987 resultados para Library Steps Renovation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vibrio anguillarum is a common bacterial pathogen in fish. However, little is known about its pathogenic mechanism, in part, because the entire genome has not been completely sequenced. We constructed a fosmid library for V. anguillarum containing 960 clones with an average insert size of 37.7 kb and 8.6-fold genome coverage. We characterized the library by end-sequencing 50 randomly selected clones. This generated 93 sequences with a total length of 57 485 by covering 1.4% of the whole genome. Of these sequences, 58 (62.4%) were homologous to known genes, 30 (32.3%) were genes with hypothetical functions, and the remaining 5 (5.3%) were unknown genes. We demonstrated the utility of this library by PCR screening of 10 genes. This resulted in an average of 6.2 fosmid clones per screening. This fosmid library offers a new tool for gene screening and cloning of V. anguillarum, and for comparative genomic studies among Vibrio species.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A large-DNA-fragment library is necessary for research into the Porphyra genome. In this study, a bacterial artificial chromosome (BAC) library of Porphyra yezoensis was constructed and characterized. The library contains 54,144 BAC clones with an average insert size of about 65 kb and fewer than 0.7% of clones without large inserts. Therefore, its capacity is more than 6.6 P. yezoensis genome equivalents, and the probability of recovering any nuclear DNA sequence from the library is higher than 99%. The library shows good fidelity and stability. A putative trehalose-6-phosphate synthase (TPS) gene was successfully screened out from the library. The above results show that the library is useful for gene cloning and genomic research in P. yezoensis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Crustacean haemocytes play important roles in the host immune response including recognition, phagocytosis, melanization, cytotoxicity and inter-cellular signal communication. Expressed sequence tags (ESTs) analysis is proved to be an efficient approach not only for gene discovery, but also for gene expression profiles performance. In order to further understand the innate immune system and defense mechanisms of Chinese shrimp at molecular level, complementary DNA library is constructed from the haemocyte tissue of Fenneropenaeus chinensis. A total of 2371 cDNA clones are successfully sequenced and the average sequence length is 460 bp. About 50% are identified as orthologs of known genes from other organisms by BLASTx and BLASTn program. By sequences comparability and analysis, 34 important genes including 177 ESTs are identified that may be involved in defense or immune functions in shrimp based on the known knowledge. These genes are categorized into five categories according to their putative functions in shrimp immune system: 13 genes are different types of antimicrobial peptides (AMP, penaeidin, antilipopolysaccharide factor, etc.), and their proportion is about 3 8%; 11 genes belong to prophenoloxidase system (prophenoloxidase, serine proteinase, serine proteinase inhibitor, etc.), and their proportion is about 32%; five genes have high homology with clotting protein (lectin, transglutaminase, etc), and their proportion is about 15%; three genes may be involved in inter-cell signal communication (peroxinectin, integrin), and their proportion is about 9%; two genes have been identified to be chaperone proteins (Hsc70, thioredoxin peroxidase), and their proportion is about 6%. These EST sequences enrich our understanding of the immune genes of F chinensis and will help farther experimental research into immune factors and improve our knowledge of the immune mechanisms of shrimp. (c) 2007 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Arthrospira (Spirulina) (Setchell& Gardner) is an important cyanobacterium not only in its nutritional potential but in its special biological characteristics. An unbiased fosmid library of Arthrospira maxima FACHB438 that contains 4300 clones was constructed. The size distribution of insert fragments is from 15.5 to 48.9 kb and the average size is 37.6 kb. The recombination frequency is 100%. Therefore the library is 29.9 equivalents to the Arthrospira genome size of 5.4 Mb. A total of 719 sample clones were randomly chosen from the library and 602 available sequences, which consisted of 307,547 bases, covering 5.70% of the whole genome. The codon usage of A. maxima was not strongly biased. GC content at the first position of codons (46.9%) was higher than the second (39.8%) and the third (45.5%) positions. GC content of the genome was 43.6%. Of these sequences, 287 (47.7%) showed high similarities to known genes, 63 (10.5%) to hypothetical genes and the remaining 252 (41.8%) had no significant similarities. The assigned genes were classified into 22 categories with respect to different biological roles. Remarkably, the high presence of 25 sequences (4.2%) encoding reverse transcriptase indicates the RT gene may have multiple copies in the A. maxima genome and might play an important role in the evolutionary history and metabolic regulation. In addition, the sequences encoding the ATP-binding cassette transport system and the two-component signal transduction system were the second and third most frequent genes, respectively. These genomic features provide some clues as to the mechanisms by