213 resultados para binary hyperplane
Resumo:
Background Display technologies which allow peptides or proteins to be physically associated with the encoding DNA are central to procedures which involve screening of protein libraries in vitro for new or altered function. Here we describe a new system designed specifically for the display of libraries of diverse, functional proteins which utilises the DNA binding protein nuclear factor κB (NF-κB) p50 to establish a phenotype-genotype link between the displayed protein and the encoding gene. Results A range of model fusion proteins to either the amino- or carboxy-terminus of NF-κB p50 have been constructed and shown to retain the picomolar affinity and DNA specificity of wild-type NF-κB p50. Through use of an optimal combination of binding buffer and DNA target sequence, the half-life of p50-DNA complexes could be increased to over 47 h, enabling the competitive selection of a variety of protein-plasmid complexes with enrichment factors of up to 6000-fold per round. The p50-based plasmid display system was used to enrich a maltose binding protein complex to homogeneity in only three rounds from a binary mixture with a starting ratio of 1:108 and to enrich to near homogeneity a single functional protein from a phenotype-genotype linked Escherichia coli genomic library using in vitro functional selections. Conclusions A new display technology is described which addresses the challenge of functional protein display. The results demonstrate that plasmid display is sufficiently sensitive to select a functional protein from large libraries and that it therefore represents a useful addition to the repertoire of display technologies.
Resumo:
Background We describe novel plasmid vectors for transient gene expression using Agrobacterium, infiltrated into Nicotiana benthamiana leaves. We have generated a series of pGreenII cloning vectors that are ideally suited to transient gene expression, by removing elements of conventional binary vectors necessary for stable transformation such as transformation selection genes. Results We give an example of expression of heme-thiolate P450 to demonstrate effectiveness of this system. We have also designed vectors that take advantage of a dual luciferase assay system to analyse promoter sequences or post-transcriptional regulation of gene expression. We have demonstrated their utility by co-expression of putative transcription factors and the promoter sequence of potential target genes and show how orthologous promoter sequences respond to these genes. Finally, we have constructed a vector that has allowed us to investigate design features of hairpin constructs related to their ability to initiate RNA silencing, and have used these tools to study cis-regulatory effect of intron-containing gene constructs. Conclusion In developing a series of vectors ideally suited to transient expression analysis we have provided a resource that further advances the application of this technology. These minimal vectors are ideally suited to conventional cloning methods and we have used them to demonstrate their flexibility to investigate enzyme activity, transcription regulation and post-transcriptional regulatory processes in transient assays.
Resumo:
Data in germplasm collections contain a mixture of data types; binary, multistate and quantitative. Given the multivariate nature of these data, the pattern analysis methods of classification and ordination have been identified as suitable techniques for statistically evaluating the available diversity. The proximity (or resemblance) measure, which is in part the basis of the complementary nature of classification and ordination techniques, is often specific to particular data types. The use of a combined resemblance matrix has an advantage over data type specific proximity measures. This measure accommodates the different data types without manipulating them to be of a specific type. Descriptors are partitioned into their data types and an appropriate proximity measure is used on each. The separate proximity matrices, after range standardisation, are added as a weighted average and the combined resemblance matrix is then used for classification and ordination. Germplasm evaluation data for 831 accessions of groundnut (Arachis hypogaea L.) from the Australian Tropical Field Crops Genetic Resource Centre, Biloela, Queensland were examined. Data for four binary, five ordered multistate and seven quantitative descriptors have been documented. The interpretative value of different weightings - equal and unequal weighting of data types to obtain a combined resemblance matrix - was investigated by using principal co-ordinate analysis (ordination) and hierarchical cluster analysis. Equal weighting of data types was found to be more valuable for these data as the results provided a greater insight into the patterns of variability available in the Australian groundnut germplasm collection. The complementary nature of pattern analysis techniques enables plant breeders to identify relevant accessions in relation to the descriptors which distinguish amongst them. This additional information may provide plant breeders with a more defined entry point into the germplasm collection for identifying sources of variability for their plant improvement program, thus improving the utilisation of germplasm resources.
