency clones of parasites. We demonstrated a high frequency of multiple-clone infections in both primary and relapse infections. Few alleles were identified per locus, but the combination of these alleles produced many haplotypes. Consequently, the majority of parasites involved in relapse showed haplotypes that were distinct from those of primary infections. Plasmodium vivax relapse was characterized by temporal variations in the predominant parasite clones. CONCLUSIONS/SIGNIFICANCE: The high rate of low frequency alleles observed in both primary and relapse infections, along with temporal variation in the predominant alleles, might be the source of reported heterologous hypnozoite activation. Our findings complicate the concept of heterologous activation, suggesting the involvement of undetermined mechanisms based on host or environmental factors in the simultaneous activation of multiple clones of hypnozoites.

  19. Cloning the entanglement of a pair of quantum bits

    International Nuclear Information System (INIS)

    Lamoureux, Louis-Philippe; Navez, Patrick; Cerf, Nicolas J.; Fiurasek, Jaromir

    2004-01-01

    It is shown that any quantum operation that perfectly clones the entanglement of all maximally entangled qubit pairs cannot preserve separability. This 'entanglement no-cloning' principle naturally suggests that some approximate cloning of entanglement is nevertheless allowed by quantum mechanics. We investigate a separability-preserving optimal cloning machine that duplicates all maximally entangled states of two qubits, resulting in 0.285 bits of entanglement per clone, while a local cloning machine only yields 0.060 bits of entanglement per clone

  20. BLT [Breach, Leach, and Transport]: A source term computer code for low-level waste shallow land burial

    International Nuclear Information System (INIS)

    Suen, C.J.; Sullivan, T.M.

    1990-01-01

    This paper discusses the development of a source term model for low-level waste shallow land burial facilities and separates the problem into four individual compartments. These are water flow, corrosion and subsequent breaching of containers, leaching of the waste forms, and solute transport. For the first and the last compartments, we adopted the existing codes, FEMWATER and FEMWASTE, respectively. We wrote two new modules for the other two compartments in the form of two separate Fortran subroutines -- BREACH and LEACH. They were incorporated into a modified version of the transport code FEMWASTE. The resultant code, which contains all three modules of container breaching, waste form leaching, and solute transport, was renamed BLT (for Breach, Leach, and Transport). This paper summarizes the overall program structure and logistics, and presents two examples from the results of verification and sensitivity tests. 6 refs., 7 figs., 1 tab

  1. DNA cloning: a practical approach. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Glover, D M [ed.

    1985-01-01

    This book is written for the advanced molecular biologist who needs a detailed discussion of cloning technology. Topics of discussion include: genomic library cloning (size of a genomic library, screening methods, chromosome walking, host cell genetics, and general features of bacteriophage Iambda); use of gt10 and gt11 cDNA lambda vectors and general cDNA cloning; RNase H-Pol I cDNA synthesis; method of detecting fusion proteins produced in bacteria; pEMBL family of double-stranded plasmid vectors that can be used to generate single strands; Escherichia coli transformation; production of mutations in cloned sequences; and cloning in gram negative bacteria.

  2. Molecular cloning of cDNAs of human liver and placenta NADH-cytochrome b5 reductase

    International Nuclear Information System (INIS)

    Yubisui, T.; Naitoh, Y.; Zenno, S.; Tamura, M.; Takeshita, M.; Sakaki, Y.

    1987-01-01

    A cDNA coding for human liver NADH-cytochrome b 5 reductase was cloned from a human liver cDNA library constructed in phage λgt11. The library was screened by using an affinity-purified rabbit antibody against NADH-cytochrome b 5 reductase of human erythrocytes. A cDNA about 1.3 kilobase pairs long was isolated. By using the cDNA as a probe, another cDNA (pb 5 R141) of 1817 base pairs was isolated that hybridized with a synthetic oligonucleotide encoding Pro-Asp-Ile-Lys-Tyr-Pro, derived from the amino acid sequence at the amino-terminal region of the enzyme from human erythrocytes. Furthermore, by using the pb 5 R141 as a probe, cDNA clones having more 5' sequence were isolated from a human placenta cDNA library. The amino acid sequences deduced from the nucleotide sequences of these cDNA clones overlapped each other and consisted of a sequence that completely coincides with that of human erythrocytes and a sequence of 19 amino acid residues extended at the amino-terminal side. The latter sequence closely resembles that of the membrane-binding domain of steer liver microsomal enzyme

  3. Human cloning: Eastern Mediterranean Region perspective.

    Science.gov (United States)

    Abdur Rab, M; Khayat, M H

    2006-01-01

    Recent advances in genomics and biotechnology have ushered in a new era in health development. Therapeutic cloning possesses enormous potential for revolutionizing medical and therapeutic techniques. Cloning technology, however, is perceived as having the potential for reproductive cloning, which raises serious ethical and moral concerns. It is important that the Islamic countries come to a consensus on this vital issue. Developing science and technology for better health is a religious and moral obligation. There is an urgent need for Muslim scholars to discuss the issue of stem cell research and cloning rationally; such dialogue will not only consider the scientific merits but also the moral, ethical and legal implications.

  4. Evaluation of Quantitative and Qualitative Traits of 18 Potato Clones

    Directory of Open Access Journals (Sweden)

    A. R Bolandi

    2016-10-01

    Full Text Available Introduction Introducing potato cultivars with high yield, early maturing and desirable quality have a key role in food security, decreasing the fluctuation of the price and the store costs and also providing fresh crops throughout the year. Potato (Solanum tuberosum L. plant is one of leading agricultural products in the world with 365 million ton glands in year stands in fourth place after wheat, rice and corn. The main objective of the breeding program is yield. Increase in plant yield in the past due to the gradual elimination of defects visible by experts and today the new criteria for selection are based on principles of morphological and functional characteristics associated with the plant. Variety is one of the effective factors on plant growth and development on potato that yields components of potato is heavily dependent on it. Yield increasing in each variety affect the genetic and natural structure of variety. Nine clones of Solanum tuberosum L. cv. Kennebec from sources in Victoria, South Australia and Tasmania, and the commercially grown clone, clone 1, which was imported from Vancouver, were multiplied from pathogen-tested seed and compared in 3 Victorian potato districts during 2 seasons. The results showed that differences exist in total and size grade yield and tuber number and appearance between clones of a cultivar. They further highlight the importance of selection work to maintain desirable characteristics of established cultivars and to remove mutants with undesirable characteristics. The results of the study, Hassanpanah and Hassanabadi (2012 showed that the clones 397003-7, 396151-27, 397045-100 and Savalan (check produced higher total and marketable tuber yield, tuber number and weight per plant, plant height, main stem number per plant, tuber size average and stable tuber yield. These clones produced high and mid-uniform tuber, tuber inner crack and tuber inner ring, mid-late maturity and mid and high dry in comparison

  5. Transparent ICD and DRG coding using information technology: linking and associating information sources with the eXtensible Markup Language.

    Science.gov (United States)

    Hoelzer, Simon; Schweiger, Ralf K; Dudeck, Joachim

    2003-01-01

    With the introduction of ICD-10 as the standard for diagnostics, it becomes necessary to develop an electronic representation of its complete content, inherent semantics, and coding rules. The authors' design relates to the current efforts by the CEN/TC 251 to establish a European standard for hierarchical classification systems in health care. The authors have developed an electronic representation of ICD-10 with the eXtensible Markup Language (XML) that facilitates integration into current information systems and coding software, taking different languages and versions into account. In this context, XML provides a complete processing framework of related technologies and standard tools that helps develop interoperable applications. XML provides semantic markup. It allows domain-specific definition of tags and hierarchical document structure. The idea of linking and thus combining information from different sources is a valuable feature of XML. In addition, XML topic maps are used to describe relationships between different sources, or "semantically associated" parts of these sources. The issue of achieving a standardized medical vocabulary becomes more and more important with the stepwise implementation of diagnostically related groups, for example. The aim of the authors' work is to provide a transparent and open infrastructure that can be used to support clinical coding and to develop further software applications. The authors are assuming that a comprehensive representation of the content, structure, inherent semantics, and layout of medical classification systems can be achieved through a document-oriented approach.

  6. Radiation-induced aneusomic clones in bone marrow of rats

    International Nuclear Information System (INIS)

    Kohno, Sei-Ichi; Ishihara, Takaaki

    1976-01-01

    Wistar rats 3 months old were given a single whole-body X-irradiation with 700 R. They were killed 9.3 months, on average, after irradiation. From the bone marrows of the 23 irradiated rats, 54 clones of cells with radiation-induced chromosome abnormalities ranging from 3.3 to 78.3% in size were obtained. Karyotype analysis at the banding level showed that 43 out of the 54 clones had balanced chromosome constitutions and that the remaining 11 clones were unbalanced. The 43 balanced clones consisted of 33 clones with reciprocal translocations, 6 with inversions and 4 with both translocations and inversions. The 11 unbalanced clones were made up of 7 aneuploid clones and 4 pseudo-diploid clones. Of the 54 clones, 15 were large with frequencies of more than 25%. Contrary to general belief that cells with unbalanced chromosome constitutions have less capacity to proliferate than those with balanced ones, 8 of the 15 large clones, especially all, except 1, of the largest 6 clones were unbalanced, either aneuploid or pseudo-diploid

  7. [Cloning, expression and transcriptional analysis of biotin carboxyl carrier protein gene (accA) from Amycolatopsis mediterranei U32 ].

    Science.gov (United States)

    Lu, Jie; Yao, Yufeng; Jiang, Weihong; Jiao, Ruishen

    2003-02-01

    Acetyl CoA carboxylase (EC 6.4.1.2, ACC) catalyzes the ATP-dependent carboxylation of acetyl CoA to yield malonyl CoA, which is the first committed step in fatty acid synthesis. A pair of degenerate PCR primers were designed according to the conserved amino acid sequence of AccA from M. tuberculosis and S. coelicolor. The product of the PCR amplification, a DNA fragment of 250bp was used as a probe for screening the U32 genomic cosmid library and its gene, accA, coding the biotinylated protein subunit of acetyl CoA carboxylase, was successfully cloned from U32. The accA ORF encodes a 598-amino-acid protein with the calculated molecular mass of 63.7kD, with 70.1% of G + C content. A typical Streptomyces RBS sequence, AGGAGG, was found at the - 6 position upstream of the start codon GTG. Analysis of the deduced amino acid sequence showed the presence of biotin-binding site and putative ATP-bicarbonate interaction region, which suggested the U32 AccA may act as a biotin carboxylase as well as a biotin carrier protein. Gene accA was then cloned into the pET28 (b) vector and expressed solubly in E. coli BL21 (DE3) by 0.1 mmol/L IPTG induction. Western blot confirmed the covalent binding of biotin with AccA. Northern blot analyzed transcriptional regulation of accA by 5 different nitrogen sources.

  8. Version 4. 00 of the MINTEQ geochemical code

    Energy Technology Data Exchange (ETDEWEB)

    Eary, L.E.; Jenne, E.A.

    1992-09-01

    The MINTEQ code is a thermodynamic model that can be used to calculate solution equilibria for geochemical applications. Included in the MINTEQ code are formulations for ionic speciation, ion exchange, adsorption, solubility, redox, gas-phase equilibria, and the dissolution of finite amounts of specified solids. Since the initial development of the MINTEQ geochemical code, a number of undocumented versions of the source code and data files have come into use at the Pacific Northwest Laboratory (PNL). This report documents these changes, describes source code modifications made for the Aquifer Thermal Energy Storage (ATES) program, and provides comprehensive listings of the data files. A version number of 4.00 has been assigned to the MINTEQ source code and the individual data files described in this report.

  9. Version 4.00 of the MINTEQ geochemical code

    Energy Technology Data Exchange (ETDEWEB)

    Eary, L.E.; Jenne, E.A.

    1992-09-01

    The MINTEQ code is a thermodynamic model that can be used to calculate solution equilibria for geochemical applications. Included in the MINTEQ code are formulations for ionic speciation, ion exchange, adsorption, solubility, redox, gas-phase equilibria, and the dissolution of finite amounts of specified solids. Since the initial development of the MINTEQ geochemical code, a number of undocumented versions of the source code and data files have come into use at the Pacific Northwest Laboratory (PNL). This report documents these changes, describes source code modifications made for the Aquifer Thermal Energy Storage (ATES) program, and provides comprehensive listings of the data files. A version number of 4.00 has been assigned to the MINTEQ source code and the individual data files described in this report.

  10. Cloning and expression of the receptor for human urokinase plasminogen activator, a central molecule in cell surface, plasmin dependent proteolysis

    DEFF Research Database (Denmark)

    Roldan, A.L.; Cubellis, M.V.; Masucci, M.T.

    1990-01-01

    , and therefore the capacity of cells to migrate and invade neighboring tissues. We have isolated a 1.4 kb cDNA clone coding for the entire human uPAR. An oligonucleotide synthesized on the basis of the N-terminal sequence of the purified protein was used to screen a cDNA library made from SV40 transformed human......, a size very close to that of the cloned cDNA. Expression of the uPAR cDNA in mouse cells confirms that the clone is complete and expresses a functional uPA binding protein, located on the cell surface and with properties similar to the human uPAR. Caseinolytic plaque assay, immunofluorescence analysis......The surface receptor for urokinase plasminogen activator (uPAR) has been recognized in recent years as a key molecule in regulating plasminogen mediated extracellular proteolysis. Surface plasminogen activation controls the connections between cells, basement membrane and extracellular matrix...

  11. Human Cloning

    National Research Council Canada - National Science Library

    Johnson, Judith A; Williams, Erin D

    2006-01-01

    .... Scientists in other labs, including Harvard University and the University of California at San Francisco, intend to produce cloned human embryos in order to derive stem cells for medical research...

  12. Human placental Na+, K+-ATPase α subunit: cDNA cloning, tissue expression, DNA polymorphism, and chromosomal localization

    International Nuclear Information System (INIS)

    Chehab, F.F.; Kan, Y.W.; Law, M.L.; Hartz, J.; Kao, F.T.; Blostein, R.

    1987-01-01

    A 2.2-kilobase clone comprising a major portion of the coding sequence of the Na + , K + -ATPase α subunit was cloned from human placenta and its sequence was identical to that encoding the α subunit of human kidney and HeLa cells. Transfer blot analysis of the mRNA products of the Na + , K + -ATPase gene from various human tissues and cell lines revealed only one band (≅ 4.7 kilobases) under low and high stringency washing conditions. The levels of expression in the tissues were intestine > placenta > liver > pancreas, and in the cell lines the levels were human erythroleukemia > butyrate-induced colon > colon > brain > HeLa cells. mRNA was undetectable in reticulocytes, consistent with the authors failure to detect positive clones in a size-selected ( > 2 kilobases) λgt11 reticulocyte cDNA library. DNA analysis revealed by a polymorphic EcoRI band and chromosome localization by flow sorting and in situ hybridization showed that the α subunit is on the short is on the short arm (band p11-p13) of chromosome 1

  13. Network coding for multi-resolution multicast

    DEFF Research Database (Denmark)

    2013-01-01

    A method, apparatus and computer program product for utilizing network coding for multi-resolution multicast is presented. A network source partitions source content into a base layer and one or more refinement layers. The network source receives a respective one or more push-back messages from one...... or more network destination receivers, the push-back messages identifying the one or more refinement layers suited for each one of the one or more network destination receivers. The network source computes a network code involving the base layer and the one or more refinement layers for at least one...... of the one or more network destination receivers, and transmits the network code to the one or more network destination receivers in accordance with the push-back messages....

  14. "Goodbye Dolly?" The ethics of human cloning.

    Science.gov (United States)

    Harris, J

    1997-01-01

    The ethical implications of human clones have been much alluded to, but have seldom been examined with any rigour. This paper examines the possible uses and abuses of human cloning and draws out the principal ethical dimensions, both of what might be done and its meaning. The paper examines some of the major public and official responses to cloning by authorities such as President Clinton, the World Health Organisation, the European parliament, UNESCO, and others and reveals their inadequacies as foundations for a coherent public policy on human cloning. The paper ends by defending a conception of reproductive rights of "procreative autonomy" which shows human cloning to be not inconsistent with human rights and dignity. PMID:9451604

  15. Chorioallantoic placenta defects in cloned mice

    International Nuclear Information System (INIS)

    Wakisaka-Saito, Noriko; Kohda, Takashi; Inoue, Kimiko; Ogonuki, Narumi; Miki, Hiromi; Hikichi, Takafusa; Mizutani, Eiji; Wakayama, Teruhiko; Kaneko-Ishino, Tomoko; Ogura, Atsuo; Ishino, Fumitoshi

    2006-01-01

    Somatic cell nuclear transfer technology has been applied to produce live clones successfully in several mammalian species, but the success rates are very low. In mice, about half of the nuclear transfer embryos undergo implantation, but very few survive to term. We undertook detailed histological analyses of placentas from cloned mouse embryos generated from cumulus cells at 10.5 dpc of pregnancy, by which stage most clones have terminated their development. At 10.5 dpc, the extraembryonic tissues displayed several defined histological patterns, each reflecting their stage of developmental arrest. The most notable abnormality was the poor development of the spongiotrophoblast layer of diploid cells. This is in contrast to the placental hyperplasia frequently observed in somatic clones at 12.5 dpc or later stages. A variety of structural abnormalities were also observed in the embryos. Both placental and embryonic defects likely contribute to the low success rate of the mouse clones

  16. Pre-Test Analysis of the MEGAPIE Spallation Source Target Cooling Loop Using the TRAC/AAA Code

    International Nuclear Information System (INIS)

    Bubelis, Evaldas; Coddington, Paul; Leung, Waihung

    2006-01-01

    A pilot project is being undertaken at the Paul Scherrer Institute in Switzerland to test the feasibility of installing a Lead-Bismuth Eutectic (LBE) spallation target in the SINQ facility. Efforts are coordinated under the MEGAPIE project, the main objectives of which are to design, build, operate and decommission a 1 MW spallation neutron source. The technology and experience of building and operating a high power spallation target are of general interest in the design of an Accelerator Driven System (ADS) and in this context MEGAPIE is one of the key experiments. The target cooling is one of the important aspects of the target system design that needs to be studied in detail. Calculations were performed previously using the RELAP5/Mod 3.2.2 and ATHLET codes, but in order to verify the previous code results and to provide another capability to model LBE systems, a similar study of the MEGAPIE target cooling system has been conducted with the TRAC/AAA code. In this paper a comparison is presented for the steady-state results obtained using the above codes. Analysis of transients, such as unregulated cooling of the target, loss of heat sink, the main electro-magnetic pump trip of the LBE loop and unprotected proton beam trip, were studied with TRAC/AAA and compared to those obtained earlier using RELAP5/Mod 3.2.2. This work extends the existing validation data-base of TRAC/AAA to heavy liquid metal systems and comprises the first part of the TRAC/AAA code validation study for LBE systems based on data from the MEGAPIE test facility and corresponding inter-code comparisons. (authors)

  17. Public perceptions of farm animal cloning in Europe

    DEFF Research Database (Denmark)

    Lassen, Jesper

    This report presents a picture of European opinion on farm animal cloning. In the report, both agricultural and biomedical applications of farm animal cloning are considered. With the arrival of Dolly, animal cloning became an integral part of the biotech debate, but this debate did not isolate...... animal cloning as a single issue....