which this organism adapts to the high concentration of bicarbonate and to the high pH environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A large number of polymorphic simple sequence repeats (SSRs) or microsatellites are needed to develop a genetic map for shrimp. However, developing an SSR map is very time-consuming, expensive, and most SSRs are not specifically linked to gene loci of immediate interest. We report here on our strategy to develop polymorphic markers using expressed sequence tags (ESTs) by designing primers flanking single or multiple SSRs with three or more repeats. A subtracted cDNA library was prepared using RNA from specific pathogen-free (SPF) Litopenaeus vannamei juveniles (similar to 1 g) collected before (0) and after (48 h) inoculation with the China isolate of white spot syndrome virus (WSSV). A total of 224 clones were sequenced, 194 of which were useful for homology comparisons against annotated genes in NCBI nonredundant (nr) and protein databases, providing 179 sequences encoded by nuclear DNA, 4 mitochondrial DNA, and 11 were similar to portions of WSSV genome. The nuclear sequences clustered in 43 groups, 11 of which were homologous to various ESTs of unknown function, 4 had no homology to any sequence, and 28 showed similarities to known genes of invertebrates and vertebrates, representatives of cellular metabolic processes such as calcium ion balance, cytoskeleton mRNAs, and protein synthesis. A few sequences were homologous to immune system-related (allergens) genes and two were similar to motifs of the sex-lethal gene of Drosophila. A large number of EST sequences were similar to domains of the EF-hand superfamily (Ca2+ binding motif and FRQ protein domain of myosin light chains). Single or multiple SSRs with three or more repeats were found in approximately 61 % of the 179 nuclear sequences. Primer sets were designed from 28 sequences representing 19 known or putative genes and tested for polymorphism (EST-SSR marker) in a small test panel containing 16 individuals. Ten (53%) of the 19 putative or unknown function genes were polymorphic, 4 monomorphic, and 3 either failed to satisfactorily amplify genomic DNA or the allele amplification conditions need to be further optimized. Five polymorphic ESTs were genotyped with the entire reference mapping family, two of them (actin, accession #CX535973 and shrimp allergen arginine kinase, accession #CX535999) did not amplify with all offspring of the IRMF panel suggesting presence of null alleles, and three of them amplified in most of the IRM F offspring and were used for linkage analysis. EF-hand motif of myosin light chain (accession #CX535935) was placed in ShrimpMap's linkage group 7, whereas ribosomal protein S5 (accession #CX535957) and troponin I (accession #CX535976) remained unassigned. Results indicate that (a) a large number of ESTs isolated from this cDNA library are similar to cytoskeleton mRNAs and may reflect a normal pathway of the cellular response after im infection with WSSV, and (b) primers flanking single or multiple SSRs with three or more repeats from shrimp ESTs could be an efficient approach to develop polymorphic markers useful for linkage mapping. Work is underway to map additional SSR-containing ESTs from this and other cDNA libraries as a plausible strategy to increase marker density in ShrimpMap.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the deep-sea sediments harbor diverse and novel bacteria with important ecological and environmental functions, a comprehensive view of their community characteristics is still lacking, considering the vast area and volume of the deep-sea sedimentary environments. Sediment bacteria vertical distribution and community structure were studied of the E272 site in the East Pacific Ocean with the molecular methods of 16S rRNA gene T-RFLP (terminal restriction fragment length polymorphism) and clone library analyses. Layered distribution of the bacterial assemblages was detected by both methods, indicating that the shallow sediments (40 cm in depth) harbored a diverse and distinct bacterial composition with fine-scale spatial heterogeneity. Substantial bacterial diversity was detected and nine major bacterial lineages were obtained, including Acidobacteria, Actinobacteria, Bacteroidetes, Chloroflexi, Nitrospirae, Planctomycetes, Proteobacteria, and the candidate divisions OP8 and TM6. Three subdivisions of the Proteobacteria presented in our libraries, including the alpha-, gamma- and delta-Proteobacteria. Most of our sequences have low similarity with known bacterial 16S rRNA genes, indicating that these sequences may represent as-yet-uncultivated novel bacteria. Most of our sequences were related to the GenBank nearest neighboring sequences retrieved from marine sediments, especially from deep-sea methane seep, gas hydrate or mud volcano environments. Several sequences were related to the sequences recovered from the deep-sea hydrothermal vent or basalt glasses-bearing sediments, indicating that our deep-sea sampling site might be influenced to certain degree by the nearby hydrothermal field of the East Pacific Rise at 13A degrees N.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fractional-step method of predictor-corrector difference-pseudospectrum with unconditional L(2)-stability and exponential convergence is presented. The stability and convergence of this method is strictly proved mathematically for a nonlinear convection-dominated flow. The error estimation is given and the superiority of this method is verified by numerical test.