Resumo:
Background: Hospital disaster resilience can be defined as a hospital’s ability to resist, absorb, and respond to the shock of disasters while maintaining critical functions, and then to recover to its original state or adapt to a new one. This study aims to explore the status of resilience among tertiary hospitals in Shandong Province, China. Methods: A stratified random sample (n = 50) was derived from tertiary A, tertiary B, and tertiary C hospitals in Shandong Province, and was surveyed by questionnaire. Data on hospital characteristics and 8 key domains of hospital resilience were collected and analysed. Variables were binary, and analysed using descriptive statistics such as frequencies. Results: A response rate of 82% (n = 41) was attained. Factor analysis identified four key factors from eight domains which appear to reflect the overall level of disaster resilience. These were hospital safety, disaster management mechanisms, disaster resources and disaster medical care capability. The survey demonstrated that in regard to hospital safety, 93% had syndromic surveillance systems for infectious diseases and 68% had evaluated their safety standards. In regard to disaster management mechanisms, all had general plans, while only 20% had specific plans for individual hazards. 49% had a public communication protocol and 43.9% attended the local coordination meetings. In regard to disaster resources, 75.6% and 87.5% stockpiled emergency drugs and materials respectively, while less than a third (30%) had a signed Memorandum of Understanding with other hospitals to share these resources. Finally in regard to medical care, 66% could dispatch an on-site medical rescue team, but only 5% had a ‘portable hospital’ function and 36.6% and 12% of the hospitals could surge their beds and staff capacity respectively. The average beds surge capacity within 1 day was 13%. Conclusions: This study validated the broad utility of a framework for understanding and measuring the level of hospital resilience. The survey demonstrated considerable variability in disaster resilience arrangements of tertiary hospitals in Shandong province, and the difference between tertiary A hospitals and tertiary B hospitals was also identified in essential areas.
Resumo:
Motivated by the analysis of the Australian Grain Insect Resistance Database (AGIRD), we develop a Bayesian hurdle modelling approach to assess trends in strong resistance of stored grain insects to phosphine over time. The binary response variable from AGIRD indicating presence or absence of strong resistance is characterized by a majority of absence observations and the hurdle model is a two step approach that is useful when analyzing such a binary response dataset. The proposed hurdle model utilizes Bayesian classification trees to firstly identify covariates and covariate levels pertaining to possible presence or absence of strong resistance. Secondly, generalized additive models (GAMs) with spike and slab priors for variable selection are fitted to the subset of the dataset identified from the Bayesian classification tree indicating possibility of presence of strong resistance. From the GAM we assess trends, biosecurity issues and site specific variables influencing the presence of strong resistance using a variable selection approach. The proposed Bayesian hurdle model is compared to its frequentist counterpart, and also to a naive Bayesian approach which fits a GAM to the entire dataset. The Bayesian hurdle model has the benefit of providing a set of good trees for use in the first step and appears to provide enough flexibility to represent the influence of variables on strong resistance compared to the frequentist model, but also captures the subtle changes in the trend that are missed by the frequentist and naive Bayesian models.
Resumo:
We introduce a function which measures the number of distinct ways in which a number can be expressed as the sum of Fibonacci numbers. Using a binary table and other devices, we explore the values that can take and reveal some interesting patterns. The article shows how standard spreadsheet functionalities make it possible to reveal quite striking patterns in data, and is intended to be used in the classroom.
Resumo:
We consider secret sharing with binary shares. This model allows us to use the well developed theory of cryptographically strong boolean functions. We prove that for given secret sharing, the average cheating probability over all cheating and original vectors, i.e., ρ ¯= 1 n ⋅ 2 −n ∑ n c=1 ∑ α∈Vn ρ c,α , satisfies ρ ¯⩾ 1 2 , and the equality holds ⇔ ρc,α satisfies ρc,α = 1/2 for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions. This enables us to construct cheating-immune secret sharing.
Resumo:
Precise control of composition and internal structure is essential for a variety of novel technological applications which require highly tailored binary quantum dots (QDs) with predictable optoelectronic and mechanical properties. The delicate balancing act between incoming flux and substrate temperature required for the growth of compositionally graded (Si1-xC x; x varies throughout the internal structure), core-multishell (discrete shells of Si and C or combinations thereof) and selected composition (x set) QDs on low-temperature plasma/ion-flux-exposed Si(100) surfaces is investigated via a hybrid numerical simulation. Incident Si and C ions lead to localized substrate heating and a reduction in surface diffusion activation energy. It is shown that by incorporating ions in the influx, a steady-state composition is reached more quickly (for selected composition QDs) and the composition gradient of a Si1-xCx QD may be fine tuned; additionally (with other deposition conditions remaining the same), larger QDs are obtained on average. It is suggested that ionizing a portion of the influx is another way to control the average size of the QDs, and ultimately, their internal structure. Advantages that can be gained by utilizing plasma/ion-related controls to facilitate the growth of highly tailored, compositionally controlled quantum dots are discussed as well.
