Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using co...Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using complementary DNA (cDNA) derived from messenger RNA (mRNA) extracted from plant tissues and generated by reverse transcription. However, some CDS are difficult to acquire through this process as they are expressed at extremely low levels or have specific spatial and/or temporal expression patterns in vivo. These challenges require the development of alternative CDS cloning technologies. In this study, we found that the genomic intron-containing gene coding sequences (gDNA) from Arabidopsis thaliana, Oryza sativa, Brassica napus, and Glycine max can be correctly transcribed and spliced into mRNA in Nicotiana benthamiana. In contrast, gDNAs from Triticum aestivum and Sorghum bicolor did not function correctly. In transient expression experiments, the target DNA sequence is driven by a constitutive promoter. Theoretically, a sufficient amount of mRNA can be extracted from the N. benthamiana leaves, making it conducive to the cloning of CDS target genes. Our data demonstrate that N. benthamiana can be used as an effective host for the cloning CDS of plant genes.展开更多
Genetic manipulation(either restraint or enhancement)of the biosynthesis pathway ofα-linolenic acid(ALA)in seed oil is an important goal in Brassica napus breeding.B.napus is a tetraploid plant whose genome often har...Genetic manipulation(either restraint or enhancement)of the biosynthesis pathway ofα-linolenic acid(ALA)in seed oil is an important goal in Brassica napus breeding.B.napus is a tetraploid plant whose genome often har-bors four and six homologous copies,respectively,of the two fatty acid desaturases FAD2 and FAD3,which con-trol the last two steps of ALA biosynthesis during seed oil accumulation.In this study,we compared their promoters,coding sequences,and expression levels in three high-ALA inbred lines 2006L,R8Q10,and YH25005,a low-ALA line A28,a low-ALA/high-oleic-acid accession SW,and the wildtype ZS11.The expression levels of most FAD2 and FAD3 homologs in the three high-ALA accessions were higher than those in ZS11 and much higher than those in A28 and SW.The three high-ALA accessions shared similar sequences with the pro-moters and CDSs of BnFAD3.C4 and BnFAD3.A3.In A28 and SW,substitution of three amino acid residues in BnFAD2.A5 and BnFAD2.C5,an absence of BnFAD2.C1 locus,and a 549 bp long deletion on the BnFAD3.A3 promoter were detected.The profile of BnFAD2 mutation in the two low-ALA accessions A28 and SW is different from that reported in previous studies.The mutations in BnFAD3 in the high-ALA accessions are reported for thefirst time.In identifying the sites of these mutations,we provide detailed information to aid the design of mole-cular markers for accelerated breeding schemes.展开更多
Technologies of underground mobile positioning were proposed based on LiDAR data and coded sequence pattern landmarks for mine shafts and tunnels environment to meet the needs of fast and accurate positioning and navi...Technologies of underground mobile positioning were proposed based on LiDAR data and coded sequence pattern landmarks for mine shafts and tunnels environment to meet the needs of fast and accurate positioning and navigation of equipments in the mine underground without satellite navigation signals. A coded sequence pattern was employed for automatic matching of 3D scans. The methods of SIFT feature, Otsu segmentation and fast hough transformation were described for the identification, positioning and interpretation of the coded sequence patterns, respectively. The POSIT model was presented for speeding up computation of the translation and rotation parameters of LiDAR point data, so as to achieve automatic 3D mapping of mine shafts and tunnels. The moving positioning experiment was applied to evaluating the accuracy of proposed pose estimation method from LiDAR scans and coded sequence pattern landmarks acquired in an indoor environment. The performance was evaluated using ground truth data of the indoor setting so as to measure derivations with six degrees of freedom.展开更多
Proteomics is the study of proteins and their interactions in a cell. With the successful completion of the Human Cenome Project, it comes the postgenome era when the proteomics technology is emerging. This paper stud...Proteomics is the study of proteins and their interactions in a cell. With the successful completion of the Human Cenome Project, it comes the postgenome era when the proteomics technology is emerging. This paper studies protein molecule from the algebraic point of view. The algebraic system (∑, +, *) is introduced, where ∑ is the set of 64 codons. According to the characteristics of (∑, +, *), a novel quasi-amino acids code classification method is introduced and the corresponding algebraic operation table over the set ZU of the 16 kinds of quasi-amino acids is established. The internal relation is revealed about quasi-amino acids. The results show that there exist some very close correlations between the properties of the quasi-amino acids and the codon. All these correlation relationships may play an important part in establishing the logic relationship between codons and the quasi-amino acids during the course of life origination. According to Ma F et al (2003 J. Anhui Agricultural University 30 439), the corresponding relation and the excellent properties about amino acids code are very difficult to observe. The present paper shows that (ZU, +,×) is a field. Furthermore, the operational results display that the eodon tga has different property from other stop codons. In fact, in the mitochondrion from human and ox genomic codon, tga is just tryptophane, is not the stop codon like in other genetic code, it is the case of the Chen W C et al (2002 Acta Biophysiea Siniea 18(1) 87). The present theory avoids some inexplicable events of the 20 kinds of amino acids code, in other words it solves the problem of 'the 64 codon assignments of mRNA to amino acids is probably completely wrong' proposed by Yang (2006 Progress in Modern Biomedicine 6 3).展开更多