  18. A progressive data compression scheme based upon adaptive transform coding: Mixture block coding of natural images

    Science.gov (United States)

    Rost, Martin C.; Sayood, Khalid

    1991-01-01

    A method for efficiently coding natural images using a vector-quantized variable-blocksized transform source coder is presented. The method, mixture block coding (MBC), incorporates variable-rate coding by using a mixture of discrete cosine transform (DCT) source coders. Which coders are selected to code any given image region is made through a threshold driven distortion criterion. In this paper, MBC is used in two different applications. The base method is concerned with single-pass low-rate image data compression. The second is a natural extension of the base method which allows for low-rate progressive transmission (PT). Since the base method adapts easily to progressive coding, it offers the aesthetic advantage of progressive coding without incorporating extensive channel overhead. Image compression rates of approximately 0.5 bit/pel are demonstrated for both monochrome and color images.

  19. Ethical issues regarding human cloning: a nursing perspective.

    Science.gov (United States)

    Dinç, Leyla

    2003-05-01

    Advances in cloning technology and successful cloning experiments in animals raised concerns about the possibility of human cloning in recent years. Despite many objections, this is not only a possibility but also a reality. Human cloning is a scientific revolution. However, it also introduces the potential for physical and psychosocial harm to human beings. From this point of view, it raises profound ethical, social and health related concerns. Human cloning would have an impact on the practice of nursing because it could result in the creation of new physiological and psychosocial conditions that would require nursing care. The nursing profession must therefore evaluate the ethics of human cloning, in particular the potential role of nurses. This article reviews the ethical considerations of reproductive human cloning, discusses the main reasons for concern, and reflects a nursing perspective regarding this issue.

  20. Quantum cloning without external control

    International Nuclear Information System (INIS)

    Chiara, G. de; Fazio, R.; Macchiavello, C.; Montangero, S.; Palma, G.M.

    2005-01-01

    Full text: In this work we present an approach to quantum cloning with unmodulated spin networks. The cloner is realized by a proper design of the network and a choice of the coupling between the qubits. We show that in the case of phase covariant cloner the XY coupling gives the best results. In the 1 → 2 cloning we find that the value for the fidelity of the optimal cloner is achieved, and values comparable to the optimal ones in the general N → M case can be attained. If a suitable set of network symmetries are satisfied, the output fidelity of the clones does not depend on the specific choice of the graph. We show that spin network cloning is robust against the presence of static imperfections. Moreover, in the presence of noise, it outperforms the conventional approach. In this case the fidelity exceeds the corresponding value obtained by quantum gates even for a very small amount of noise. Furthermore we show how to use this method to clone qutrits and qudits. By means of the Heisenberg coupling it is also possible to implement the universal cloner although in this case the fidelity is 10 % off that of the optimal cloner. (author)

  1. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  2. Generation of phase-covariant quantum cloning

    International Nuclear Information System (INIS)

    Karimipour, V.; Rezakhani, A.T.

    2002-01-01

    It is known that in phase-covariant quantum cloning, the equatorial states on the Bloch sphere can be cloned with a fidelity higher than the optimal bound established for universal quantum cloning. We generalize this concept to include other states on the Bloch sphere with a definite z component of spin. It is shown that once we know the z component, we can always clone a state with a fidelity higher than the universal value and that of equatorial states. We also make a detailed study of the entanglement properties of the output copies and show that the equatorial states are the only states that give rise to a separable density matrix for the outputs

  3. Dose dependency of the frequency of micronucleated binucleated clone cells and of division related median clone sizes difference. Pt. 2

    International Nuclear Information System (INIS)

    Hagemann, G,; Kreczik, A.; Treichel, M.

    1996-01-01

    Following irradiation of the progenitor cells the clone growth of CHO cells decreases as a result of cell losses. Lethally acting expressions of micronuclei are produced by heritable lethal mutations. The dependency of the frequency of micronucleated binucleated clone cells and of the median clone sizes difference on the radiation dose was measured and compared to non-irradiated controls. Using the cytokinesis-block-micronucleus-method binucleated cells with micronuclei were counted as ratio of all binucleated cells within a clone size distribution. This ratio (shortened: micronucleus yield) was determined for all clone size distributions, which had been exposed to different irradiation doses and incubation times. The micronucleus yields were compared to the corresponding median clone sizes differences. The micronucleus yield is linearly dependent on the dose and is independent of the incubation time. The same holds true for the division related median clone sizes difference, which as a result is also linearly dependent on the micronucleus yield. Due to the inevitably errors of the cell count of micronucleated binucleated cells, an automatic measurement of the median clone sizes differences is the preferred method for evaluation of cellular radiation sensitivity for heritable lethal mutations. This value should always be determined in addition, if clone survival fractions are used as predictive test because it allows for an estimation of the remission probability of surviving cells. (orig.) [de

  4. Biodiversity versus cloning

    International Nuclear Information System (INIS)

    Jaramillo T, Jose Hernan

    1998-01-01

    The announcement has been made on the cloning of mice in these days and he doesn't stop to miss, because the world lives a stage where conscience of the protection is creating that should be given to the biodiversity. It is known that alone we won't subsist and the protection of the means and all that contains that environment is of vital importance for the man. But it is also known that the vegetables and animal transgenic that they come to multiply the species have appeared that we prepare. The transgenic has been altered genetically, for substitution of one or more genes of other species, inclusive human genes. This represents an improvement compared with the investigations that gave origin to the cloning animal. But it is necessary to notice that to it you arrived through the cloning. This year 28 million hectares have been sowed in cultivations of transgenic seeds and there is around 700 bovine transgenic whose milk contains a necessary protein in the treatment of the man's illnesses

  5. Quantitative discrimination of Aggregatibacter actinomycetemcomitans highly leukotoxic JP2 clone from non-JP2 clones in diagnosis of aggressive periodontitis.

    Science.gov (United States)

    Yoshida, Akihiro; Ennibi, Oum-Keltoum; Miyazaki, Hideo; Hoshino, Tomonori; Hayashida, Hideaki; Nishihara, Tatsuji; Awano, Shuji; Ansai, Toshihiro

    2012-10-11

    Aggregatibacter actinomycetemcomitans is the etiological agent of periodontitis, and there is a strong association between clone JP2 and aggressive periodontitis in adolescents of African descent. The JP2 clone has an approximately 530-bp deletion (∆530) in the promoter region of the lkt/ltx gene, which encodes leukotoxin, and this clone has high leukotoxic activity. Therefore, this clone is very important in aggressive periodontitis. To diagnose this disease, culture methods and conventional PCR techniques are used. However, quantitative detection based on qPCR for the JP2 clone has not been developed due to genetic difficulties. In this study, we developed a qPCR-based quantification method specific to the JP2 clone. Based on our analysis of the DNA sequence of the lkt/ltx gene and its flanking region, we designed a reverse primer specific for the ∆530 deletion border sequence and developed a JP2-specific PCR-based quantification method using this primer. We also analyzed the DNA sequence of the ∆530 locus and found it to be highly conserved (97-100%) among 17 non-JP2 strains. Using the ∆530 locus, we designed a qPCR primer-probe set specific to non-JP2 clones. Next, we determined the numbers of JP2 and non-JP2 clone cells in the periodontal pockets of patients with aggressive periodontitis. The JP2-specific primers specifically amplified the genomic DNA of the A. actinomycetemcomitans JP2 clone and did not react with other bacterial DNA, whereas the non-JP2 specific primers reacted only with A. actinomycetemcomitans non-JP2 clones. Samples from the 88 periodontal sites in the 11 patients with aggressive periodontitis were analyzed. The bacterial cell numbers in 88 periodontal sites ranged from 0 to 4.8 × 10(8) (mean 1.28 × 10(7)) for JP2 clones and from 0 to 1.6 × 10(6) for non-JP2 clones (mean 1.84 × 10(5)). There were significant differences in the JP2 cell number between a clinical attachment level (CAL) ≤6 mm and a level ≥7 mm (p clones. This

  6. Cloning and superluminal signaling£

    Indian Academy of Sciences (India)

    Cloning; cloning fidelity; superluminal signaling; state discrimination. PACS No. 03.65.Bz. 1. .... The possibility of superluminal signaling in quantum mechanics stems from the concept .... quantum mechanics and relativity [13]. .... [13] A Shimony, in Foundations of quantum mechanics in the light of new technology edited by.

  7. Cloning Mice.

    Science.gov (United States)

    Ogura, Atsuo

    2017-08-01

    Viable and fertile mice can be generated by somatic nuclear transfer into enucleated oocytes, presumably because the transplanted somatic cell genome becomes reprogrammed by factors in the oocyte. The first somatic cloned offspring of mice were obtained by directly injecting donor nuclei into recipient enucleated oocytes. When this method is used (the so-called Honolulu method of somatic cell nuclear transfer [SCNT]), the donor nuclei readily and completely condense within the enucleated metaphase II-arrested oocytes, which contain high levels of M-phase-promoting factor (MPF). It is believed that the condensation of the donor chromosomes promotes complete reprogramming of the donor genome within the mouse oocytes. Another key to the success of mouse cloning is the use of blunt micropipettes attached to a piezo impact-driving micromanipulation device. This system saves a significant amount of time during the micromanipulation of oocytes and thus minimizes the loss of oocyte viability in vitro. For example, a group of 20 oocytes can be enucleated within 10 min by an experienced operator. This protocol is composed of seven parts: (1) preparing micropipettes, (2) setting up the enucleation and injection micropipettes, (3) collecting and enucleating oocytes, (4) preparing nucleus donor cells, (5) injecting donor nuclei, (6) activating embryos and culturing, and (7) transferring cloned embryos. © 2017 Cold Spring Harbor Laboratory Press.

  8. Construction of an infectious plasmid clone of Muscovy duck parvovirus by TA cloning and creation of a partially attenuated strain.

    Science.gov (United States)

    Yen, T-Y; Li, K-P; Ou, S-C; Shien, J-H; Lu, H-M; Chang, P-C

    2015-01-01

    Muscovy duck parvovirus (MDPV) infection is a highly contagious and fatal disease of Muscovy ducklings. The infectious clone methodology is a valuable tool to study the pathogenic mechanisms of viruses, but no infectious clone of MDPV is yet available. In this study, a plasmid clone containing the full-length genome of MDPV was constructed using the TA cloning methodology. This MDPV clone was found to be infectious after transfection of primary Muscovy duck embryo fibroblast cells and passage in embryonated Muscovy duck eggs. Site-directed mutagenesis showed that the K75N mutation in the VP1 protein of MDPV resulted in the partial attenuation of the virus. The availability of an MDPV infectious clone can facilitate investigation of the pathogenic mechanisms of MDPV and development of vaccines against diseases caused by MDPV.

  9. Quantum cloning machines and their implementation in physical systems

    International Nuclear Information System (INIS)

    Wu Tao; Ye Liu; Fang Bao-Long

    2013-01-01

    We review the basic theory of approximate quantum cloning for discrete variables and some schemes for implementing quantum cloning machines. Several types of approximate quantum clones and their expansive quantum clones are introduced. As for the implementation of quantum cloning machines, we review some design methods and recent experimental results. (topical review - quantum information)

  10. RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code

    Science.gov (United States)

    Gonggrijp, Rop; Hengeveld, Willem-Jan; Hotting, Eelco; Schmidt, Sebastian; Weidemann, Frederik

    The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the internet. A rather cursory scan of the source code to RIES showed a significant lack of security-awareness among the programmers which - among other things - appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, possibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down-to-earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.

  11. Cloning, Expression, Characterization, and Computational Approach for Cross-Reactivity Prediction of Manganese Superoxide Dismutase Allergen from Pistachio Nut

    Directory of Open Access Journals (Sweden)

    Reihaneh Noorbakhsh

    Full Text Available ABSTRACT: Background: Tree nut allergy is one of the common potentially life-threatening food allergies in children and adults. Recombinant food allergens offer new perspectives to solve problems of clinical and molecular allergology in diagnosis, research, and therapy of food allergies. So far, superoxide dismutase (s has been identified as a panallergen and studied in different allergenic sources. Manganese Superoxide Dismutase (MnSOD has also been reported in pistachio that may cause allergic reactions in atopic subjects. The aim of this study was to describe the cloning, expression, and purification of MnSOD from pistachio nut. Methods: The pistachio MnSOD was cloned and expressed in E. coli BL21 (DE3 using a vector pET-32b (+. A recombinant protein was purified by metal precipitation. The protein immunoreactivity was evaluated using patients' IgE binding by means of ELISA and immunoblotting assays. Results: The MnSOD gene from pistachio was successfully cloned and expressed in E. coli. The purified pistachio MnSOD was recognized by IgE in 10 (40% out of the 25 sera tested. Our results also showed that this protein might trigger some cross-reactions toward IgE antibodies and thus could be considered as a panallergen. Conclusions: For the first time recombinant manganese superoxide dismutase from nut source was expressed as a possible allergen. This pistachio allergen could be a possible basis for cross-reactivity with MnSOD from other sources. KEY WORDS: cloning, cross-reaction, Manganese Superoxide Dismutase (MnSOD, pistachio (Pistacia vera, recombinant allergen

  12. Cloning and sequencing of cDNA encoding human DNA topoisomerase II and localization of the gene to chromosome region 17q21-22

    International Nuclear Information System (INIS)

    Tsai-Pflugfelder, M.; Liu, L.F.; Liu, A.A.; Tewey, K.M.; Whang-Peng, J.; Knutsen, T.; Huebner, K.; Croce, C.M.; Wang, J.C.

    1988-01-01

    Two overlapping cDNA clones encoding human DNA topoisomerase II were identified by two independent methods. In one, a human cDNA library in phage λ was screened by hybridization with a mixed oligonucleotide probe encoding a stretch of seven amino acids found in yeast and Drosophila DNA topoisomerase II; in the other, a different human cDNA library in a λgt11 expression vector was screened for the expression of antigenic determinants that are recognized by rabbit antibodies specific to human DNA topoisomerase II. The entire coding sequences of the human DNA topoisomerase II gene were determined from these and several additional clones, identified through the use of the cloned human TOP2 gene sequences as probes. Hybridization between the cloned sequences and mRNA and genomic DNA indicates that the human enzyme is encoded by a single-copy gene. The location of the gene was mapped to chromosome 17q21-22 by in situ hybridization of a cloned fragment to metaphase chromosomes and by hybridization analysis with a panel of mouse-human hybrid cell lines, each retaining a subset of human chromosomes

  13. Use of WIMS-E lattice code for prediction of the transuranic source term for spent fuel dose estimation

    International Nuclear Information System (INIS)

    Schwinkendorf, K.N.

    1996-01-01

    A recent source term analysis has shown a discrepancy between ORIGEN2 transuranic isotopic production estimates and those produced with the WIMS-E lattice physics code. Excellent agreement between relevant experimental measurements and WIMS-E was shown, thus exposing an error in the cross section library used by ORIGEN2

  14. Dynamic benchmarking of simulation codes

    International Nuclear Information System (INIS)

    Henry, R.E.; Paik, C.Y.; Hauser, G.M.

