868 resultados para Selection Analysis


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nonlinear analysis tools for studying and characterizing the dynamics of physiological signals have gained popularity, mainly because tracking sudden alterations of the inherent complexity of biological processes might be an indicator of altered physiological states. Typically, in order to perform an analysis with such tools, the physiological variables that describe the biological process under study are used to reconstruct the underlying dynamics of the biological processes. For that goal, a procedure called time-delay or uniform embedding is usually employed. Nonetheless, there is evidence of its inability for dealing with non-stationary signals, as those recorded from many physiological processes. To handle with such a drawback, this paper evaluates the utility of non-conventional time series reconstruction procedures based on non uniform embedding, applying them to automatic pattern recognition tasks. The paper compares a state of the art non uniform approach with a novel scheme which fuses embedding and feature selection at once, searching for better reconstructions of the dynamics of the system. Moreover, results are also compared with two classic uniform embedding techniques. Thus, the goal is comparing uniform and non uniform reconstruction techniques, including the one proposed in this work, for pattern recognition in biomedical signal processing tasks. Once the state space is reconstructed, the scheme followed characterizes with three classic nonlinear dynamic features (Largest Lyapunov Exponent, Correlation Dimension and Recurrence Period Density Entropy), while classification is carried out by means of a simple k-nn classifier. In order to test its generalization capabilities, the approach was tested with three different physiological databases (Speech Pathologies, Epilepsy and Heart Murmurs). In terms of the accuracy obtained to automatically detect the presence of pathologies, and for the three types of biosignals analyzed, the non uniform techniques used in this work lightly outperformed the results obtained using the uniform methods, suggesting their usefulness to characterize non-stationary biomedical signals in pattern recognition applications. On the other hand, in view of the results obtained and its low computational load, the proposed technique suggests its applicability for the applications under study.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper deals with the prediction of velocity fields on the 2415-3S airfoil which will be used for an unmanned aerial vehicle with internal propulsion system and in this way analyze the air flow through an internal duct of the airfoil using computational fluid dynamics. The main objective is to evaluate the effect of the internal air flow past the airfoil and how this affects the aerodynamic performance by means of lift and drag forces. For this purpose, three different designs of the internal duct were studied; starting from the base 2415-3S airfoil developed in previous investigation, basing on the hypothesis of decreasing the flow separation produced when the propulsive airflow merges the external flow, and in this way obtaining the best configuration. For that purpose, an exhaustive study of the mesh sensitivity was performed. It was used a non-structured mesh since the computational domain is three-dimensional and complex. The selected mesh contains approximately 12.5 million elements. Both the computational domain and the numerical solution were made with commercial CAD and CFD software, respectively. Air, incompressible and steady was analyzed. The boundary conditions are in concordance with experimental setup in the AF 6109 wind tunnel. The k-e model is utilized to describe the turbulent flow process as followed in references. Results allowed obtaining velocity contours as well as lift and drag coefficients and also the location of separation and reattachment regions in some cases for zero degrees of angle of attack on the internal and external surfaces of the airfoil. Finally, the selection of the configuration with the best aerodynamic performance was made, selecting the option without curved baffles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper deals with the prediction of pressure and velocity fields on the 2415-3S airfoil which will be used for and unmanned aerial vehicle with internal propulsion system and in this way analyze the air flow through an internal duct of the airfoil using computational fluid dynamics. The main objective is to evaluate the effect of the internal air flow past the airfoil and how this affects the aerodynamic performance by means of lift and drag forces. For this purpose, three different designs of the internal duct were studied; starting from the base 2415-3S airfoil developed in previous investigation, basing on the hypothesis of decreasing the flow separation produced when the propulsive airflow merges the external flow, and in this way obtaining the best configuration. For that purpose, an exhaustive study of the mesh sensitivity was performed. It was used a non-structured mesh since the computational domain is tridimensional and complex. The selected mesh contains approximately 12.5 million elements. Both the computational domain and the numerical solution were made with commercial CAD and CFD software respectively. Air, incompressible and steady was analyzed. The boundary conditions are in concordance with experimental setup in the AF 6109 wind tunnel. The k-ε model is utilized to describe the turbulent flow process as followed in references. Results allowed obtaining pressure and velocity contours as well as lift and drag coefficients and also the location of separation and reattachment regions in some cases for zero degrees of angle of attack on the internal and external