Resumo:
The paper investigates the design of secret sharing that is immune against cheating (as defined by the Tompa-Woll attack). We examine secret sharing with binary shares and secrets. Bounds on the probability of successful cheating are given for two cases. The first case relates to secret sharing based on bent functions and results in a non-perfect scheme. The second case considers perfect secret sharing built on highly nonlinear balanced Boolean functions.
Resumo:
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n 2n ∑c=1...n ∑α∈V n ρc,α , denoted by ρ, satisfies ρ ≥ ½, and the equality holds if and only if ρc,α satisfies ρc,α= ½ for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions.This enables us to construct cheating-immune secret sharing.
Resumo:
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.
Resumo:
Optimisation of Organic Rankine Cycles (ORCs) for binary cycle applications could play a major role in determining the competitiveness of low to moderate renewable sources. An important aspect of the optimisation is to maximise the turbine output power for a given resource. This requires careful attention to the turbine design notably through numerical simulations. Challenges in the numerical modelling of radial-inflow turbines using high-density working fluids still need to be addressed in order to improve the turbine design and better optimise ORCs. This paper presents preliminary 3D numerical simulations of a radial-inflow turbine working with high-density fluids in realistic geothermal ORCs. Following extensive investigation of the operating conditions and thermodynamic cycle analysis, the refrigerant R143a is chosen as the high-density working fluid. The 1D design of the candidate radial-inflow turbine is presented in details. Furthermore, commercially-available software Ansys-CFX is used to perform the 3D CFD simulations for a number of operating conditions including off-design conditions. The real-gas properties are obtained using the Peng-Robinson equations of state. The preliminary design created using dedicated radial-inflow turbine software Concepts-Rital is discussed and the 3D CFD results are presented and compared against the meanline analysis.
Resumo:
The usual postmodern suspicions about diligently deciphering authorial intent or stridently seeking fixed meaning/s and/or binary distinctions in an artistic work aside, this self-indulgent essay pushes the boundaries regarding normative academic research, for it focusses on my own (minimally celebrated) published creative writing’s status as a literary innovation. Dedicated to illuminating some of the less common denominators at play in Australian horror, my paper recalls the creative writing process involved when I set upon the (arrogant?) goal of creating a new genre of creative writing: that of the ‘Aboriginal Fantastic’. I compare my work to the literary output of a small but significant group (2.5% of the population), of which I am a member: Aboriginal Australians. I narrow my focus even further by examining that creative writing known as Aboriginal horror. And I reduce the sample size of my study to an exceptionally small number by restricting my view to one type of Aboriginal horror literature only: the Aboriginal vampire novel, a genre to which I have contributed professionally with the 2011 paperback and 2012 e-book publication of That Blackfella Bloodsucka Dance! However, as this paper hopefully demonstrates, and despite what may be interpreted by some cynical commentators as the faux sincerity of my taxonomic fervour, Aboriginal horror is a genre noteworthy for its instability and worthy of further academic interrogation. (first paragraph)
Resumo:
Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.
Resumo:
Optimisation of organic Rankine cycles(ORCs for binary cycle applications could play a major role in determining the competitiveness of low to moderate renewable sources. An important aspect of the optimisation is to maximise the turbine output power for a given resource. This requires careful attention to the turbine design notably through numerical simulations. Challenges in the numerical modelling of radial-inflow turbines using high-density working fluids still need to be addressed in order to improve the turbine design and better optimise ORCs. Thispaper presents preliminary 3D numerical simulations of a high-density radial-inflow ORC turbine in sensible geothermal conditions. Following extensive investigation of the operating conditions and thermodynamic cycle analysis, therefrigerant R143a is chosen as the high-density working fluid. The 1D design of the candidate radial-inflow turbine is presented in details. Furthermore, commercially-available software Ansys-CFX is used to perform preliminary steady-state 3D CFD simulations of the candidate R143a radial-inflow turbine for a number of operating conditions including off-design conditions. The real-gas properties are obtained using the Peng–Robinson equations of state.The thermodynamic ORC cycle is presented. The preliminary design created using dedicated radial-inflow turbine software Concepts-Rital is discussed and the 3D CFD results are presented and compared against the meanline analysis.