    1996-01-01

    Computer simulation of nuclear power plant response can be a full-scope control room simulator, an engineering simulator to represent the general behavior of the plant under normal and abnormal conditions, or the modeling of the plant response to conditions that would eventually lead to core damage. In any of these, the underlying foundation for their use in analysing situations, training of vendor/utility personnel, etc. is how well they represent what has been known from industrial experience, large integral experiments and separate effects tests. Typically, simulation codes are benchmarked with some of these; the level of agreement necessary being dependent upon the ultimate use of the simulation tool. However, these analytical models are computer codes, and as a result, the capabilities are continually enhanced, errors are corrected, new situations are imposed on the code that are outside of the original design basis, etc. Consequently, there is a continual need to assure that the benchmarks with important transients are preserved as the computer code evolves. Retention of this benchmarking capability is essential to develop trust in the computer code. Given the evolving world of computer codes, how is this retention of benchmarking capabilities accomplished? For the MAAP4 codes this capability is accomplished through a 'dynamic benchmarking' feature embedded in the source code. In particular, a set of dynamic benchmarks are included in the source code and these are exercised every time the archive codes are upgraded and distributed to the MAAP users. Three different types of dynamic benchmarks are used: plant transients; large integral experiments; and separate effects tests. Each of these is performed in a different manner. The first is accomplished by developing a parameter file for the plant modeled and an input deck to describe the sequence; i.e. the entire MAAP4 code is exercised. The pertinent plant data is included in the source code and the computer

  15. Evolution of the Pseudomonas aeruginosa mutational resistome in an international Cystic Fibrosis clone

    DEFF Research Database (Denmark)

    López-Causapé, Carla; Madsen Sommer, Lea Mette; Cabot, Gabriel

    2017-01-01

    ) and resistome of a widespread clone (CC274), in isolates from two highly-distant countries, Australia and Spain, covering an 18-year period. The coexistence of two divergent CC274 clonal lineages was revealed, but without evident geographical barrier; phylogenetic reconstructions and mutational resistome...... for the first time that high-level aminoglycoside resistance in CF is likely driven by mutations in fusA1/fusA2, coding for elongation factor G. Altogether, our results provide valuable information for understanding the evolution of the mutational resistome of CF P. aeruginosa....

  16. Use of CITATION code for flux calculation in neutron activation analysis with voluminous sample using an Am-Be source

    International Nuclear Information System (INIS)

    Khelifi, R.; Idiri, Z.; Bode, P.

    2002-01-01

    The CITATION code based on neutron diffusion theory was used for flux calculations inside voluminous samples in prompt gamma activation analysis with an isotopic neutron source (Am-Be). The code uses specific parameters related to the energy spectrum source and irradiation system materials (shielding, reflector). The flux distribution (thermal and fast) was calculated in the three-dimensional geometry for the system: air, polyethylene and water cuboidal sample (50x50x50 cm). Thermal flux was calculated in a series of points inside the sample. The results agreed reasonably well with observed values. The maximum thermal flux was observed at a distance of 3.2 cm while CITATION gave 3.7 cm. Beyond a depth of 7.2 cm, the thermal flux to fast flux ratio increases up to twice and allows us to optimise the detection system position in the scope of in-situ PGAA

  17. Therapeutic cloning in the mouse

    Science.gov (United States)

    Mombaerts, Peter

    2003-01-01

    Nuclear transfer technology can be applied to produce autologous differentiated cells for therapeutic purposes, a concept termed therapeutic cloning. Countless articles have been published on the ethics and politics of human therapeutic cloning, reflecting the high expectations from this new opportunity for rejuvenation of the aging or diseased body. Yet the research literature on therapeutic cloning, strictly speaking, is comprised of only four articles, all in the mouse. The efficiency of derivation of embryonic stem cell lines via nuclear transfer is remarkably consistent among these reports. However, the efficiency is so low that, in its present form, the concept is unlikely to become widespread in clinical practice. PMID:12949262

  18. Cloning and Expression of 31kDa Outer Membrane Protein of Brucella melitansis in E.coli

    Directory of Open Access Journals (Sweden)

    Sayeneh Khodadadi

    2012-04-01

    Full Text Available Background & Objectives: The identification of Brucella spp. antigens with the capacity to elicit a protective immune response is of the great interest for the researchers. So, characterization and assessment of diverse antigens of Brucella need to be evaluated. In this study, we report the cloning and expression of the gene coding for 31 KDa OMP (OMP31 of Brucella melitensis 16M.   Methods: Brucella melitensis Omp31 gene was amplified with specific primers, cloned into pJET1/2 and subsequently subcloned in pET28a (+ vector. Both these recombinant plasmids were sequenced and then after, expression of recombinant protein was induced by 1mM IPTG. Western blot analysis was also performed by polyclonal rabbit antiserum.   Results: Omp31 successfully was cloned in both plasmid vectors. The recombinant Omp31 was expressed in E.coli host and purified with significant yield. Western blot results along with those of sequencing ensured accurate production of recombinant omp31 and retaining of its partial epitopes.   Conclusion: Our results show that, an expression host such as E. coli is suitable for omp31 production.

  19. PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES

    Directory of Open Access Journals (Sweden)

    Denys Samoilenko

    2016-06-01

    Full Text Available Purpose: One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks could be useful for authority protection, for code copies numbering, for program propagation monitoring, for information security proposes in client-server communication processes. Methods: We used the methods of digital steganography adopted for program codes as text objects. The same-shape symbols method was transformed to same-semantic element method due to codes features which makes them different from ordinary texts. We use dynamic principle of marks forming making codes similar to be polymorphic. Results: We examined the combinatorial capacity of permutations possible in program codes. As a result it was shown that the set of 5-7 polymorphic variables is suitable for the most modern network applications. Marks creation and restoration algorithms where proposed and discussed. The main algorithm is based on full and partial permutations in variables names and its declaration order. Algorithm for partial permutation enumeration was optimized for calculation complexity. PHP code fragments which realize the algorithms were listed. Discussion: Methodic proposed in the work allows distinguishing of each client-server connection. In a case if a clone of some network resource was found the methodic could give information about included marks and thereby data on IP, date and time, authentication information of client copied the resource. Usage of polymorphic stego-watermarks should improve information security indexes in network communications.

  20. Cloning Mice and Men: Prohibiting the Use of iPS Cells for Human Reproductive Cloning

    OpenAIRE

    Lo, Bernard; Parham, Lindsay; Alvarez-Buylla, Arturo; Cedars, Marcelle; Conklin, Bruce; Fisher, Susan; Gates, Elena; Giudice, Linda; Halme, Dina Gould; Hershon, William; Kriegstein, Arnold; Kwok, Pui-Yan; Wagner, Richard

    2010-01-01

    The use of iPSCs and tetraploid complementation for human reproductive cloning would raise profound ethical objections. Professional standards and laws that ban human reproductive cloning by somatic cell nuclear transfer should be revised to also forbid it by other methods, such as iPSCs via tetraploid complementation.

  1. cDNA cloning and nucleotide sequence comparison of Chinese hamster metallothionein I and II mRNAs

    Energy Technology Data Exchange (ETDEWEB)

    Griffith, B B; Walters, R A; Enger, M D; Hildebrand, C E; Griffith, J K

    1983-01-01

    Polyadenylated RNA was extracted from a cadmium resistant Chinese hamster (CHO) cell line, enriched for metal-induced, abundant RNA sequences and cloned as double-stranded cDNA in the plasmid pBR322. Two cDNA clones, pCHMT1 and pCHMT2, encoding two Chinese hamster isometallothioneins were identified, and the nucleotide sequence of each insert was determined. The two Chinese hamster metallothioneins show nucleotide sequence homologies of 80% in the protein coding region and approximately 35% in both the 5' and 3' untranslated regions. Interestingly, an 8 nucleotide sequence (TGTAAATA) has been conserved in sequence and position in the 3' untranslated regions of each metallothionein mRNA sequenced thus far. Estimated nucleotide substitution rates derived from interspecies comparisons were used to calculate a metallothionein gene duplication time of 45 to 120 million years ago. 39 references, 1 figure, 1 table.

  2. Human cloning: category, dignity, and the role of bioethics.

    Science.gov (United States)

    Shuster, Evelyne

    2003-10-01

    Human cloning has been simultaneously a running joke for massive worldwide publicity of fringe groups like the Raelians, and the core issue of an international movement at the United Nations in support of a treaty to ban the use of cloning techniques to produce a child (so called reproductive cloning). Yet, even though debates on human cloning have greatly increased since the birth of Dolly, the clone sheep, in 1997, we continue to wonder whether cloning is after all any different from other methods of medically assisted reproduction, and what exactly makes cloning an 'affront to the dignity of humans.' Categories we adopt matter mightily as they inform but can also misinform and lead to mistaken and unproductive decisions. And thus bioethicists have a responsibility to ensure that the proper categories are used in the cloning debates and denounce those who try to win the ethical debate through well-crafted labels rather than well-reasoned argumentations. But it is as important for bioethicists to take a position on broad issues such as human cloning and species altering interventions. One 'natural question' would be, for example, should there be an international treaty to ban human reproductive cloning?

  3. PCR cloning of Polyhydroxybutyrate Synthase Gene (phbC) from Aeromonashydrophila

    International Nuclear Information System (INIS)

    Enan, M. R.; Bashandy, S.A.

    2006-01-01

    Plastic wastes are considered to be severe environmental contaminantscausing waste disposal problems. Widespread use of biodegradable plastics isone of the solutions, but it is limited by high production cost. A polymerasechain reaction (PCR) protocol was developed for the specific for the specificdetection and isolation of full-length gene coding for polyhydroxybutyrate(PBH). (PCR) strategy using (PHB) primers resulted in the amplification of(DNA) fragments with the expected size from all isolated bacteria (PBH)synthase gene was cloned directly from Aeromonas hydrophila genome for thefirst time. The clonec fragment was named (phbCAh) gene exhibits similarly to(PHB) synthase genes of Alcaligenes latus and Pseudomonas oleovorans (97%),Alcaligenes sp. (81%) and Comamonas acidovorans (84%). (author)

  4. Emotional reactions to human reproductive cloning.

    Science.gov (United States)

    May, Joshua

    2016-01-01

    Extant surveys of people's attitudes towards human reproductive cloning focus on moral judgements alone, not emotional reactions or sentiments. This is especially important given that some (especially Leon Kass) have argued against such cloning on the ground that it engenders widespread negative emotions, like disgust, that provide a moral guide. To provide some data on emotional reactions to human cloning, with a focus on repugnance, given its prominence in the literature. This brief mixed-method study measures the self-reported attitudes and emotions (positive or negative) towards cloning from a sample of participants in the USA. Most participants condemned cloning as immoral and said it should be illegal. The most commonly reported positive sentiment was by far interest/curiosity. Negative emotions were much more varied, but anxiety was the most common. Only about a third of participants selected disgust or repugnance as something they felt, and an even smaller portion had this emotion come to mind prior to seeing a list of options. Participants felt primarily interested and anxious about human reproductive cloning. They did not primarily feel disgust or repugnance. This provides initial empirical evidence that such a reaction is not appropriately widespread. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  5. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  6. Cloning of low dose radiation induced gene RIG1 by RACE based on non-cloned cDNA library

    International Nuclear Information System (INIS)

    Luo Ying; Sui Jianli; Tie Yi; Zhang Yuanping; Zhou Pingkun; Sun Zhixian

    2001-01-01

    Objective: To obtain full-length cDNA of radiation induced new gene RIG1 based on its EST fragment. Methods: Based on non-cloned cDNA library, enhanced nested RACE PCR and biotin-avidin labelled probe for magnetic bead purification was used to obtain full-length cDNA of RIG1. Results: About 1 kb of 3' end of RIG1 gene was successfully cloned by this set of methods and cloning of RIG1 5' end is proceeding well. Conclusion: The result is consistent with the design of experiment. This set of protocol is useful for cloning of full-length gene based on EST fragment

  7. Cloning and expression of Tenebrio molitor antifreeze protein in Escherichia coli.

    Science.gov (United States)

    Yue, Chang-Wu; Zhang, Yi-Zheng

    2009-03-01

    A novel antifreeze protein cDNA was cloned by RT-PCR from the larva of the yellow mealworm Tenebrio molitor. The coding fragment of 339 bp encodes a protein of 112 amino acid residues and was fused to the expression vectors pET32a and pTWIN1. The resulted expression plasmids were transformed into Escherischia coli strains BL21 (DE3), ER2566, and Origami B (DE3), respectively. Several strategies were used for expression of the highly disulfide-bonded beta-helix-contained protein with the activity of antifreeze in different expression systems. A protocol for production of refolded and active T. molitor antifreeze protein in bacteria was obtained.

  8. Cloning and expression study of BnaLCR78 in Brassica napus

    International Nuclear Information System (INIS)

    Zhuang, L.; Ze, L. Y.; Cheng, W. Y.

    2016-01-01

    BnaLCR78 genes of three types of rape were cloned in rape (Brassica napus), and encoded protein structure was analyzed, the Results showed that the protein had a conserved coding domain which was analogues among LCR family of Arabidopsis. The expression patterns of genes of three types of rape in varying tissues and in specific same tissues were analyzed using quantitative method. The Results showed that their expression patterns differ from that of former research in Brassica napus, which may result from the difference of sampling time. We speculated that the gene might be involved in transpiration and transportation and distribution of nutrient, oil content in seed. (author)

  9. Quantitative discrimination of Aggregatibacter actinomycetemcomitans highly leukotoxic JP2 clone from non-JP2 clones in diagnosis of aggressive periodontitis

    Directory of Open Access Journals (Sweden)

    Yoshida Akihiro

    2012-10-01

    Full Text Available Abstract Background Aggregatibacter actinomycetemcomitans is the etiological agent of periodontitis, and there is a strong association between clone JP2 and aggressive periodontitis in adolescents of African descent. The JP2 clone has an approximately 530-bp deletion (∆530 in the promoter region of the lkt/ltx gene, which encodes leukotoxin, and this clone has high leukotoxic activity. Therefore, this clone is very important in aggressive periodontitis. To diagnose this disease, culture methods and conventional PCR techniques are used. However, quantitative detection based on qPCR for the JP2 clone has not been developed due to genetic difficulties. In this study, we developed a qPCR-based quantification method specific to the JP2 clone. Methods Based on our analysis of the DNA sequence of the lkt/ltx gene and its flanking region, we designed a reverse primer specific for the ∆530 deletion border sequence and developed a JP2-specific PCR-based quantification method using this primer. We also analyzed the DNA sequence of the ∆530 locus and found it to be highly conserved (97–100% among 17 non-JP2 strains. Using the ∆530 locus, we designed a qPCR primer–probe set specific to non-JP2 clones. Next, we determined the numbers of JP2 and non-JP2 clone cells in the periodontal pockets of patients with aggressive periodontitis. Results The JP2-specific primers specifically amplified the genomic DNA of the A. actinomycetemcomitans JP2 clone and did not react with other bacterial DNA, whereas the non-JP2 specific primers reacted only with A. actinomycetemcomitans non-JP2 clones. Samples from the 88 periodontal sites in the 11 patients with aggressive periodontitis were analyzed. The bacterial cell numbers in 88 periodontal sites ranged from 0 to 4.8 × 108 (mean 1.28 × 107 for JP2 clones and from 0 to 1.6 × 106 for non-JP2 clones (mean 1.84 × 105. There were significant differences in the JP2 cell number between a clinical attachment level

  10. Performance of new Hevea clones from IAC 400 series Perfomance de novos clones de Hevea da série IAC 400

    Directory of Open Access Journals (Sweden)

    Paulo de Souza Gonçalves

    2007-06-01

    Full Text Available The Hevea breeding program of Instituto Agronômico de Campinas (IAC has completed clonal evaluation on the following series: IAC 100, IAC 200 and IAC 300. The performance of 22 clones of Hevea brasiliensis (Willd. ex Adr. de Juss. Muell.-Arg., evolved at IAC, over a period of eleven years was evaluated in the Western Central part of the São Paulo State, Brazil. Among these 22 new clones, six were intraspecific hybrid clones (IAC 400, IAC 404, IAC 405, IAC 406, IAC 410, IAC 412 and the remaining are primary those resulted from selected ortets within half-sib progenies. An old popular clone RRIM 600, of Malaysian origin, was used as the control. The trial was laid out in a randomized block design with three replications. Yield performance over a period of four years, mean girth at the 11th year, girth increment before tapping and on tapping, thermal property of natural rubber produced, bark thickness, number of latex vessel rows in seven year virgin bark, percentage incidence of tapping panel dryness, wind damage and diseases like leaf and panel anthracnose have been observed. Sixty one percent of the clones were superior in relation to the control for yield. The clone IAC 400 recorded the highest yield (97.40 g tree-1 tap-1 over four years of tapping, followed by IAC 411 (78.87 tree-1 tap-1, whereas the control clone RRIM 600 recorded 50.86 g tree-1 tap-1. All selected clones were vigorous in growth. Girth increment of these clones was average to above average. Except for IAC 423, other clones had thick virgin bark at opening ranging from 4.84 mm for IAC 401 to 6.38 mm for IAC 416. The natural rubbers from IAC clones have shown good thermal stability up to 300ºC and no differences in the thermal behavior among rubber from clones of the IAC series and the clone RRIM 600 were found in inert atmosphere.O programa de melhoramento de Hevea do Instituto Agronômico de Campinas (IAC completou a avaliação dos clones da série IAC 100, IAC 200 e IAC

  11. An Assessment of Some Design Constraints on Heat Production of a 3D Conceptual EGS Model Using an Open-Source Geothermal Reservoir Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Yidong Xia; Mitch Plummer; Robert Podgorney; Ahmad Ghassemi

    2016-02-01

    Performance of heat production process over a 30-year period is assessed in a conceptual EGS model with a geothermal gradient of 65K per km depth in the reservoir. Water is circulated through a pair of parallel wells connected by a set of single large wing fractures. The results indicate that the desirable output electric power rate and lifespan could be obtained under suitable material properties and system parameters. A sensitivity analysis on some design constraints and operation parameters indicates that 1) the fracture horizontal spacing has profound effect on the long-term performance of heat production, 2) the downward deviation angle for the parallel doublet wells may help overcome the difficulty of vertical drilling to reach a favorable production temperature, and 3) the thermal energy production rate and lifespan has close dependence on water mass flow rate. The results also indicate that the heat production can be improved when the horizontal fracture spacing, well deviation angle, and production flow rate are under reasonable conditions. To conduct the reservoir modeling and simulations, an open-source, finite element based, fully implicit, fully coupled hydrothermal code, namely FALCON, has been developed and used in this work. Compared with most other existing codes that are either closed-source or commercially available in this area, this new open-source code has demonstrated a code development strategy that aims to provide an unparalleled easiness for user-customization and multi-physics coupling. Test results have shown that the FALCON code is able to complete the long-term tests efficiently and accurately, thanks to the state-of-the-art nonlinear and linear solver algorithms implemented in the code.