surfaces of the airfoil. Finally, the selection of the configuration with the best aerodynamic performance was made, selecting the option without curved baffles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Rhizobium leguminosarum bv.viciae is able to establish nitrogen-fixing symbioses with legumes of the genera Pisum, Lens, Lathyrus and Vicia. Classic studies using trap plants (Laguerre et al., Young et al.) provided evidence that different plant hosts are able to select different rhizobial genotypes among those available in a given soil. However, these studies were necessarily limited by the paucity of relevant biodiversity markers. We have now reappraised this problem with the help of genomic tools. A well-characterized agricultural soil (INRA Bretennieres) was used as source of rhizobia. Plants of Pisum sativum, Lens culinaris, Vicia sativa and V. faba were used as traps. Isolates from 100 nodules were pooled, and DNA from each pool was sequenced (BGI-Hong Kong; Illumina Hiseq 2000, 500 bp PE libraries, 100 bp reads, 12 Mreads). Reads were quality filtered (FastQC, Trimmomatic), mapped against reference R. leguminosarum genomes (Bowtie2, Samtools), and visualized (IGV). An important fraction of the filtered reads were not recruited by reference genomes, suggesting that plant isolates contain genes that are not present in the reference genomes. For this study, we focused on three conserved genomic regions: 16S-23S rDNA, atpD and nodDABC, and a Single Nucleotide Polymorphism (SNP) analysis was carried out with meta / multigenomes from each plant. Although the level of polymorphism varied (lowest in the rRNA region), polymorphic sites could be identified that define the specific soil population vs. reference genomes. More importantly, a plant-specific SNP distribution was observed. This could be confirmed with many other regions extracted from the reference genomes (data not shown). Our results confirm at the genomic level previous observations regarding plant selection of specific genotypes. We expect that further, ongoing comparative studies on differential meta / multigenomic sequences will identify specific gene components of the plant-selected genotypes

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The effect of type of fiber, site of fermetation, method for quantifying insoluble and soluble dietary fiber, and their correction for intestinal mucin on fiber digestibility were examined in rabbits. Three diets differing in soluble fiber were formulated (8.5% soluble fiber, on DM basis, in the low soluble fiber [LSF] diet; 10.2% in the medium soluble fiber [MSF] diet; and 14.5% in the high soluble fiber [HSF] diet). They were obtained by replacing half of the dehydrated alfalfa in the MSF diet with a mixture of beet and apple pulp (HSF diet) or with a mix of oat hulls and soybean protein (LSF diet). Thirty rabbits with ileal T-cannulas were used to determine ileal and fecal digestibility. Cecal digestibility was determined by difference between fecal and ileal digestibility. Insoluble fiber was measured as NDF, insoluble dietary fiber (IDF), and in vitro insoluble fiber, whereas soluble fiber was calculated as the difference between total dietary fiber (TDF) and NDF (TDF_NDF), IDF (TDF-IDF), and in vitro insoluble fiber (TDF-in vitro insoluble fiber). The intestinal mucin content was used to correct the TDF and soluble fiber digestibility. Ileal and fecal concentration of mucin increased from the LSF to the HSF diet group (P < 0.01). Once corrected for intestinal mucin, ileal and fecal digestibility of TDF and soluble fiber increased whereas cecal digestibility decreased (P < 0.01). Ileal digestibility of TDF increased from the LSF to the HSF diet group (12.0 vs. 28.1%; P < 0.01), with no difference in the cecum (26.4%), resulting in a higher fecal digestibility from the LSF to the HSF diet group (P < 0.01). Ileal digestibility of insoluble fiber increased from the LSF to the HSF diet group (11.3 vs. 21.0%; P < 0.01), with no difference in the cecum (13.9%) and no effect of fiber method, resulting in a higher fecal digestibility for rabbits fed the HSF diet compared with the MSF and LSF diets groups (P < 0.01).Fecal digestibility of NDF was higher compared with IDF or in vitro insoluble fiber (P < 0.01). Ileal soluble fiber digestibility was higher for the HSF than for the LSF diet group (43.6 vs. 14.5%; P < 0.01) and fiber method did not affect it. Cecal soluble fiber digestibility decreased from the LSF to the HSF diet group (72.1 vs. 49.2%; P < 0.05). The lowest cecal and fecal soluble fiber digestibility was measured using TDF-NDF (P < 0.01). In conclusion, a correction for intestinal mucin is necessary for ileal TDF and soluble fiber digestibility whereas the selection of the fiber method has a minor relevance. The inclusion of sugar beet and apple pulp increased the amount of TDF fermented in the small intestine.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research studies urban soundscapes through the comparative analysis of twelve public open spaces in the city of Córdoba (Argentina), taken as case studies. The work aims to examine selection of indicators and assessment tools intended to characterize soundscape quality. The field study was carried out through surveys and acoustic and psychoacoustic indicators, that are used together to objectively describe the sound quality of urban spaces. The study shows that, while there is a relationship of these indicators with the sound quality of the spaces, this is not linear. Their relative importance or influence depends on the interrelations occurring between the parameters studied. A model analyzing and correlating the parameters with the sound quality, based on the postulates of fuzzy logic, was applied as a tool of analysis, and it was seen to achieve a very close approximation to the subjective or perceptual response of the inhabitants. This close match between the model results and the perceptual response of the users confirms the fuzzy model as an effective tool for the study, not only of soundscapes, but also for those situations in which objective parameters must be related to the perceptual response of users.