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Program design is an area of programming that can benefit significantly from machine-mediated assistance. A proposed tool, called the Design Apprentice (DA), can assist a programmer in the detailed design of programs. The DA supports software reuse through a library of commonly-used algorithmic fragments, or cliches, that codifies standard programming. The cliche library enables the programmer to describe the design of a program concisely. The DA can detect some kinds of inconsistencies and incompleteness in program descriptions. It automates detailed design by automatically selecting appropriate algorithms and data structures. It supports the evolution of program designs by keeping explicit dependencies between the design decisions made. These capabilities of the DA are underlaid bya model of programming, called programming by successive elaboration, which mimics the way programmers interact. Programming by successive elaboration is characterized by the use of breadth-first exposition of layered program descriptions and the successive modifications of descriptions. A scenario is presented to illustrate the concept of the DA. Technques for automating the detailed design process are described. A framework is given in which designs are incrementally augmented and modified by a succession of design steps. A library of cliches and a suite of design steps needed to support the scenario are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose –The research examines the sales process practised by SMEs, and barriers and enablers that hinder and support effective selling practices from the selling organisation’s perspective in Scottish-based Food and Drink firms. Design/methodology approach - – The paper adopts an interpretivist perspective with qualitative data gathered through face-to-face semi-structured interviews. 20 people involved in selling activities were interviewed from 15 SMEs across Scotland. Thematic analysis established key findings regarding the sales process practice. Findings – Five themes emerged that affect the operationalisation of the selling process: the owner manager has considerable involvement in the sales process, SMEs with some degree of sales knowledge take a more systematic approach, SMEs lack awareness of how CRM technology can assist them, power is tipped in favour of the buyer and, the geographic location of the SME places constraints on how SMEs conduct business Research limitation/implication – Thematic analysis was chosen over other more traditional methods due to the lack of relevant quantitative data. The phenomenon of the research and research methodology means that it will not be possible to repeat this study and replicate its findings. However, the process that has been adopted does provide a basis for future research. Originality/value - The paper identifies areas where future research is required in the field alongside suggestions where policy makers and government business agencies might focus intervention to assist SMEs improve delivery of the sales process and selling effectiveness

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Technological developments over the last thirty years increasingly shaped the means by which we recruit, select and appraise employees. Today, technology supports more flexible and geographically dispersed working modes: From teleworkers, to virtual workers, to e-interns (also known as virtual interns). The current article describes how developments in e-HRM and changes in employment forms contribute to the development and increasing popularity of e-internships (better known as virtual internships) amongst small and medium-sized enterprises. In this paper, we reflect on the rise of e-internships across different countries and relate this to e-HRM and technological advances. We explore the opportunities and challenges. These include developing effective global talent and knowledge management practices, managing diversity as well as intellectual and social capital. We furthermore link the employment of e-internship practices to strategic organizational goals and learning. In the final section, we also critically reflect on the high investment required for e-internships to succeed. The discussion on e-internships is set in the literature on e-HRM, virtual teams and knowledge management, which is furthermore supported by interviews conducted with e-interns or internship managers. Keywords: e-internships, virtual internships, computer-mediated communication

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tedd, L.(2006). Program: a record of the first 40 years of electronic library and information systems. Program: electronic library and information systems,40(1), 11-26.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tedd, L.A. (2005). 40 years of library and information studies education in Wales. Education for Information, 23(1/2), 1-8.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tedd, L.A. (2003). Library co-operation and ICT in the UK: an overview. Information Services and Use, 23(4), 199-210

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urquhart, C., Spink, S., Thomas, R. & Durbin, J. (2005). Systematic assessment of the training needs of health library staff. Library and Information Research, 29(93), 35-42. Sponsorship: National Library for Health (NLH)