  12. Optimal cloning of mixed Gaussian states

    International Nuclear Information System (INIS)

    Guta, Madalin; Matsumoto, Keiji

    2006-01-01

    We construct the optimal one to two cloning transformation for the family of displaced thermal equilibrium states of a harmonic oscillator, with a fixed and known temperature. The transformation is Gaussian and it is optimal with respect to the figure of merit based on the joint output state and norm distance. The proof of the result is based on the equivalence between the optimal cloning problem and that of optimal amplification of Gaussian states which is then reduced to an optimization problem for diagonal states of a quantum oscillator. A key concept in finding the optimum is that of stochastic ordering which plays a similar role in the purely classical problem of Gaussian cloning. The result is then extended to the case of n to m cloning of mixed Gaussian states

  13. [Telomere lengthening by trichostatin A treatment in cloned pigs].

    Science.gov (United States)

    Xie, Bing-Teng; Ji, Guang-Zhen; Kong, Qing-Ran; Mao, Jian; Shi, Yong-Qian; Liu, Shi-Chao; Wu, Mei-Ling; Wang, Juan; Liu, Lin; Liu, Zhong-Hua

    2012-12-01

    Telomeres are repeated GC rich sequences at the end of chromosomes, and shorten with each cell division due to DNA end replication problem. Previously, reprogrammed somatic cells of cloned animals display variable telomere elongation. However, it was reported that the cloned animals including Dolly do not reset telomeres and show premature aging. In this study, we investigated telomere function in cloned or transgenic cloned pigs, including the cloned Northeast Min pigs, eGFP, Mx, and PGC1α transgenic cloned pigs, and found that the telomere lengths of cloned pigs were significantly shorter than the nuclear donor adult fibroblasts and age-matched noncloned pigs (Pstage for 24 h. Consistent with previous reports, the developmental rate of SCNT embryos to the blastocyst stage was significantly increased compared with those of the control group (16.35% vs. 27.09%, 21.60% vs. 34.90%, Plengthen the telomere lengths of cloned pigs.

  14. Trichostatin A (TSA) improves the development of rabbit-rabbit intraspecies cloned embryos, but not rabbit-human interspecies cloned embryos.

    Science.gov (United States)

    Shi, Li-Hong; Miao, Yi-Liang; Ouyang, Ying-Chun; Huang, Jun-Cheng; Lei, Zi-Li; Yang, Ji-Wen; Han, Zhi-Ming; Song, Xiang-Fen; Sun, Qing-Yuan; Chen, Da-Yuan

    2008-03-01

    The interspecies somatic cell nuclear transfer (iSCNT) technique for therapeutic cloning gives great promise for treatment of many human diseases. However, the incomplete nuclear reprogramming and the low blastocyst rate of iSCNT are still big problems. Herein, we observed the effect of TSA on the development of rabbit-rabbit intraspecies and rabbit-human interspecies cloned embryos. After treatment with TSA for 6 hr during activation, we found that the blastocyst rate of rabbit-rabbit cloned embryos was more than two times higher than that of untreated embryos; however, the blastocyst rate of TSA-treated rabbit-human interspecies cloned embryos decreased. We also found evident time-dependent histone deacetylation-reacetylation changes in rabbit-rabbit cloned embryos, but not in rabbit-human cloned embryos from fusion to 6 hr after activation. Our results suggest that TSA-treatment does not improve blastocyst development of rabbit-human iSCNT embryos and that abnormal histone deacetylation-reacetylation changes in iSCNT embryos may account for their poor blastocyst development. (c) 2008 Wiley-Liss, Inc.

  15. Inverse fusion PCR cloning.

    Directory of Open Access Journals (Sweden)

    Markus Spiliotis

    Full Text Available Inverse fusion PCR cloning (IFPC is an easy, PCR based three-step cloning method that allows the seamless and directional insertion of PCR products into virtually all plasmids, this with a free choice of the insertion site. The PCR-derived inserts contain a vector-complementary 5'-end that allows a fusion with the vector by an overlap extension PCR, and the resulting amplified insert-vector fusions are then circularized by ligation prior transformation. A minimal amount of starting material is needed and experimental steps are reduced. Untreated circular plasmid, or alternatively bacteria containing the plasmid, can be used as templates for the insertion, and clean-up of the insert fragment is not urgently required. The whole cloning procedure can be performed within a minimal hands-on time and results in the generation of hundreds to ten-thousands of positive colonies, with a minimal background.

  16. Combinations of probabilistic and approximate quantum cloning and deleting

    International Nuclear Information System (INIS)

    Qiu Daowen

    2002-01-01

    We first construct a probabilistic and approximate quantum cloning machine (PACM) and then clarify the relation between the PACM and other cloning machines. After that, we estimate the global fidelity of the approximate cloning that improves the previous estimation for the deterministic cloning machine; and also derive a bound on the success probability of producing perfect multiple clones. Afterwards, we further establish a more generalized probabilistic and approximate cloning and deleting machine (PACDM) and discuss the connections of the PACDM to some of the existing quantum cloning and deleting machines. Finally the global fidelity and a bound on the success probability of the PACDM are obtained. Summarily, the quantum devices established in this paper improve and also greatly generalize some of the existing machines

  17. Reproductive cloning in humans and therapeutic cloning in primates: is the ethical debate catching up with the recent scientific advances?

    Science.gov (United States)

    Camporesi, S; Bortolotti, L

    2008-09-01

    After years of failure, in November 2007 primate embryonic stem cells were derived by somatic cellular nuclear transfer, also known as therapeutic cloning. The first embryo transfer for human reproductive cloning purposes was also attempted in 2006, albeit with negative results. These two events force us to think carefully about the possibility of human cloning which is now much closer to becoming a reality. In this paper we tackle this issue from two sides, first summarising what scientists have achieved so far, then discussing some of the ethical arguments in favour and against human cloning which are debated in the context of policy making and public consultation. Therapeutic cloning as a means to improve and save lives has uncontroversial moral value. As to human reproductive cloning, we consider and assess some common objections and failing to see them as conclusive. We do recognise, though, that there will be problems at the level of policy and regulation that might either impair the implementation of human reproductive cloning or make its accessibility restricted in a way that could become difficult to justify on moral grounds. We suggest using the time still available before human reproductive cloning is attempted successfully to create policies and institutions that can offer clear directives on its legitimate applications on the basis of solid arguments, coherent moral principles, and extensive public consultation.

  18. Meat and milk compositions of bovine clones

    Science.gov (United States)

    Tian, X. Cindy; Kubota, Chikara; Sakashita, Kunihito; Izaike, Yoshiaki; Okano, Ryoichi; Tabara, Norio; Curchoe, Carol; Jacob, Lavina; Zhang, Yuqin; Smith, Sadie; Bormann, Charles; Xu, Jie; Sato, Masumi; Andrew, Sheila; Yang, Xiangzhong

    2005-01-01

    The technology is now available for commercial cloning of farm animals for food production, but is the food safe for consumers? Here, we provide data on >100 parameters that compare the composition of meat and milk from beef and dairy cattle derived from cloning to those of genetic- and breed-matched control animals from conventional reproduction. The cloned animals and the comparators were managed under the same conditions and received the same diet. The composition of the meat and milk from the clones were largely not statistically different from those of matched comparators, and all parameters examined were within the normal industry standards or previously reported values. The data generated from our match-controlled experiments provide science-based information desired by regulatory agencies to address public concerns about the safety of meat and milk from somatic animal clones. PMID:15829585

  19. SFACTOR: a computer code for calculating dose equivalent to a target organ per microcurie-day residence of a radionuclide in a source organ

    Energy Technology Data Exchange (ETDEWEB)

    Dunning, D.E. Jr.; Pleasant, J.C.; Killough, G.G.

    1977-11-01

    A computer code SFACTOR was developed to estimate the average dose equivalent S (rem/..mu..Ci-day) to each of a specified list of target organs per microcurie-day residence of a radionuclide in source organs in man. Source and target organs of interest are specified in the input data stream, along with the nuclear decay information. The SFACTOR code computes components of the dose equivalent rate from each type of decay present for a particular radionuclide, including alpha, electron, and gamma radiation. For those transuranic isotopes which also decay by spontaneous fission, components of S from the resulting fission fragments, neutrons, betas, and gammas are included in the tabulation. Tabulations of all components of S are provided for an array of 22 source organs and 24 target organs for 52 radionuclides in an adult.

  20. SFACTOR: a computer code for calculating dose equivalent to a target organ per microcurie-day residence of a radionuclide in a source organ

    International Nuclear Information System (INIS)

    Dunning, D.E. Jr.; Pleasant, J.C.; Killough, G.G.

    1977-11-01

    A computer code SFACTOR was developed to estimate the average dose equivalent S (rem/μCi-day) to each of a specified list of target organs per microcurie-day residence of a radionuclide in source organs in man. Source and target organs of interest are specified in the input data stream, along with the nuclear decay information. The SFACTOR code computes components of the dose equivalent rate from each type of decay present for a particular radionuclide, including alpha, electron, and gamma radiation. For those transuranic isotopes which also decay by spontaneous fission, components of S from the resulting fission fragments, neutrons, betas, and gammas are included in the tabulation. Tabulations of all components of S are provided for an array of 22 source organs and 24 target organs for 52 radionuclides in an adult

  1. High-dimensional quantum cloning and applications to quantum hacking.

    Science.gov (United States)

    Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W; Karimi, Ebrahim

    2017-02-01

    Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography.

  2. RESEARCH ARTICLE Molecular cloning and functional ...

    Indian Academy of Sciences (India)

    Navya

    2016-11-25

    Nov 25, 2016 ... Molecular cloning and functional characterization of two novel ... Currently, many variants of HMW-GSs have been cloned from bread wheat .... SDS sedimentation tests were conducted using the methods described by Gao et ...

  3. Diversity of chloroplast genome among local clones of cocoa (Theobroma cacao, L.) from Central Sulawesi

    Science.gov (United States)

    Suwastika, I. Nengah; Pakawaru, Nurul Aisyah; Rifka, Rahmansyah, Muslimin, Ishizaki, Yoko; Cruz, André Freire; Basri, Zainuddin; Shiina, Takashi

    2017-02-01

    Chloroplast genomes typically range in size from 120 to 170 kilo base pairs (kb), which relatively conserved among plant species. Recent evaluation on several species, certain unique regions showed high variability which can be utilized in the phylogenetic analysis. Many fragments of coding regions, introns, and intergenic spacers, such as atpB-rbcL, ndhF, rbcL, rpl16, trnH-psbA, trnL-F, trnS-G, etc., have been used for phylogenetic reconstructions at various taxonomic levels. Based on that status, we would like to analysis the diversity of chloroplast genome within species of local cacao (Theobroma cacao L.) from Central Sulawesi. Our recent data showed, there were more than 20 clones from local farming in Central Sulawesi, and it can be detected based on phenotypic and nuclear-genome-based characterization (RAPD- Random Amplified Polymorphic DNA and SSR- Simple Sequences Repeat) markers. In developing DNA marker for this local cacao, here we also included analysis based on the variation of chloroplast genome. At least several regions such as rpl32-TurnL, it can be considered as chloroplast markers on our local clone of cocoa. Furthermore, we could develop phylogenetic analysis in between clones of cocoa.

  4. Rapid production of functionalized recombinant proteins: marrying ligation independent cloning and in vitro protein ligation.

    Science.gov (United States)

    Kushnir, Susanna; Marsac, Yoann; Breitling, Reinhard; Granovsky, Igor; Brok-Volchanskaya, Vera; Goody, Roger S; Becker, Christian F W; Alexandrov, Kirill

    2006-01-01

    Functional genomics and proteomics have been very active fields since the sequencing of several genomes was completed. To assign a physiological role to the newly discovered coding genes with unknown function, new generic methods for protein production, purification, and targeted functionalization are needed. This work presents a new vector, pCYSLIC, that allows rapid generation of Escherichia coli expression constructs via ligation-independent cloning (LIC). The vector is designed to facilitate protein purification by either Ni-NTA or GSH affinity chromatography. Subsequent proteolytic removal of affinity tags liberates an N-terminal cysteine residue that is then used for covalent modification of the target protein with different biophysical probes via protein ligation. The described system has been tested on 36 mammalian Rab GTPases, and it was demonstrated that recombinant GTPases produced with pCYSLIC could be efficiently modified with fluorescein or biotin in vitro. Finally, LIC was compared with the recently developed In-Fusion cloning method, and it was demonstrated that In-Fusion provides superior flexibility in choice of expression vector. By the application of In-Fusion cloning Cys-Rab6A GTPase with an N-terminal cysteine residue was generated employing unmodified pET30a vector and TVMV protease.

  5. Listeria monocytogenes source distribution analysis indicates regional heterogeneity and ecological niche preference among serotype 4b clones

    Science.gov (United States)

    Human illness due to the foodborne bacterial pathogen Listeria monocytogenes frequently involves certain widely disseminated clonal complexes (CCs), primarily of serotype 4b. CC1, CC2 and CC6, previously also designated epidemic clone (EC) I, Ia and II, respectively, have been frequently implicate...

  6. Performance evaluation based on data from code reviews

    OpenAIRE

    Andrej, Sekáč

    2016-01-01

    Context. Modern code review tools such as Gerrit have made available great amounts of code review data from different open source projects as well as other commercial projects. Code reviews are used to keep the quality of produced source code under control but the stored data could also be used for evaluation of the software development process. Objectives. This thesis uses machine learning methods for an approximation of review expert’s performance evaluation function. Due to limitations in ...

  7. Recycling source terms for edge plasma fluid models and impact on convergence behaviour of the BRAAMS 'B2' code

    International Nuclear Information System (INIS)

    Maddison, G.P.; Reiter, D.

    1994-02-01

    Predictive simulations of tokamak edge plasmas require the most authentic description of neutral particle recycling sources, not merely the most expedient numerically. Employing a prototypical ITER divertor arrangement under conditions of high recycling, trial calculations with the 'B2' steady-state edge plasma transport code, plus varying approximations or recycling, reveal marked sensitivity of both results and its convergence behaviour to details of sources incorporated. Comprehensive EIRENE Monte Carlo resolution of recycling is implemented by full and so-called 'shot' intermediate cycles between the plasma fluid and statistical neutral particle models. As generally for coupled differencing and stochastic procedures, though, overall convergence properties become more difficult to assess. A pragmatic criterion for the 'B2'/EIRENE code system is proposed to determine its success, proceeding from a stricter condition previously identified for one particular analytic approximation of recycling in 'B2'. Certain procedures are also inferred potentially to improve their convergence further. (orig.)

  8. Willow yield is highly dependent on clone and site

    DEFF Research Database (Denmark)

    Ugilt Larsen, Søren; Jørgensen, Uffe; Lærke, Poul Erik

    2014-01-01

    Use of high-yielding genotypes is one of the means to achieve high yield and profitability in willow (Salix spp.) short rotation coppice. This study investigated the performance of eight willow clones (Inger, Klara, Linnea, Resolution, Stina, Terra Nova, Tora, Tordis) on five Danish sites......, differing considerably in soil type, climatic conditions and management. Compared to the best clone, the yield was up to 36 % lower for other clones across sites and up to 51 % lower within sites. Tordis was superior to other clones with dry matter yields between 5.2 and 10.2 Mg ha−1 year−1 during the first...... 3-year harvest rotation, and it consistently ranked as the highest yielding clone on four of the five sites and not significantly lower than the highest yielding clone on the fifth site. The ranking of the other clones was more dependent on site with significant interaction between clone and site...

  9. Molecular analysis of Toxoplasma gondii Surface Antigen 1 (SAG1) gene cloned from Toxoplasma gondii DNA isolated from Javanese acute toxoplasmosis

    Science.gov (United States)

    Haryati, Sri; Agung Prasetyo, Afiono; Sari, Yulia; Dharmawan, Ruben

    2018-05-01

    Toxoplasma gondii Surface Antigen 1 (SAG1) is often used as a diagnostic tool due to its immunodominant-specific as antigen. However, data of the Toxoplasma gondii SAG1 protein from Indonesian isolate is limited. To study the protein, genomic DNA was isolated from a Javanese acute toxoplasmosis blood samples patient. A complete coding sequence of Toxoplasma gondii SAG1 was cloned and inserted into an Escherichia coli expression plasmid and sequenced. The sequencing results were subjected to bioinformatics analysis. The Toxoplasma gondii SAG1 complete coding sequences were successfully cloned. Physicochemical analysis revealed the 336 aa of SAG1 had 34.7 kDa of weight. The isoelectric point and aliphatic index were 8.4 and 78.4, respectively. The N-terminal methionine half-life in Escherichia coli was more than 10 hours. The antigenicity, secondary structure, and identification of the HLA binding motifs also had been discussed. The results of this study would contribute information about Toxoplasma gondii SAG1 and benefits for further works willing to develop diagnostic and therapeutic strategies against the parasite.