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Genetic selections that use proteinaceous transdominant inhibitors encoded by DNA libraries to cause mutant phenocopies may facilitate genetic analysis in traditionally nongenetic organisms. We performed a selection for random short peptides and larger protein fragments (collectively termed “perturbagens”) that inhibit the yeast pheromone response pathway. Peptide and protein fragment perturbagens that permit cell division in the presence of pheromone were recovered. Two perturbagens were derived from proteins required for pheromone response, and an additional two were derived from proteins that may negatively influence the pheromone response pathway. Furthermore, three known components of the pathway were identified as probable perturbagen targets based on physical interaction assays. Thus, by selection for transdominant inhibitors of pheromone response, multiple pathway components were identified either directly as gene fragments or indirectly as the likely targets of specific perturbagens. These results, combined with the results of previous work [Holzmayer, T. A., Pestov, D. G. & Roninson, I. B. (1992) Nucl. Acids. Res. 20, 711–717; Whiteway, M., Dignard, D. & Thomas, D. Y. (1992) Proc. Natl. Acad. Sci. USA 89, 9410–9414; and Gudkov, A. V., Kazarov, A. R., Thimmapaya, R., Axenovich, S. A., Mazo, I. A. & Roninson, I. B. (1994) Proc. Natl. Acad. Sci. USA 91, 3744–3748], suggest that transdominant genetic analysis of the type described here will be broadly applicable.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In filamentous fungi, het loci (for heterokaryon incompatibility) are believed to regulate self/nonself-recognition during vegetative growth. As filamentous fungi grow, hyphal fusion occurs within an individual colony to form a network. Hyphal fusion can occur also between different individuals to form a heterokaryon, in which genetically distinct nuclei occupy a common cytoplasm. However, heterokaryotic cells are viable only if the individuals involved have identical alleles at all het loci. One het locus, het-c, has been characterized at the molecular level in Neurospora crassa and encodes a glycine-rich protein. In an effort to understand the role of this locus in filamentous fungi, we chose to study its evolution by analyzing het-c sequence variability in species within Neurospora and related genera. We determined that the het-c locus was polymorphic in a field population of N. crassa with close to equal frequency of each of the three allelic types. Different species and even genera within the Sordariaceae shared het-c polymorphisms, indicating that these polymorphisms originated in an ancestral species. Finally, an analysis of the het-c specificity region shows a high occurrence of nonsynonymous substitution. The persistence of allelic lineages, the nearly equal allelic distribution within populations, and the high frequency of nonsynonymous substitutions in the het-c specificity region suggest that balancing selection has operated to maintain allelic diversity at het-c. Het-c shares this particular evolutionary characteristic of departing from neutrality with other self/nonself-recognition systems such as major histocompatibility complex loci in mammals and the S (self-incompatibility) locus in angiosperms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ecological studies have demonstrated the role of competition in structuring communities; however, the importance of competition as a vehicle for evolution by natural selection and speciation remains unresolved. Study systems of insular faunas have provided several well known cases where ecological character displacement, coevolution of competitors leading to increased morphological separation, is thought to have occurred (e.g., anoline lizards and geospizine finches). Whiptail lizards (genus Cnemidophorus) from the islands of the Sea of Cortez and the surrounding mainland demonstrate a biogeographic pattern of morphological variation suggestive of character displacement. Two species of Cnemidophorus occur on the Baja peninsula, one relatively large (Cnemidophorus tigris) and one smaller (Cnemidophorus hyperythrus). Oceanic islands in the Sea of Cortez contain only single species, five of six having sizes intermediate to both species found on the Baja peninsula. On mainland Mexico C. hyperythrus is absent, whereas C. tigris is the smaller species in whiptail guilds. Here we construct a phylogeny using nucleotide sequences of the cytochrome b gene to infer the evolutionary history of body size change and historical patterns of colonization in the Cnemidophorus system. The phylogenetic analysis indicates that (i) oceanic islands have been founded at least five times from mainland sources by relatives of either C. tigris or C. hyperythrus, (ii) there have been two separate instances of character relaxation on oceanic islands for C. tigris, and (iii) there has been colonization of the oceanic island Cerralvo with retention of ancestral size for Cnemidophorus ceralbensis, a relative of C. hyperythrus. Finally, the phylogenetic analysis reveals potential cryptic species within mainland populations of C. tigris.