  10. Application of the source term code package to obtain a specific source term for the Laguna Verde Nuclear Power Plant

    International Nuclear Information System (INIS)

    Souto, F.J.

    1991-06-01

    The main objective of the project was to use the Source Term Code Package (STCP) to obtain a specific source term for those accident sequences deemed dominant as a result of probabilistic safety analyses (PSA) for the Laguna Verde Nuclear Power Plant (CNLV). The following programme has been carried out to meet this objective: (a) implementation of the STCP, (b) acquisition of specific data for CNLV to execute the STCP, and (c) calculations of specific source terms for accident sequences at CNLV. The STCP has been implemented and validated on CDC 170/815 and CDC 180/860 main frames as well as on a Micro VAX 3800 system. In order to get a plant-specific source term, data on the CNLV including initial core inventory, burn-up, primary containment structures, and materials used for the calculations have been obtained. Because STCP does not explicitly model containment failure, dry well failure in the form of a catastrophic rupture has been assumed. One of the most significant sequences from the point of view of possible off-site risk is the loss of off-site power with failure of the diesel generators and simultaneous loss of high pressure core spray and reactor core isolation cooling systems. The probability for that event is approximately 4.5 x 10 -6 . This sequence has been analysed in detail and the release fractions of radioisotope groups are given in the full report. 18 refs, 4 figs, 3 tabs

  11. Cloning mice and men: prohibiting the use of iPS cells for human reproductive cloning.

    Science.gov (United States)

    Lo, Bernard; Parham, Lindsay; Alvarez-Buylla, Arturo; Cedars, Marcelle; Conklin, Bruce; Fisher, Susan; Gates, Elena; Giudice, Linda; Halme, Dina Gould; Hershon, William; Kriegstein, Arnold; Kwok, Pui-Yan; Wagner, Richard

    2010-01-08

    The use of iPSCs and tetraploid complementation for human reproductive cloning would raise profound ethical objections. Professional standards and laws that ban human reproductive cloning by somatic cell nuclear transfer should be revised to also forbid it by other methods, such as iPSCs via tetraploid complementation. Copyright 2010 Elsevier Inc. All rights reserved.

  12. Endangered wolves cloned from adult somatic cells.

    Science.gov (United States)

    Kim, Min Kyu; Jang, Goo; Oh, Hyun Ju; Yuda, Fibrianto; Kim, Hye Jin; Hwang, Woo Suk; Hossein, Mohammad Shamim; Kim, Joung Joo; Shin, Nam Shik; Kang, Sung Keun; Lee, Byeong Chun

    2007-01-01

    Over the world, canine species, including the gray wolf, have been gradually endangered or extinct. Many efforts have been made to recover and conserve these canids. The aim of this study was to produce the endangered gray wolf with somatic cell nuclear transfer (SCNT) for conservation. Adult ear fibroblasts from a female gray wolf (Canis lupus) were isolated and cultured in vitro as donor cells. Because of limitations in obtaining gray wolf matured oocytes, in vivo matured canine oocytes obtained by flushing the oviducts from the isthmus to the infundibulum were used. After removing the cumulus cells, the oocyte was enucleated, microinjected, fused with a donor cell, and activated. The reconstructed cloned wolf embryos were transferred into the oviducts of the naturally synchronized surrogate mothers. Two pregnancies were detected by ultrasonography at 23 days of gestation in recipient dogs. In each surrogate dog, two fetal sacs were confirmed by early pregnancy diagnosis at 23 days, but only two cloned wolves were delivered. The first cloned wolf was delivered by cesarean section on October 18, 2005, 60 days after embryo transfer. The second cloned wolf was delivered on October 26, 2005, at 61 days postembryo transfer. Microsatellite analysis was performed with genomic DNA from the donor wolf, the two cloned wolves, and the two surrogate female recipients to confirm the genetic identity of the cloned wolves. Analysis of 19 microsatellite loci confirmed that the cloned wolves were genetically identical to the donor wolf. In conclusion, we demonstrated live birth of two cloned gray wolves by nuclear transfer of wolf somatic cells into enucleated canine oocyte, indicating that SCNT is a practical approach for conserving endangered canids.

  13. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  14. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  15. [Human cloning in Muslim and Arab law].

    Science.gov (United States)

    Aldeeb Abu-Sahlieh, Sami A

    2009-01-01

    Cloning is a modern medical procedure that Muslim religious authorities treat en resorting to the general principles established by classical Muslim law based on the Koran and the Sunnah of Muhhamad as the messenger of God. In this regard, human beings are not capable of deciding what is or what is not lawful without resorting to divine norms. Cloning clashes with several principles. Firstly, the principle of the respect for life in relation to surpernumeraries, but Muslim authors are not in unanimous agreement on the determination of the moment at which life begins. Secondly, is the respect of progeny: cloning could only take place between a married couple. But even if these two principles are respected, cloning poses two major problems: the diversity of species expounded by the Koran and the Sunnah and a lack of interest. Which explains the quasi-unanimous opposition of Muslim writings regarding cloning.

  16. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  17. Telomeres and the ethics of human cloning.

    Science.gov (United States)

    Allhoff, Fritz

    2004-01-01

    In search of a potential problem with cloning, I investigate the phenomenon of telomere shortening which is caused by cell replication; clones created from somatic cells will have shortened telomeres and therefore reach a state of senescence more rapidly. While genetic intervention might fix this problem at some point in the future, I ask whether, absent technological advances, this biological phenomenon undermines the moral permissibility of cloning.

  18. Gaussian cloning of coherent states with known phases

    International Nuclear Information System (INIS)

    Alexanian, Moorad

    2006-01-01

    The fidelity for cloning coherent states is improved over that provided by optimal Gaussian and non-Gaussian cloners for the subset of coherent states that are prepared with known phases. Gaussian quantum cloning duplicates all coherent states with an optimal fidelity of 2/3. Non-Gaussian cloners give optimal single-clone fidelity for a symmetric 1-to-2 cloner of 0.6826. Coherent states that have known phases can be cloned with a fidelity of 4/5. The latter is realized by a combination of two beam splitters and a four-wave mixer operated in the nonlinear regime, all of which are realized by interaction Hamiltonians that are quadratic in the photon operators. Therefore, the known Gaussian devices for cloning coherent states are extended when cloning coherent states with known phases by considering a nonbalanced beam splitter at the input side of the amplifier

  19. [The discrete horror of cloning].

    Science.gov (United States)

    Guibourg, Ricardo A

    2009-01-01

    The author raises the topic of cloning after the decision of the Argentine government, which concerned for the "dignity of the human person", passed a decree of need and urgency, No. 200/97 (Annex), prohibiting cloning experiments with human beings. Therefore, considering that the topic is so terribly urgent and necessary, the author feels it is timely to consider it.

  20. Isolation and Cloning of mercuric reductase gene (merA from mercury-resistant bacteria

    Directory of Open Access Journals (Sweden)

    Parisa Khoshniyat

    2018-03-01

    Full Text Available Introduction: Some of the bacteria having merA gene coding mineral mercury reducing enzyme, has genetic potential of Hg removing via reduction of mineral mercury and transformation of that to gas form and finally bioremediation of polluted area. The aim of this study is the isolation of merA gene from resistance bacteria and cloning of that into suitable expression vector and then the environmental bioremediation by the transformation of bacteria with this vector. Materials and methods: A number of bacteria were collected in contaminated areas with mercury in order to isolate merA genes. Polymerase chain reaction had done on the four bacterial genomes including Klebsiella pneumoniae, Pseudomonas aeruginosa, Serratia marcescens and Escherichia coli using the specific primers in order to detect merA gene. For cloning, the primers containing restriction enzyme sites are used, merA gene was isolated and amplified. The amplified fragments were cloned in the expression vector pET21a+ and via heat shock method were transformed into E. coli TOP10 competent cell. For clustering of genes, Mega software version 4 was used and bioanformatic studies were achieved for predicted enzyme. Results: merA gene with 1686 bp in length was isolated from K pneumoniae and E. coli. Recombinant vectors in transgenic bacteria were confirmed by various methods and finally were confirmed by sequencing. The result of clustering these genes with existence genes in NCBI showed high similarity. Discussion and conclusion: The existence of merA gene in bacteria that adapted to Hg pollution area is because of resistance, so with cloning this gene into suitable expression vector and transformation of susceptible bacteria with this vector ability of resistance to Hg in bacteria for bioremediation could be given.

  1. Technological Literacy and Human Cloning. Resources in Technology.

    Science.gov (United States)

    Baird, Steven L.

    2002-01-01

    Discusses how technology educators can deal with advances in human genetics, specifically, cloning. Includes a definition and history of cloning, discusses its benefits, and looks at social concerns and arguments for and against human cloning. Includes classroom activities and websites. (Contains 10 references.) (JOW)

  2. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  3. Active Fault Near-Source Zones Within and Bordering the State of California for the 1997 Uniform Building Code

    Science.gov (United States)

    Petersen, M.D.; Toppozada, Tousson R.; Cao, T.; Cramer, C.H.; Reichle, M.S.; Bryant, W.A.

    2000-01-01

    The fault sources in the Project 97 probabilistic seismic hazard maps for the state of California were used to construct maps for defining near-source seismic coefficients, Na and Nv, incorporated in the 1997 Uniform Building Code (ICBO 1997). The near-source factors are based on the distance from a known active fault that is classified as either Type A or Type B. To determine the near-source factor, four pieces of geologic information are required: (1) recognizing a fault and determining whether or not the fault has been active during the Holocene, (2) identifying the location of the fault at or beneath the ground surface, (3) estimating the slip rate of the fault, and (4) estimating the maximum earthquake magnitude for each fault segment. This paper describes the information used to produce the fault classifications and distances.

  4. Clonal analysis of T-cell responses to herpes simplex virus: isolation, characterization and antiviral properties of an antigen-specific helper T-cell clone.

    Science.gov (United States)

    Leung, K N; Nash, A A; Sia, D Y; Wildy, P

    1984-12-01

    A herpes simplex virus (HSV)-specific long-term T-cell clone has been established from the draining lymph node cells of BALB/c mice; the cells required repeated in vitro restimulation with UV-irradiated virus. The established T-cell clone expresses the Thy-1 and Lyt-1+2,3- surface antigens. For optimal proliferation of the cloned cells, both the presence of specific antigen and an exogenous source of T-cell growth factor are required. The proliferative response of the cloned T cells was found to be virus-specific but it did not distinguish between HSV-1 and HSV-2. Adoptive cell transfer of the cloned T cells helped primed B cells to produce anti-herpes antibodies: the response was antigen-specific and cell dose-dependent. The clone failed to produce a significant DTH reaction in vivo, but did produce high levels of macrophage-activating factor. Furthermore, the T-cell clone could protect from HSV infection, as measured by a reduction in local virus growth, and by enhanced survival following the challenge of mice with a lethal dose of virus. The mechanism(s) whereby this clone protects in vivo is discussed.

  5. Genetic superiority of exotic clones over indigenous clones for quantitative and qualitative traits

    International Nuclear Information System (INIS)

    Khan, I.A.; Khatri, A.; Ahmad, M.; Siddiqui, N.A.; Dahar, M.H.; Khanzada, M.H.; Nizamani, G.S.

    1997-01-01

    Seventeen exotic sugar cane clones along with two local checks (BL4 and L116) were planted for three consecutive years (1989-90 to 1991-92) and evaluated for cane yield, yield components (plant height, cane girth, stalks per stool, stool weight), fibre, sucrose and sugar yield. Two exotic clones AEC82-1026 and AEC86-329 proved to be significantly (p< 0.05) superior in cane yield (130.62 and 114.87 t/ha respectively) and sugar yield 18.10 and 19.33 t/ha respectively) to both checks, cane and sugar yield of BL4 were 100.73 and 12.69 t/ha and that of L116 were 74.19 11.03 t/ha respectively. Cane and sugar yields were positively (P<0.01) correlated with plant height, cane girth and weight per stool. These promising clones would be subjected to extensive studies for cane yield in different parts of Sindh province. (author)

  6. Preservation and Reproduction of Microminipigs by Cloning Technology.

    Science.gov (United States)

    Enya, Satoko; Kawarasaki, Tatsuo; Otake, Masayoshi; Kangawa, Akihisa; Uenishi, Hirohide; Mikawa, Satoshi; Nishimura, Takashi; Kuwahawa, Yasushi; Shibata, Masatoshi

    Microminipigs have been maintained in small populations of closed colonies, involving risks of inbreeding depression and genetic drift. In order to avoid these risks, we assessed the applicability of cloning technology. Male and female clones were produced from a stock of cryopreserved somatic cells, obtaining offspring by means of natural mating. Phenotypic and genotypic characteristics of original microminipigs, clones and their offspring were analyzed and recorded. Clones presented characteristics similar to those of the cell-stock data. Although the body weight of clones tended to be heavier than that of the cell-stock data, body weights of their offspring were similar to those of previous reports. Thus, cloned microminipigs have the potential to be a valuable genetic resource for reproduction and breeding. Our proposed methodology might be useful to provide a large number of animals with adequate quality from a limited population with sufficient genetic diversity. Copyright © 2016 International Institute of Anticancer Research (Dr. John G. Delinassios), All rights reserved.

  7. [Product safety analysis of somatic cell cloned bovine].

    Science.gov (United States)

    Hua, Song; Lan, Jie; Song, Yongli; Lu, Chenglong; Zhang, Yong

    2010-05-01

    Somatic cell cloning (nuclear transfer) is a technique through which the nucleus (DNA) of a somatic cell is transferred into an enucleated oocyte for the generation of a new individual, genetically identical to the somatic cell donor. It could be applied for the enhancement of reproduction rate and the improvement of food products involving quality, yield and nutrition. In recent years, the United States, Japan and Europe as well as other countries announced that meat and milk products made from cloned cattle are safe for human consumption. Yet, cloned animals are faced with a wide range of health problems, with a high death rate and a high incidence of disease. The precise causal mechanisms for the low efficiency of cloning remain unclear. Is it safe that any products from cloned animals were allowed into the food supply? This review focuses on the security of meat, milk and products from cloned cattle based on the available data.

  8. Generating West Nile Virus from an Infectious Clone.

    Science.gov (United States)

    Vandergaast, Rianna; Fredericksen, Brenda L

    2016-01-01

    WNV infectious clones are valuable tools for elucidating WNV biology. Nevertheless, relatively few infectious WNV clones have been generated because their construction is hampered by the instability of flaviviral genomes. More recently, advances in cloning techniques as well as the development of several two-plasmid WNV infectious clone systems have facilitated the generation of WNV infectious clones. Here we described a protocol for recovering WNV from a two-plasmid system. In this approach, large quantities of these constructs are digested with restriction enzymes to produce complementary restriction sites at the 3' end of the upstream fragment and the 5' end of the downstream fragment. These fragments are then annealed to produce linear template for in vitro transcription to synthesize infectious RNA. The resulting RNA is transfected into cells and after several days WNV is recovered in the culture supernatant. This method can be used to generate virus from infectious clones encoding high- and low-pathogenicity strains of WNV, as well as chimeric virues.

  9. Recent advances in coding theory for near error-free communications

    Science.gov (United States)

    Cheung, K.-M.; Deutsch, L. J.; Dolinar, S. J.; Mceliece, R. J.; Pollara, F.; Shahshahani, M.; Swanson, L.

    1991-01-01

    Channel and source coding theories are discussed. The following subject areas are covered: large constraint length convolutional codes (the Galileo code); decoder design (the big Viterbi decoder); Voyager's and Galileo's data compression scheme; current research in data compression for images; neural networks for soft decoding; neural networks for source decoding; finite-state codes; and fractals for data compression.

  10. Restriction enzyme body doubles and PCR cloning: on the general use of type IIs restriction enzymes for cloning.

    Science.gov (United States)

    Tóth, Eszter; Huszár, Krisztina; Bencsura, Petra; Kulcsár, Péter István; Vodicska, Barbara; Nyeste, Antal; Welker, Zsombor; Tóth, Szilvia; Welker, Ervin

    2014-01-01

    The procedure described here allows the cloning of PCR fragments containing a recognition site of the restriction endonuclease (Type IIP) used for cloning in the sequence of the insert. A Type IIS endonuclease--a Body Double of the Type IIP enzyme--is used to generate the same protruding palindrome. Thus, the insert can be cloned to the Type IIP site of the vector without digesting the PCR product with the same Type IIP enzyme. We achieve this by incorporating the recognition site of a Type IIS restriction enzyme that cleaves the DNA outside of its recognition site in the PCR primer in such a way that the cutting positions straddle the desired overhang sequence. Digestion of the PCR product by the Body Double generates the required overhang. Hitherto the use of Type IIS restriction enzymes in cloning reactions has only been used for special applications, the approach presented here makes Type IIS enzymes as useful as Type IIP enzymes for general cloning purposes. To assist in finding Body Double enzymes, we summarised the available Type IIS enzymes which are potentially useful for Body Double cloning and created an online program (http://group.szbk.u-szeged.hu/welkergr/body_double/index.html) for the selection of suitable Body Double enzymes and the design of the appropriate primers.

  11. Generic programming for deterministic neutron transport codes

    International Nuclear Information System (INIS)

    Plagne, L.; Poncot, A.

    2005-01-01

    This paper discusses the implementation of neutron transport codes via generic programming techniques. Two different Boltzmann equation approximations have been implemented, namely the Sn and SPn methods. This implementation experiment shows that generic programming allows us to improve maintainability and readability of source codes with no performance penalties compared to classical approaches. In the present implementation, matrices and vectors as well as linear algebra algorithms are treated separately from the rest of source code and gathered in a tool library called 'Generic Linear Algebra Solver System' (GLASS). Such a code architecture, based on a linear algebra library, allows us to separate the three different scientific fields involved in transport codes design: numerical analysis, reactor physics and computer science. Our library handles matrices with optional storage policies and thus applies both to Sn code, where the matrix elements are computed on the fly, and to SPn code where stored matrices are used. Thus, using GLASS allows us to share a large fraction of source code between Sn and SPn implementations. Moreover, the GLASS high level of abstraction allows the writing of numerical algorithms in a form which is very close to their textbook descriptions. Hence the GLASS algorithms collection, disconnected from computer science considerations (e.g. storage policy), is very easy to read, to maintain and to extend. (authors)

  12. Evaluación de patógenos en clones de lulo (Solanum quitoense Lam. Pathogenity evaluation on Solanum quitoense Lam. Clones

    Directory of Open Access Journals (Sweden)

    Consuelo Montes Rojas

    2010-04-01

    Full Text Available En el noroccidente de Popayán, Colombia, se evaluó la presencia de plagas causadas por patógenos en 42 clones de lulo (Solanum quitoense Lam.. Los clones fueron plantados en bolsas plásticas, donde se desarrollaron por 3 semanas antes de ser trasplantados al campo. Se utilizó un diseño de bloques completos al azar con cuatro repeticiones, la parcela útil estuvo conformada por 6 plantas, las cuales se sembraron a ‘tresbolillo’ a 2.5 m entre surcos y 2 m entre plantas. Para determinar el efecto de las plagas en el cultivo, se calculó el porcentaje de incidencia y severidad del ataque. La incidencia se evaluó como porcentaje de plantas afectadas, y la severidad como porcentaje de tejido afectado por el patógeno. Las enfermedades más limitantes para los 42 clones fueron: gota (Phytophthora infestans que provocó una mortalidad de plantas superior a 40%; fusarium (Fusarium oxysporum que se presentó en 12 de los clones evaluados; antracnosis (Colletotrichum sp. que afectó 21 clones, los cuales se clasificaron entre tolerantes y medianamente tolerantes; y mancha clorótica (Cladosporium sp. que afectó 21 clones, clasificados como susceptibles. Los clones PL19, PL24, PL11, PL35 fueron medianamente tolerantes. Se seleccionaron por supervivencia los clones: JY E1 (52.2%, PH E 1 (45.8%, VM E2 (45.8%; por supervivencia y por tolerancia a Fusarium oxysporum los clones PL35, PL11, PL24, PL8, PL19, 120052, 120043, ORE1, AGE1. Los clones SER 7, SER 15, SER 9, SEC 31, SEC 27 presentaron alta mortalidad pero se seleccionaron por ser medianamente tolerantes a gota, tolerantes a antracnosis y medianamente resistentes a nematodos, con buen vigor y producción.Presence of plant disease caused by pathogens on 42 clones of Solanum quitoense Lam. were evaluated in the north-western region of Popayán, Colombia. The seed of the clons were planted in plastic bags during three weeks and afterwards transplanted to the field. The statistical design

  13. Human catechol-O-methyltransferase: Cloning and expression of the membrane-associated form

    International Nuclear Information System (INIS)

    Bertocci, B.; Miggiano, V.; Da Prada, M.; Dembic, Z.; Lahm, H.W.; Malherbe, P.

    1991-01-01

    A cDNA clone for human catechol-O-methyltransferase was isolated from a human hepatoma cell line (Hep G2) cDNA library by hybridization screening with a porcine cDNA probe. The cDNA clone was sequenced and found to have an insert of 1226 nucleotides. The deduced primary structure of hCOMT is composed of 271 amino acid residues with the predicted molecular mass of 30 kDa. At its N terminus it has a hydrophobic segment of 21 amino acid residues that may be responsible for insertion of hCOMT into the endoplasmic reticulum membrane. The primary structure of hCOMT exhibits high homology to the porcine partial cDNA sequence (93%). The deduced amino acid sequence contains two tryptic peptide sequences (T-22, T-33) found in porcine liver catechol-O-methyltransferase (CEMT). The coding region of hCOMT cDNA was placed under the control of the cytomegalovirus promoter to transfect human kidney 293 cells. The recombinant hCOMT was shown by immunoblot analysis to be mainly associated with the membrane fraction. RNA blot analysis revealed one COMT mRNA transcript of 1.4 kilobases in Hep G2 poly(A) + RNA

  14. Elephant grass clones for silage production

    Directory of Open Access Journals (Sweden)

    Rerisson José Cipriano dos Santos

    2013-02-01

    Full Text Available Ensiling warm-season grasses often requires wilting due to their high moisture content, and the presence of low-soluble sugars in these grasses usually demands the use of additives during the ensiling process. This study evaluated the bromatological composition of the fodder and silage from five Pennisetum sp. clones (IPA HV 241, IPA/UFRPE Taiwan A-146 2.114, IPA/UFRPE Taiwan A-146 2.37, Elephant B, and Mott. The contents of 20 Polyvinyl chloride (PVC silos, which were opened after 90 days of storage, were used for the bromatological analysis and the evaluation of the pH, nitrogen, ammonia, buffer capacity, soluble carbohydrates, and fermentation coefficients. The effluent losses, gases and dry matter recovery were also calculated. Although differences were observed among the clones (p < 0.05 for the concentrations of dry matter, insoluble nitrogen in acid detergents, insoluble nitrogen in neutral detergents, soluble carbohydrates, fermentation coefficients, and in vitro digestibility in the forage before ensiling, no differences were observed for most of these variables after ensiling. All of the clones were efficient in the fermentation process. The IPA/UFRPE TAIWAN A-146 2.37 clone, however, presented a higher dry matter concentration and the best fermentation coefficient, resulting in a better silage quality, compared to the other clones.

  15. Low-Complexity Compression Algorithm for Hyperspectral Images Based on Distributed Source Coding

    Directory of Open Access Journals (Sweden)

    Yongjian Nian

    2013-01-01

    Full Text Available A low-complexity compression algorithm for hyperspectral images based on distributed source coding (DSC is proposed in this paper. The proposed distributed compression algorithm can realize both lossless and lossy compression, which is implemented by performing scalar quantization strategy on the original hyperspectral images followed by distributed lossless compression. Multilinear regression model is introduced for distributed lossless compression in order to improve the quality of side information. Optimal quantized step is determined according to the restriction of the correct DSC decoding, which makes the proposed algorithm achieve near lossless compression. Moreover, an effective rate distortion algorithm is introduced for the proposed algorithm to achieve low bit rate. Experimental results show that the compression performance of the proposed algorithm is competitive with that of the state-of-the-art compression algorithms for hyperspectral images.

  16. Living Up to the Code's Exhortations? Social Workers' Political Knowledge Sources, Expectations, and Behaviors.

    Science.gov (United States)

    Felderhoff, Brandi Jean; Hoefer, Richard; Watson, Larry Dan

    2016-01-01

    The National Association of Social Workers' (NASW's) Code of Ethics urges social workers to engage in political action. However, little recent research has been conducted to examine whether social workers support this admonition and the extent to which they actually engage in politics. The authors gathered data from a survey of social workers in Austin, Texas, to address three questions. First, because keeping informed about government and political news is an important basis for action, the authors asked what sources of knowledge social workers use. Second, they asked what the respondents believe are appropriate political behaviors for other social workers and NASW. Third, they asked for self-reports regarding respondents' own political behaviors. Results indicate that social workers use the Internet and traditional media services to stay informed; expect other social workers and NASW to be active; and are, overall, more active than the general public in many types of political activities. The comparisons made between expectations for others and their own behaviors are interesting in their complex outcomes. Social workers should strive for higher levels of adherence to the code's urgings on political activity. Implications for future work are discussed.

  17. Challenges in regulating farm animal cloning

    DEFF Research Database (Denmark)

    Gunning, Jennifer; Hartlev, Mette; Gamborg, Christian

    Report from the project Cloning in Public: A specific support action within the 6th framework programme, priority 5: Food quality and safety......Report from the project Cloning in Public: A specific support action within the 6th framework programme, priority 5: Food quality and safety...

  18. The science and technology of farm animal cloning

    DEFF Research Database (Denmark)

    Gjerris, Mickey; Vajta, Gábor

    , goats, horses, cats, etc. have been cloned with the somatic cell nuclear transfer technique. Although the technology still has relatively low success rates and there seems to be substantial problems with the welfare of some of the cloned animals, cloning is used both within basic research...... include the production of genetically identical animals for research purposes, and also the creation of genetically modified animals. In the agricultural sector, cloning can be used as a tool within farm animal breeding. We do not intend to give an exhaustive review of the all the literature available...

  19. Whether and Where to Code in the Wireless Relay Channel

    DEFF Research Database (Denmark)

    Shi, Xiaomeng; Médard, Muriel; Roetter, Daniel Enrique Lucani

    2013-01-01

    The throughput benefits of random linear network codes have been studied extensively for wirelined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations. In energy-constrained systems, however, coding subgraphs should be chosen to control...... the number of coding nodes while maintaining throughput. In this paper, we explore the strategic use of network coding in the wireless packet erasure relay channel according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half......-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. In addition to transmission energy, we take into account coding and reception...

  20. Production of cloned mice and ES cells from adult somatic cells by nuclear transfer: how to improve cloning efficiency?

    Science.gov (United States)

    Wakayama, Teruhiko

    2007-02-01

    Although it has now been 10 years since the first cloned mammals were generated from somatic cells using nuclear transfer (NT), most cloned embryos usually undergo developmental arrest prior to or soon after implantation, and the success rate for producing live offspring by cloning remains below 5%. The low success rate is believed to be associated with epigenetic errors, including abnormal DNA hypermethylation, but the mechanism of "reprogramming" is unclear. We have been able to develop a stable NT method in the mouse in which donor nuclei are directly injected into the oocyte using a piezo-actuated micromanipulator. Especially in the mouse, only a few laboratories can make clones from adult somatic cells, and cloned mice are never successfully produced from most mouse strains. However, this technique promises to be an important tool for future research in basic biology. For example, NT can be used to generate embryonic stem (NT-ES) cell lines from a patient's own somatic cells. We have shown that NT-ES cells are equivalent to ES cells derived from fertilized embryos and that they can be generated relatively easily from a variety of mouse genotypes and cell types of both sexes, even though it may be more difficult to generate clones directly. In general, NT-ES cell techniques are expected to be applied to regenerative medicine; however, this technique can also be applied to the preservation of genetic resources of mouse strain instead of embryos, oocytes and spermatozoa. This review describes how to improve cloning efficiency and NT-ES cell establishment and further applications.

  1. Clone Detection for Graph-Based Model Transformation Languages

    DEFF Research Database (Denmark)

    Strüber, Daniel; Plöger, Jennifer; Acretoaie, Vlad

    2016-01-01

    and analytical quality assurance. From these use cases, we derive a set of key requirements. We describe our customization of existing model clone detection techniques allowing us to address these requirements. Finally, we provide an experimental evaluation, indicating that our customization of ConQAT, one......Cloning is a convenient mechanism to enable reuse across and within software artifacts. On the downside, it is also a practice related to significant long-term maintainability impediments, thus generating a need to identify clones in affected artifacts. A large variety of clone detection techniques...... has been proposed for programming and modeling languages; yet no specific ones have emerged for model transformation languages. In this paper, we explore clone detection for graph-based model transformation languages. We introduce potential use cases for such techniques in the context of constructive...

  2. Molecular cloning and expression of bovine kappa-casein in Escherichia coli

    International Nuclear Information System (INIS)

    Kang, Y.C.; Richardson, T.

    1988-01-01

    A cDNA library was constructed using poly(A) + RNA from bovine mammary gland. This cDNA library of 6000 clones was screened employing colony hybridization using 32 P-labelled oligonucleotide probes and restriction endonuclease mapping. The cDNA from the selected plasmid, pKR76, was sequenced using the dideoxy-chain termination method. The cDNA insert of pKR76 carries the full-length sequence, which codes for mature kappa-casein protein. The amino acid sequence deduced from the cDNA sequence fits the published amino acid sequence with three exceptions; the reported pyroglutamic acid at position 1, tyrosine at position 35, and aspartic acid at position 81 are, respectively, a glutamine, a histidine, and an asparagine in the clone containing pKR76. The MspI-, NlaIV-cleaved fragment (630 base pair) from the kappa-casein cDNA insert has been subcloned into expression vectors pUC18 and pKK233-2, which contain a lac promoter and a trc promoter, respectively. Escherichia coli cells carrying the recombinant expression plasmids were shown to produce kappa-casein protein having the expected mobility on sodium dodecyl sulfate-polyacrylamide gel electrophoresis and being recognized by specific antibodies raised against natural bovine kappa-casein

  3. Integrative annotation of 21,037 human genes validated by full-length cDNA clones.

    Directory of Open Access Journals (Sweden)

    Tadashi Imanishi

    2004-06-01

    Full Text Available The human genome sequence defines our inherent biological potential; the realization of the biology encoded therein requires knowledge of the function of each gene. Currently, our knowledge in this area is still limited. Several lines of investigation have been used to elucidate the structure and function of the genes in the human genome. Even so, gene prediction remains a difficult task, as the varieties of transcripts of a gene may vary to a great extent. We thus performed an exhaustive integrative characterization of 41,118 full-length cDNAs that capture the gene transcripts as complete functional cassettes, providing an unequivocal report of structural and functional diversity at the gene level. Our international collaboration has validated 21,037 human gene candidates by analysis of high-quality full-length cDNA clones through curation using unified criteria. This led to the identification of 5,155 new gene candidates. It also manifested the most reliable way to control the quality of the cDNA clones. We have developed a human gene database, called the H-Invitational Database (H-InvDB; http://www.h-invitational.jp/. It provides the following: integrative annotation of human genes, description of gene structures, details of novel alternative splicing isoforms, non-protein-coding RNAs, functional domains, subcellular localizations, metabolic pathways, predictions of protein three-dimensional structure, mapping of known single nucleotide polymorphisms (SNPs, identification of polymorphic microsatellite repeats within human genes, and comparative results with mouse full-length cDNAs. The H-InvDB analysis has shown that up to 4% of the human genome sequence (National Center for Biotechnology Information build 34 assembly may contain misassembled or missing regions. We found that 6.5% of the human gene candidates (1,377 loci did not have a good protein-coding open reading frame, of which 296 loci are strong candidates for non-protein-coding RNA

  4. Estradiol-Induced Transcriptional Regulation of Long Non-Coding RNA, HOTAIR.

    Science.gov (United States)

    Bhan, Arunoday; Mandal, Subhrangsu S

    2016-01-01

    HOTAIR (HOX antisense intergenic RNA) is a 2.2 kb long non-coding RNA (lncRNA), transcribed from the antisense strand of homeobox C (HOXC) gene locus in chromosome 12. HOTAIR acts as a scaffolding lncRNA. It interacts and guides various chromatin-modifying complexes such as PRC2 (polycomb-repressive complex 2) and LSD1 (lysine-specific demethylase 1) to the target gene promoters leading to their gene silencing. Various studies have demonstrated that HOTAIR overexpression is associated with breast cancer. Recent studies from our laboratory demonstrate that HOTAIR is required for viability of breast cancer cells and is transcriptionally regulated by estradiol (E2) in vitro and in vivo. This chapter describes protocols for analysis of the HOTAIR promoter, cloning, transfection and dual luciferase assays, knockdown of protein synthesis by antisense oligonucleotides, and chromatin immunoprecipitation (ChIP) assay. These protocols are useful for studying the estrogen-mediated transcriptional regulation of lncRNA HOTAIR, as well as other protein coding genes and non-coding RNAs.

  5. Photonic quantum simulator for unbiased phase covariant cloning

    Science.gov (United States)

    Knoll, Laura T.; López Grande, Ignacio H.; Larotonda, Miguel A.

    2018-01-01

    We present the results of a linear optics photonic implementation of a quantum circuit that simulates a phase covariant cloner, using two different degrees of freedom of a single photon. We experimentally simulate the action of two mirrored 1→ 2 cloners, each of them biasing the cloned states into opposite regions of the Bloch sphere. We show that by applying a random sequence of these two cloners, an eavesdropper can mitigate the amount of noise added to the original input state and therefore, prepare clones with no bias, but with the same individual fidelity, masking its presence in a quantum key distribution protocol. Input polarization qubit states are cloned into path qubit states of the same photon, which is identified as a potential eavesdropper in a quantum key distribution protocol. The device has the flexibility to produce mirrored versions that optimally clone states on either the northern or southern hemispheres of the Bloch sphere, as well as to simulate optimal and non-optimal cloning machines by tuning the asymmetry on each of the cloning machines.