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Piotr Omenzetter and Simon Hoell’s work within the Lloyd’s Register Foundation Centre for Safety and Reliability Engineering at the University of Aberdeen is supported by Lloyd’s Register Foundation. The Foundation helps to protect life and property by supporting engineering-related education, public engagement and the application of research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The past two decades have greatly improved our knowledge of vertebrate skeletal morphogenesis. It is now clear that bony morphology lacks individual descriptive specification and instead results from an interplay between positional information assigned during early limb bud deployment and its “execution” by highly conserved cellular response programs of derived connective tissue cells (e.g., chondroblasts and osteoblasts). Selection must therefore act on positional information and its apportionment, rather than on more individuated aspects of presumptive adult morphology. We suggest a trait classification system that can help integrate these findings in both functional and phylogenetic examinations of fossil mammals and provide examples from the human fossil record.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The ribozyme RNase P absolutely requires divalent metal ions for catalytic function. Multiple Mg2+ ions contribute to the optimal catalytic efficiency of RNase P, and it is likely that the tertiary structure of the ribozyme forms a specific metal-binding pocket for these ions within the active-site. To identify base moieties that contribute to catalytic metal-binding sites, we have used in vitro selection to isolate variants of the Escherichia coli RNase P RNA with altered specificities for divalent metal. RNase P RNA variants with increased activity in Ca2+ were enriched over 18 generations of selection for catalysis in the presence of Ca2+, which is normally disfavored relative to Mg2+. Although a wide spectrum of mutations was found in the generation-18 clones, only a single point mutation was common to all clones: a cytosine-to-uracil transition at position 70 (E. coli numbering) of RNase P. Analysis of the C70U point mutant in a wild-type background confirmed that the identity of the base at position 70 is the sole determinant of Ca2+ selectivity. It is noteworthy that C70 lies within the phylogenetically well conserved J3/4-P4-J2/4 region, previously implicated in Mg2+ binding. Our finding that a single base change is sufficient to alter the metal preference of RNase P is further evidence that the J3/4-P4-J2/4 domain forms a portion of the ribozyme’s active site.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A comparison was made of the competence for neoplastic transformation in three different sublines of NIH 3T3 cells and multiple clonal derivatives of each. Over 90% of the neoplastic foci produced by an uncloned transformed (t-SA′) subline on a confluent background of nontransformed cells were of the dense, multilayered type, but about half of the t-SA′ clones produced only light foci in assays without background. This asymmetry apparently arose from the failure of the light focus formers to register on a background of nontransformed cells. Comparison was made of the capacity for confluence-mediated transformation between uncloned parental cultures and their clonal derivatives by using two nontransformed sublines, one of which was highly sensitive and the other relatively refractory to confluence-mediated transformation. Transformation was more frequent in the clones than in the uncloned parental cultures for both sublines. This was dramatically so in the refractory subline, where the uncloned culture showed no overt sign of transformation in serially repeated assays but increasing numbers of its clones exhibited progressive transformation. The reason for the greater susceptibility of the pure clones is apparently the suppression of transformation among the diverse membership that makes up the uncloned parental culture. Progressive selection toward increasing degrees of transformation in confluent cultures plays a major role in the development of dense focus formers, but direct induction by the constraint of confluence may contribute by heritably damaging cells. In view of our finding of increased susceptibility to transformation in clonal versus uncloned populations, expansion of some clones at the expense of others during the aging process would contribute to the marked increase of cancer with age.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The spermatogonial stem cell initiates and maintains spermatogenesis in the testis. To perform this role, the stem cell must self replicate as well as produce daughter cells that can expand and differentiate to form spermatozoa. Despite the central importance of the spermatogonial stem cell to male reproduction, little is known about its morphological or biochemical characteristics. This results, in part, from the fact that spermatogonial stem cells are an extremely rare cell population in the testis, and techniques for their enrichment are just beginning to be established. In this investigation, we used a multiparameter selection strategy, combining the in vivo cryptorchid testis model with in vitro fluorescence-activated cell sorting analysis. Cryptorchid testis cells were fractionated by fluorescence-activated cell sorting analysis based on light-scattering properties and expression of the cell surface molecules α6-integrin, αv-integrin, and the c-kit receptor. Two important observations emerged from these analyses. First, spermatogonial stem cells from the adult cryptorchid testis express little or no c-kit. Second, the most effective enrichment strategy, in this study, selected cells with low side scatter light-scattering properties, positive staining for α6-integrin, and negative or low αv-integrin expression, and resulted in a 166-fold enrichment of spermatogonial stem cells. Identification of these characteristics will allow further purification of these valuable cells and facilitate the investigation of molecular mechanisms governing spermatogonial stem cell self renewal and hierarchical differentiation.