  6. Binary Systematic Network Coding for Progressive Packet Decoding

    OpenAIRE

    Jones, Andrew L.; Chatzigeorgiou, Ioannis; Tassi, Andrea

    2015-01-01

    We consider binary systematic network codes and investigate their capability of decoding a source message either in full or in part. We carry out a probability analysis, derive closed-form expressions for the decoding probability and show that systematic network coding outperforms conventional net- work coding. We also develop an algorithm based on Gaussian elimination that allows progressive decoding of source packets. Simulation results show that the proposed decoding algorithm can achieve ...

  7. Cloning and characterization of stress responsive Glp genes and their promotor regions from rice (abstract)

    International Nuclear Information System (INIS)

    Naqvi, S.M.S.; Mahmood, T.

    2005-01-01

    Plants respond to a number of environmental stimuli by modulating expression of genes. One such family of genes is now known as germin/germin-like protein genes (Glps). In order to detect any Glp gene response in rice, a pair of degenerate primers was designed based on consensus region from Glp sequences in Genbank. Using these primers a DNA fragment of about 550 bp was obtained by PCR amplification from genomic template. This 550 bp DNA was used as probe in Northern analysis. These studies provided evidence pointing to differential response of Glp expression to salt stress. RNA obtained from the roots was used for synthesis of cDNA. This cDNA was amplifiable with sense primer (RGLP1) from above mentioned pair and oligo-(dt) yielding a fragment of approx. 800 bp. Restriction analysis revealed that the PCR product was heterogeneous. After establishing that 800 bp fragment was the desired product, it was cloned in pCRII-TOPO. Five clones were picked up and analyzed by restriction analysis and sequencing. Two different Glp cDNAs were represented by these partial clones. Remaining sequence of the 5' end for clone 4 and 16 was obtained by Rapid Amplification of cDNA ends (RACE). The resultant sequences have been submitted to Genbank as Oryza sativa Rice Germin-like Protein 1 and 2 (osRGLP1 and 2). When full length genes corresponding to these sequences were amplified from genomic templates, resulting fragments were nearly 150 by larger than cDNAs. Cloning of structural genes for osRGLP1 revealed presence of a 162 bp intron in the coding region near 3' end. Preliminary evidence shows that expression of both osRGLP1 and 2 is severely reduced during salt stress. Another approach to establish both osRGLP1 and 2 genes involvement in stress tolerance is to study the ability of their promotor regions to drive expression of some reporter gene during stress. Promotor regions of about 1100 bp has been amplified and cloned and has been confirmed by restriction analysis and nested

  8. Post-death cloning of endangered Jeju black cattle (Korean native cattle): fertility and serum chemistry in a cloned bull and cow and their offspring.

    Science.gov (United States)

    Kim, Eun Young; Song, Dong Hwan; Park, Min Jee; Park, Hyo Young; Lee, Seung Eun; Choi, Hyun Yong; Moon, Jeremiah Jiman; Kim, Young Hoon; Mun, Seong Ho; Oh, Chang Eon; Ko, Moon Suck; Lee, Dong Sun; Riu, Key Zung; Park, Se Pill

    2013-12-17

    To preserve Jeju black cattle (JBC; endangered native Korean cattle), a pair of cattle, namely a post-death cloned JBC bull and cow, were produced by somatic cell nuclear transfer (SCNT) in a previous study. In the present study, we examined the in vitro fertilization and reproductive potentials of these post-death cloned animals. Sperm motility, in vitro fertilization and developmental capacity were examined in a post-death cloned bull (Heuk Oll Dolee) and an extinct nuclear donor bull (BK94-13). We assessed reproductive ability in another post-death cloned cow (Heuk Woo Sunee) using cloned sperm for artificial insemination (AI). There were no differences in sperm motility or developmental potential of in vitro fertilized embryos between the post-death cloned bull and its extinct nuclear donor bull; however, the embryo development ratio was slightly higher in the cloned sperm group than in the nuclear donor sperm group. After one attempt at AI, the post-death cloned JBC cow became pregnant, and gestation proceeded normally until day 287. From this post-death cloned sire and dam, a JBC male calf (Heuk Woo Dolee) was delivered naturally (weight, 25 kg). The genetic paternity/maternity of the cloned JBC bull and cow with regard to their offspring was confirmed using International Society for Animal Genetics standard microsatellite markers. Presently, Heuk Woo Dolee is 5 months of age and growing normally. In addition, there were no significant differences in blood chemistry among the post-death cloned JBC bull, the cow, their offspring and cattle bred by AI. This is the first report showing that a pair of cattle, namely, a post-death cloned JBC bull and cow, had normal fertility. Therefore, SCNT can be used effectively to increase the population of endangered JBC.

  9. Cloning: Past, Present, and the Exciting Future. Breakthroughs in Bioscience.

    Science.gov (United States)

    Di Berardino, Marie A.

    This document explores the history of cloning by focusing on Dolly the Sheep, one of the first large animal clonings. The disadvantages and advantages of transgenic clones are discussed as well as the future implications of cloning from the perspective of human health. (Contains 10 resources.) (YDS)

  10. OXA-48 and CTX-M-15 extended-spectrum beta-lactamases in raw milk in Lebanon: epidemic spread of dominant Klebsiella pneumoniae clones.

    Science.gov (United States)

    Diab, Mohamad; Hamze, Monzer; Bonnet, Richard; Saras, Estelle; Madec, Jean-Yves; Haenni, Marisa

    2017-11-01

    Raw milk has recently been reported as a source of extended-spectrum beta-lactamase (ESBL) and carbapenemase genes. We thus investigated the prevalence of ESBL- and carbapenemase-producing Enterobacteriaceae in raw milk in Lebanon in order to assess the risk of transfer of these bacteria to humans. A high prevalence (30.2 %) of CTX-M-15-producing K. pneumoniae was detected in raw bovine milk. Three main K. pneumoniae clones were identified by PFGE and MLST typing. Southern blot experiments revealed that one of these clones carried the blaCTX-M-15 gene chromosomally. Moreover, one OXA-48-producing K. pneumoniae ST530 and seven CTX-M-15-producing Escherichia coli sharing the same ST were also detected. These findings highlight the spread of dominant CTX-M-15-producing K. pneumoniae clones and OXA-48-producing isolates in the food chain. Milk, which is mostly consumed raw in Lebanon, may be a source of human exposure to ESBLs and carbapenemases.

  11. Transfer of experimental autoimmune thyroiditis with T cell clones

    International Nuclear Information System (INIS)

    Romball, C.G.; Weigle, W.O.

    1987-01-01

    We have investigated three T lymphocyte clones isolated from CBA/CaJ mice primed with mouse thyroid extract (MTE) in adjuvant. All three clones are L3T4+, Ig-, and Lyt2- and proliferate to MTE, mouse thyroglobulin (MTG) and rat thyroid extract. Clones A7 and B7 transfer thyroiditis to irradiated (475 rad) syngeneic mice, but not to normal recipients. The thyroid lesion induced by the B7 clone is characterized by the infiltration of both mononuclear and polymorphonuclear cells. The thyroiditis is transient in that lesions are apparent 7 and 14 days after transfer, but thyroids return to normal by day 21. Clone B7 showed helper activity for trinitrophenyl-keyhole limpet hemocyanin-primed B cells in vitro when stimulated with trinitrophenyl-MTG and also stimulated the production of anti-MTG antibody in recipient mice. Clone A7 induced thyroid lesions characterized by infiltration of the thyroid with mononuclear cells, with virtually no polymorphonuclear cell infiltration. This clone has shown no helper activity following stimulation with trinitrophenyl-MTG. The third clone (D2) proliferates to and shows helper activity to MTG, but fails to transfer thyroiditis to syngeneic, irradiated mice. On continuous culture, clone B7 lost its surface Thy. The loss of Thy appears unrelated to the ability to transfer thyroiditis since subclones of B7 with markedly different percentages of Thy+ cells transferred disease equally well

  12. The evaluation of growth dynamics of Lonicera kamtschatica clones

    Directory of Open Access Journals (Sweden)

    Ján Matuškovič

    2007-01-01

    Full Text Available Artickle deals with the evaluation of growth dynamics of selected set of clones Lonicera kamtschatica in the conditions of Nitra. We measured the growth of the shrubs twice a year (in spring and autumn during 2003–2005. Within all clones 5 shrubs were evaluated. On the basis of the obtained results we can claim the highest increase of height in case of LKL 21 followed by clones LKL 16 and LKL 5. The lowest growth increase was typical for LKL 58 and LKL 66.In term of statistical evaluation the year can be considered as a statistically significant factor forming a growth intensity of clones during 2003–2005. The effect of year on growing processes is strong (ε2 = 0.96 while the participation of year with clone influenced the growth increase in medium size (ε2 = 0.42. LKL 21 and LKL 58 in comparison with other clones are the most disperatable in term of growth increase. Within mentioned clones statistically significant differences were recorded in 7 evaluated pairs. In the same way LKL 42 is very different from another clones as well. On the basis of all provided analysis the tested clones from point of wiev perspectivity of planting can be set up in the following order: LKL 21, LKL 16, LKL 5, LKL 42, LKL 49, LKL 96, LKL 6, LKL 60, LKL 66 and LKL 58.

  13. cDNA cloning of porcine brain prolyl endopeptidase and identification of the active-site seryl residue

    Energy Technology Data Exchange (ETDEWEB)

    Rennex, D.; Hemmings, B.A.; Hofsteenge, J.; Stone, S.R. (Friedrich Miescher-Institut, Basel (Switzerland))

    1991-02-26

    Prolyl endopeptidase is a cytoplasmic serine protease. The enzyme was purified from porcine kidney, and oligonucleotides based on peptide sequences from this protein were used to isolate a cDNA clone from a porcine brain library. This clone contained the complete coding sequence of prolyl endopeptidase and encoded a polypeptide with a molecular mass of 80751 Da. The deduced amino acid sequence of prolyl endopeptidase showed no sequence homology with other known serine proteases. ({sup 3}H)Diisopropyl fluorophosphate was used to identify the active-site serine of prolyl endopeptidase. One labeled peptide was isolated and sequenced. The sequence surrounding the active-site serine was Asn-Gly-Gly-Ser-Asn-Gly-Gly. This sequence is different from the active-site sequences of other known serine proteases. This difference and the lack of overall homology with the known families of serine proteases suggest that prolyl endopeptidase represents a new type of serine protease.

  14. Duration of gestation in pregnant dogs carrying cloned fetuses.

    Science.gov (United States)

    Kim, Min Jung; Oh, Hyun Ju; Park, Jung Eun; Kim, Geon A; Park, Eun Jung; Jo, Young Kwang; Lee, Byeong Chun

    2013-01-15

    The aim of this study was to investigate gestation duration and the physiologic characteristics of pregnant dogs bearing cloned fetuses, especially in the prepartum period. A retrospective study was performed to compare gestation duration in females pregnant with cloned (somatic cell nuclear transfer) fetuses (cloned group) with those bearing noncloned fetuses (control group), and effects of litter size, birth weight, and breed of somatic cell donors on gestation duration in the cloned group were evaluated. Clinical delivery onset signs associated with serum progesterone concentration and rectal temperature were also compared in both groups. The gestation duration calculated from day of ovulation was significantly longer in the cloned (62.8 ± 0.3 days) versus the control group (60.9 ± 0.5 days; P dogs bearing cloned fetuses might be because of the smaller litter size in this group. Also, the weaker drop in serum progesterone levels in the prepartum period in cloned dog pregnancies indicates that the parturition signaling process might be altered resulting in longer gestation periods. Copyright © 2013 Elsevier Inc. All rights reserved.

  15. The Shiite Pluralistic Position on Human Cloning

    Directory of Open Access Journals (Sweden)

    Sayyid Hasan Islami Ardekani

    2012-01-01

    Full Text Available With regard to human cloning or artificial human reproduction – and contrary to the opinions of Sunni scholars - Shiite thinkers have not held a unified position. After having surveyed a number of Shiite fatwas and analyses on the subject, this essay will classify them into four groups. The first group states that we are granted absolute permission to engage in human cloning; while the second group believes that there is limited permission; the third group argues that cloning as such is primarily permitted but because of its consequences and secondary grounds it is prohibited and unlawful; and the fourth group is of the view that cloning as such and by itself is prohibited and unlawful. In what follows, the author has examined these four views, ending in support of the permission theory.

  16. Bit-wise arithmetic coding for data compression

    Science.gov (United States)

    Kiely, A. B.

    1994-01-01

    This article examines the problem of compressing a uniformly quantized independent and identically distributed (IID) source. We present a new compression technique, bit-wise arithmetic coding, that assigns fixed-length codewords to the quantizer output and uses arithmetic coding to compress the codewords, treating the codeword bits as independent. We examine the performance of this method and evaluate the overhead required when used block-adaptively. Simulation results are presented for Gaussian and Laplacian sources. This new technique could be used as the entropy coder in a transform or subband coding system.

  17. Personality consistency analysis in cloned quarantine dog candidates

    Directory of Open Access Journals (Sweden)

    Jin Choi

    2017-01-01

    Full Text Available In recent research, personality consistency has become an important characteristic. Diverse traits and human-animal interactions, in particular, are studied in the field of personality consistency in dogs. Here, we investigated the consistency of dominant behaviours in cloned and control groups followed by the modified Puppy Aptitude Test, which consists of ten subtests to ascertain the influence of genetic identity. In this test, puppies are exposed to stranger, restraint, prey-like object, noise, startling object, etc. Six cloned and four control puppies participated and the consistency of responses at ages 7–10 and 16 weeks in the two groups was compared. The two groups showed different consistencies in the subtests. While the average scores of the cloned group were consistent (P = 0.7991, those of the control group were not (P = 0.0089. Scores of Pack Drive and Fight or Flight Drive were consistent in the cloned group, however, those of the control group were not. Scores of Prey Drive were not consistent in either the cloned or the control group. Therefore, it is suggested that consistency of dominant behaviour is affected by genetic identity and some behaviours can be influenced more than others. Our results suggest that cloned dogs could show more consistent traits than non-cloned. This study implies that personality consistency could be one of the ways to analyse traits of puppies.

  18. Cloning and joint measurements of incompatible components of spin

    International Nuclear Information System (INIS)

    Brougham, Thomas; Andersson, Erika; Barnett, Stephen M.

    2006-01-01

    A joint measurement of two observables is a simultaneous measurement of both quantities upon the same quantum system. When two quantum-mechanical observables do not commute, then a joint measurement of these observables cannot be accomplished directly by projective measurements alone. In this paper we shall discuss the use of quantum cloning to perform a joint measurement of two components of spin associated with a qubit system. We introduce cloning schemes which are optimal with respect to this task. The cloning schemes may be thought to work by cloning two components of spin onto their outputs. We compare the proposed cloning machines to existing cloners

  19. Características físicas e sensoriais de clones de batata-doce Physical and sensorial characteristics of sweetpotato clones

    Directory of Open Access Journals (Sweden)

    Adriana Dias Cardoso

    2007-12-01

    Full Text Available Com o objetivo de avaliar propriedades físicas e sensoriais de clones de batata-doce em Vitória da Conquista - BA foi realizado este experimento, composto por 16 clones oriundos de Janaúba- G, Viçosa - MG, Bom Jardim de Minas - MG, Gurupi - TO, Santo Antônio da Platina - PR, Holambra II - SP, Vitória da Conquista - BA e Condeúba - BA. Utilizou-se o delineamento em blocos casualizados, com 16 tratamentos e 3 repetições. Avaliaram-se as características sensoriais: aparência, umidade, doçura, coloração da polpa, dificuldade de deglutição das raízes tuberosas e as características físicas: tempo de cozimento e peso específico. Os dados foram submetidos à análise de variância e teste de Scott-Knott a 5% de probabilidade, entretanto, as características sensoriais foram obtidas apenas em valores de porcentagem. O clone 25 apresentou as melhores características sensoriais e o clone 7 apresentou melhor tempo de cozimento.The aim of this experiment was to evaluate the physical and sensorial characteristics of sweetpotato clones in Vitória da Conquista, Bahia State, Brazil. Sixteen clones were analyzed, originating from Janaúba, MG, Viçosa, MG; Bom Jardim de Minas, MG; Gurupi, TO; Santo Antônio da Platina, PR; Holambra II, SP; Vitória da Conquista, BA; and Condeúba, BA. One utilized randomized blocks with 16 treatments and three repetitions. The following characteristics were analyzed: aspect, humidity, sweetness, color, deglutition difficulty, cooking and specific gravity of the storage roots. The data were submitted to variance analysis using a ScottKnott test with 5% probability. Clone 25 presented the best sensorial characteristics, and clone 7 presented the best cooking time.

  20. Coding For Compression Of Low-Entropy Data

    Science.gov (United States)

    Yeh, Pen-Shu

    1994-01-01

    Improved method of encoding digital data provides for efficient lossless compression of partially or even mostly redundant data from low-information-content source. Method of coding implemented in relatively simple, high-speed arithmetic and logic circuits. Also increases coding efficiency beyond that of established Huffman coding method in that average number of bits per code symbol can be less than 1, which is the lower bound for Huffman code.

  1. Development of authentication code for multi-access optical code division multiplexing based quantum key distribution

    Science.gov (United States)

    Taiwo, Ambali; Alnassar, Ghusoon; Bakar, M. H. Abu; Khir, M. F. Abdul; Mahdi, Mohd Adzir; Mokhtar, M.

    2018-05-01

    One-weight authentication code for multi-user quantum key distribution (QKD) is proposed. The code is developed for Optical Code Division Multiplexing (OCDMA) based QKD network. A unique address assigned to individual user, coupled with degrading probability of predicting the source of the qubit transmitted in the channel offer excellent secure mechanism against any form of channel attack on OCDMA based QKD network. Flexibility in design as well as ease of modifying the number of users are equally exceptional quality presented by the code in contrast to Optical Orthogonal Code (OOC) earlier implemented for the same purpose. The code was successfully applied to eight simultaneous users at effective key rate of 32 bps over 27 km transmission distance.

  2. Procreative liberty, enhancement and commodification in the human cloning debate.

    Science.gov (United States)

    Shapshay, Sandra

    2012-12-01

    The aim of this paper is to scrutinize a contemporary standoff in the American debate over the moral permissibility of human reproductive cloning in its prospective use as a eugenic enhancement technology. I shall argue that there is some significant and under-appreciated common ground between the defenders and opponents of human cloning. Champions of the moral and legal permissibility of cloning support the technology based on the right to procreative liberty provided it were to become as safe as in vitro fertilization and that it be used only by adults who seek to rear their clone children. However, even champions of procreative liberty oppose the commodification of cloned embryos, and, by extension, the resulting commodification of the cloned children who would be produced via such embryos. I suggest that a Kantian moral argument against the use of cloning as an enhancement technology can be shown to be already implicitly accepted to some extent by champions of procreative liberty on the matter of commodification of cloned embryos. It is in this argument against commodification that the most vocal critics of cloning such as Leon Kass and defenders of cloning such as John Robertson can find greater common ground. Thus, I endeavor to advance the debate by revealing a greater degree of moral agreement on some fundamental premises than hitherto recognized.

  3. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  4. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  5. Office of Codes and Standards resource book. Section 1, Building energy codes and standards

    Energy Technology Data Exchange (ETDEWEB)

    Hattrup, M.P.

    1995-01-01

    The US Department of Energy`s (DOE`s) Office of Codes and Standards has developed this Resource Book to provide: A discussion of DOE involvement in building codes and standards; a current and accurate set of descriptions of residential, commercial, and Federal building codes and standards; information on State contacts, State code status, State building construction unit volume, and State needs; and a list of stakeholders in the building energy codes and standards arena. The Resource Book is considered an evolving document and will be updated occasionally. Users are requested to submit additional data (e.g., more current, widely accepted, and/or documented data) and suggested changes to the address listed below. Please provide sources for all data provided.

  6. The Commercial Profitability of Growing Hybrid Eucalyptus Clones in The Coast Province, Kenya

    Directory of Open Access Journals (Sweden)

    Balozi Bekuta Kirongo

    2014-04-01

    Full Text Available Due to the current high demand for timber, fuelwood, and building poles and the realization that tree growing may pay dividends in the short and long term, many farmers are planting trees on their farms. Farmers are increasingly planting eucalyptus partly due to the fast growth rates of the hybrid clones as well as the opportunity to earn money within a short time. In this paper we report on the profitability of growing eucalyptus hybrid clones in the coastal region, Kenya. Tree growth and cost data was sourced from farmers in Malindi, Kilifi, and Msambweni. Market information was sourced from hardwares in North and South Coast while tree growth models were used to provide average tree sizes at various ages. Results showed that a farmer could make a net income of upto Kshs.500,000.00 (USD6,250 in 5 years. Farmers in the South Coast (Kwale and Msambweni spent more on transport than their counterparts in the North Coast (near Gede-KEFRI. This, added to the fact that trees in the South Coast (Msambweni grew less compared to those in North Coast meant that farmers in the south made less profits.

  7. Counterfactual quantum cloning without transmitting any physical particles

    Science.gov (United States)

    Guo, Qi; Zhai, Shuqin; Cheng, Liu-Yong; Wang, Hong-Fu; Zhang, Shou

    2017-11-01

    We propose a counterfactual 1 →2 economical phase-covariant cloning scheme. Compared with the existing protocols using flying qubits, the main difference of the presented scheme is that the cloning can be achieved without transmitting the photon between the two parties. In addition, this counterfactual scheme does not need to construct controlled quantum gates to perform joint logical operations between the cloned qubit and the blank copy. We also numerically evaluate the performance of the present scheme in the practical experiment, which shows this cloning scheme can be implemented with a high success of probability and the fidelity is close to the optimal value in the ideal asymptotic limit.

  8. Public perceptions of animal cloning

    DEFF Research Database (Denmark)

    Jelsøe, Erling; Vincentsen, Ulla; Andersen, Ida-Elisabeth

    What was from the outset meant to be a survey testing predefined categories of ethical positions related to new biotechnologies with animal cloning as an example was subsequently developed into a process of broader involvement of groups of citizens in the issue. The survey was conducted at meetings...... in four different cities in Denmark. The participants were introduced to animal cloning and after that they filled out the questionnaire. Finally, the issue was discussed in focus groups. The process as a whole was run in a dialogue oriented way. Through the information they received in combination...... with reflecting on the survey questions the participants were well prepared for discussions in the focus groups. This approach made it possible, on the one hand to get a measure of the citizen's perceptions of the ethical aspects of animal cloning, but also to go deeper into their own thoughts of the issue...

  9. Towards an understanding of British public attitudes concerning human cloning.

    Science.gov (United States)

    Shepherd, Richard; Barnett, Julie; Cooper, Helen; Coyle, Adrian; Moran-Ellis, Jo; Senior, Victoria; Walton, Chris

    2007-07-01

    The ability of scientists to apply cloning technology to humans has provoked public discussion and media coverage. The present paper reports on a series of studies examining public attitudes to human cloning in the UK, bringing together a range of quantitative and qualitative methods to address this question. These included a nationally representative survey, an experimental vignette study, focus groups and analyses of media coverage. Overall the research presents a complex picture of attitude to and constructions of human cloning. In all of the analyses, therapeutic cloning was viewed more favourably than reproductive cloning. However, while participants in the focus groups were generally negative about both forms of cloning, and this was also reflected in the media analyses, quantitative results showed more positive responses. In the quantitative research, therapeutic cloning was generally accepted when the benefits of such procedures were clear, and although reproductive cloning was less accepted there was still substantial support. Participants in the focus groups only differentiated between therapeutic and reproductive cloning after the issue of therapeutic cloning was explicitly raised; initially they saw cloning as being reproductive cloning and saw no real benefits. Attitudes were shown to be associated with underlying values associated with scientific progress rather than with age, gender or education, and although there were a few differences in the quantitative data based on religious affiliation, these tended to be small effects. Likewise in the focus groups there was little direct appeal to religion, but the main themes were 'interfering with nature' and the 'status of the embryo', with the latter being used more effectively to try to close down further discussion. In general there was a close correspondence between the media analysis and focus group responses, possibly demonstrating the importance of media as a resource, or that the media reflect

  10. Cocoa Clone Resistant to Phytophthora Palmivora Pod Borer (CPB) in South Sulawesi

    OpenAIRE

    Sartika Dewi, Vien

    2017-01-01

    Helopeltis sp. is one of the main pest in cacao plants. Helopeltis sp. Able to decreasing the production of cacao about 50-60%. This research aims to understand the development of Helopeltis sp. investation in five types of clone cocoa. Collected data have done every week for six weeks in five types of clone cocoa which are clone GBT, clone M01, clone 45, clone s2 and clone BB. Every clone chosen 15 pod sampeles fruit with different size of pod following 5-10cm, 11-13cm and ripe pod which use...

  11. MARE2DEM: a 2-D inversion code for controlled-source electromagnetic and magnetotelluric data

    Science.gov (United States)

    Key, Kerry

    2016-10-01

    This work presents MARE2DEM, a freely available code for 2-D anisotropic inversion of magnetotelluric (MT) data and frequency-domain controlled-source electromagnetic (CSEM) data from onshore and offshore surveys. MARE2DEM parametrizes the inverse model using a grid of arbitrarily shaped polygons, where unstructured triangular or quadrilateral grids are typically used due to their ease of construction. Unstructured grids provide significantly more geometric flexibility and parameter efficiency than the structured rectangular grids commonly used by most other inversion codes. Transmitter and receiver components located on topographic slopes can be tilted parallel to the boundary so that the simulated electromagnetic fields accurately reproduce the real survey geometry. The forward solution is implemented with a goal-oriented adaptive finite-element method that automatically generates and refines unstructured triangular element grids that conform to the inversion parameter grid, ensuring accurate responses as the model conductivity changes. This dual-grid approach is significantly more efficient than the conventional use of a single grid for both the forward and inverse meshes since the more detailed finite-element meshes required for accurate responses do not increase the memory requirements of the inverse problem. Forward solutions are computed in parallel with a highly efficient scaling by partitioning the data into smaller independent modeling tasks consisting of subsets of the input frequencies, transmitters and receivers. Non-linear inversion is carried out with a new Occam inversion approach that requires fewer forward calls. Dense matrix operations are optimized for memory and parallel scalability using the ScaLAPACK parallel library. Free parameters can be bounded using a new non-linear transformation that leaves the transformed parameters nearly the same as the original parameters within the bounds, thereby reducing non-linear smoothing effects. Data

  12. Cloning, molecular characterization and expression of a cDNA encoding a functional NADH-cytochrome b5 reductase from Mucor racemosus PTCC 5305 in E. coli

    Directory of Open Access Journals (Sweden)

    NED A SETAYESH

    2009-01-01

    Full Text Available The present work aims to study a new NADH-cytochrome b5 reductase (cb5r from Mucor racemosus PTCC 5305. A cDNA coding for cb s r was isolated from a Mucor racemosus PTCC 5305 cDNA library. The nucleotide sequence of the cDNA including coding and sequences flanking regions was determined. The open reading frame starting from ATG and ending with TAG stop codon encoded 228 amino acids and displayed the closest similarity (73% with Mortierella alpina cb s r. Lack of hydrophobic residues in the N-terminal sequence was apparent, suggesting that the enzyme is a soluble isoform. The coding sequence was then cloned in the pET16b transcription vector carrying an N-terminal-linked His-Tag® sequence and expressed in Escherichia coli BL21 (DE3. The enzyme was then homogeneously purified by a metal affinity column. The recombinant Mucor enzyme was shown to have its optimal activity at pH and temperature of about 7.5 and 40 °C, respectively. The apparent Km value was calculated to be 13 μM for ferricyanide. To our knowledge, this is the first report on cloning and expression of a native fungal soluble isoform of NADH-cytochrome b5 reductase in E. coli.

  13. Molecular cloning of a recA-like gene from the cyanobacterium Anabaena variabilis

    International Nuclear Information System (INIS)

    Owttrim, G.W.; Coleman, J.R.

    1987-01-01

    A recA-like gene isolated from the cyanobacterium Anabaena variabilis was cloned and partially characterized. When introduced into Escherichia coli recA mutants, the 7.5-kilobase-pair plasmid-borne DNA insert restored resistance to methyl methanesulfonate and UV irradiation, as well as recombination proficiency when measured by Hfr-mediated conjugation. The cyanobacterial recA gene restored spontaneous but not mitomycin C-induced prophage production. Restriction analysis and subcloning yielded a 1.5-kilobase-pair Sau3A fragment which also restored methylmethane sulfonate resistance and coded for a 38- to 40-kilodalton polypeptide when expressed in an in vitro transcription-translation system

  14. Code portability and data management considerations in the SAS3D LMFBR accident-analysis code

    International Nuclear Information System (INIS)

    Dunn, F.E.

    1981-01-01

    The SAS3D code was produced from a predecessor in order to reduce or eliminate interrelated problems in the areas of code portability, the large size of the code, inflexibility in the use of memory and the size of cases that can be run, code maintenance, and running speed. Many conventional solutions, such as variable dimensioning, disk storage, virtual memory, and existing code-maintenance utilities were not feasible or did not help in this case. A new data management scheme was developed, coding standards and procedures were adopted, special machine-dependent routines were written, and a portable source code processing code was written. The resulting code is quite portable, quite flexible in the use of memory and the size of cases that can be run, much easier to maintain, and faster running. SAS3D is still a large, long running code that only runs well if sufficient main memory is available

  15. Heterogeneity in induced thermal resistance of rat tumor cell clones

    International Nuclear Information System (INIS)

    Tomasovic, S.P.; Rosenblatt, P.L.; Heitzman, D.

    1983-01-01

    Four 13762NF rat mammary adenocarcinoma clones were examined for their survival response to heating under conditions that induced transient thermal resistance (thermotolerance). Clones MTC and MTF7 were isolated from the subcutaneous locally growing tumor, whereas clones MTLn2 and MTLn3 were derived from spontaneous lung metastases. There was heterogeneity among these clones in thermotolerance induced by either fractionated 45 0 C or continuous 42 0 C heating, but the order of sensitivity was not necessarily the same. The clones developed thermal resistance at different rates and to different degrees within the same time intervals. There was heterogeneity between clones isolated from within either the primary site or metastatic lesions. However, clones derived from metastatic foci did not intrinsically acquire more or less thermotolerance to fractionated 45 0 C or continuous 42 0 C heating than did clones from the primary tumor. Further, there was no apparent relationship between any phenotypic properties that conferred more or less thermotolerance in vitro and any phenotypic properties that conferred enhanced metastatic success of these same clones by spontaneous (subcutaneous) or experimental (intravenous) routes in vivo. These tumor clones also differ in their karyotype, metastatic potential, cell surface features, sensitivity to x-irradiation and drugs, and ability to repair sublethal radiation damage. These results provide further credence to the concept that inherent heterogeneity within tumors may be as important in therapeutic success as other known modifiers of outcome such as site and treatment heterogeneity

  16. Stability of the JP2 clone of Aggregatibacter actinomycetemcomitans.

    Science.gov (United States)

    Haubek, D; Ennibi, O-K; Vaeth, M; Poulsen, S; Poulsen, K

    2009-09-01

    The JP2 clone of Aggregatibacter actinomycetemcomitans is strongly associated with aggressive periodontitis. To obtain information about colonization dynamics of the JP2 clone, we used PCR to examine its presence in 365 Moroccan juveniles from whom periodontal plaque samples were collected at baseline and after one and two years. Periodontal attachment loss was measured at baseline and at the two-year follow-up. At baseline, 43 (12%) carriers of the JP2 clone were found. Nearly half (44 %) of these were persistently colonized with the clone. The relative risk for the development of aggressive periodontitis, adjusted for the concomitant presence of other genotypes of A. actinomycetemcomitans, was highest for individuals continuously infected by the JP2 clone (RR = 13.9; 95% CI, 9.0 to 21.4), indicating a relationship between infectious dose and disease, which further substantiates the evidence for the JP2 clone as a causal factor in aggressive periodontitis.

  17. Cloning of Plasmodium falciparum by single-cell sorting.

    Science.gov (United States)

    Miao, Jun; Li, Xiaolian; Cui, Liwang

    2010-10-01

    Malaria parasite cloning is traditionally carried out mainly by using the limiting dilution method, which is laborious, imprecise, and unable to distinguish multiply-infected RBCs. In this study, we used a parasite engineered to express green fluorescent protein (GFP) to evaluate a single-cell sorting method for rapidly cloning Plasmodium falciparum. By dividing a two-dimensional scattergram from a cell sorter into 17 gates, we determined the parameters for isolating singly-infected erythrocytes and sorted them into individual cultures. Pre-gating of the engineered parasites for GFP allowed the isolation of almost 100% GFP-positive clones. Compared with the limiting dilution method, the number of parasite clones obtained by single-cell sorting was much higher. Molecular analyses showed that parasite isolates obtained by single-cell sorting were highly homogenous. This highly efficient single-cell sorting method should prove very useful for cloning both P. falciparum laboratory populations from genetic manipulation experiments and clinical samples. Copyright 2010 Elsevier Inc. All rights reserved.

  18. Cloning of Plasmodium falciparum by single-cell sorting

    Science.gov (United States)

    Miao, Jun; Li, Xiaolian; Cui, Liwang

    2010-01-01

    Malaria parasite cloning is traditionally carried out mainly by using the limiting dilution method, which is laborious, imprecise, and unable to distinguish multiply-infected RBCs. In this study, we used a parasite engineered to express green fluorescent protein (GFP) to evaluate a single-cell sorting method for rapidly cloning Plasmodium falciparum. By dividing a two dimensional scattergram from a cell sorter into 17 gates, we determined the parameters for isolating singly-infected erythrocytes and sorted them into individual cultures. Pre-gating of the engineered parasites for GFP allowed the isolation of almost 100% GFP-positive clones. Compared with the limiting dilution method, the number of parasite clones obtained by single-cell sorting was much higher. Molecular analyses showed that parasite isolates obtained by single-cell sorting were highly homogenous. This highly efficient single-cell sorting method should prove very useful for cloning both P. falciparum laboratory populations from genetic manipulation experiments and clinical samples. PMID:20435038

  19. SKEMA - A computer code to estimate atmospheric dispersion

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1985-01-01

    This computer code is a modified version of DWNWND code, developed in Oak Ridge National Laboratory. The Skema code makes an estimative of concentration in air of a material released in atmosphery, by ponctual source. (C.M.) [pt

  20. Methodology of decreasing software complexity using ontology

    Science.gov (United States)

    DÄ browska-Kubik, Katarzyna

    2015-09-01

    In this paper a model of web application`s source code, based on the OSD ontology (Ontology for Software Development), is proposed. This model is applied to implementation and maintenance phase of software development process through the DevOntoCreator tool [5]. The aim of this solution is decreasing software complexity of that source code, using many different maintenance techniques, like creation of documentation, elimination dead code, cloned code or bugs, which were known before [1][2]. Due to this approach saving on software maintenance costs of web applications will be possible.