Let p =ef +1 be an odd prime with positive integers e and f. In this paper, we calculate the values of Gauss periods of order e =3, 4, 6 over a finite field GF(q), where q is a prime with q≠p. As applications, severa...Let p =ef +1 be an odd prime with positive integers e and f. In this paper, we calculate the values of Gauss periods of order e =3, 4, 6 over a finite field GF(q), where q is a prime with q≠p. As applications, several cyclotomic sequences of order e =3, 4, 6 are employed to construct a number of classes of cyclic codes over GF(q) with prime length. Under certain conditions, the linear complexity and reciprocal minimal polynomials of cyclotomic sequences are calculated, and the lower bounds on the minimum distances of these cyclic codes are obtained.展开更多
Development of efficient gene prediction algorithms is one of the fundamental efforts in gene prediction study in the area of genomics. In genomic signal processing the basic step of the identification of protein codi...Development of efficient gene prediction algorithms is one of the fundamental efforts in gene prediction study in the area of genomics. In genomic signal processing the basic step of the identification of protein coding regions in DNA sequences is based on the period-3 property exhibited by nucleotides in exons. Several approaches based on signal processing tools and numerical representations have been applied to solve this problem, trying to achieve more accurate predictions. This paper presents a new indicator sequence based on amino acid sequence, called as aminoacid indicator sequence, derived from DNA string that uses the existing signal processing based time-domain and frequency domain methods to predict these regions within the billions long DNA sequence of eukaryotic cells which reduces the computational load by one-third. It is known that each triplet of bases, called as codon, instructs the cell machinery to synthesize an amino acid. The codon sequence therefore uniquely identifies an amino acid sequence which defines a protein. Thus the protein coding region is attributed by the codons in amino acid sequence. This property is used for detection of period-3 regions using amino acid sequence. Physico-chemical properties of amino acids are used for numerical representation. Various accuracy measures such as exonic peaks, discriminating factor, sensitivity, specificity, miss rate, wrong rate and approximate correlation are used to demonstrate the efficacy of the proposed predictor. The proposed method is validated on various organisms using the standard data-set HMR195, Burset and Guigo and KEGG. The simulation result shows that the proposed method is an effective approach for protein coding prediction.展开更多
BACKGROUND Accumulating evidence suggests that the maxillary process,to which cranial crest cells migrate,is essential to tooth development.Emerging studies indicate that Cd271 plays an essential role in odontogenesis...BACKGROUND Accumulating evidence suggests that the maxillary process,to which cranial crest cells migrate,is essential to tooth development.Emerging studies indicate that Cd271 plays an essential role in odontogenesis.However,the underlying mechanisms have yet to be elucidated.AIM To establish the functionally heterogeneous population in the maxillary process,elucidate the effects of Cd271 deficiency on gene expression differences.METHODS p75NTR knockout(Cd271-/-)mice(from American Jackson laboratory)were used to collect the maxillofacial process tissue of p75NTR knockout mice,and the wildtype maxillofacial process of the same pregnant mouse wild was used as control.After single cell suspension,the cDNA was prepared by loading the single cell suspension into the 10x Genomics Chromium system to be sequenced by NovaSeq6000 sequencing system.Finally,the sequencing data in Fastq format were obtained.The FastQC software is used to evaluate the quality of data and CellRanger analyzed the data.The gene expression matrix is read by R software,and Seurat is used to control and standardize the data,reduce the dimension and cluster.We search for marker genes for subgroup annotation by consulting literature and database;explore the effect of p75NTR knockout on mesenchymal stem cells(MSCs)gene expression and cell proportion by cell subgrouping,differential gene analysis,enrichment analysis and protein-protein interaction network analysis;understand the interaction between MSCs cells and the differentiation trajectory and gene change characteristics of p75NTR knockout MSCs by cell communication analysis and pseudo-time analysis.Last we verified the findings single cell sequencing in vitro.RESULTS We identified 21 cell clusters,and we re-clustered these into three subclusters.Importantly,we revealed the cell–cell communication networks between clusters.We clarified that Cd271 was significantly associated with the regulation of mineralization.CONCLUSION This study provides comprehensive mechanistic insights into the maxillary-process-derived MSCs and demonstrates that Cd271 is significantly associated with the odontogenesis in mesenchymal populations.展开更多
In this paper, a multicarrier DS-CDMA system which employs Z-Complementary Se- quences (ZCS) as spreading code is investigated. The new system can not only eliminate multipath interference and Multiple Access Interfer...In this paper, a multicarrier DS-CDMA system which employs Z-Complementary Se- quences (ZCS) as spreading code is investigated. The new system can not only eliminate multipath interference and Multiple Access Interference (MAI), but also support flexible number of users com- pared with system using Orthogonal Complementary (OC) codes. Multicarrier DS-CDMA using OC codes can be regarded as a special case of our proposed system. Zero Correlation Zone (ZCZ) of ZCS can be flexibly adjusted to meet the requirements on the user number and maximum multipath and in- ter-user delay, in this way, more users can be supported without losing interference-free property. The effectiveness of the proposed system is validated through theoretical analysis and simulation results.展开更多
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a...Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.展开更多
A novel diagrammtic method is proposed to show the angular distribution of bases of human protein sequences. Using this method, the distribution sphere[1-4] is divided into four regions with same volume. The picture i...A novel diagrammtic method is proposed to show the angular distribution of bases of human protein sequences. Using this method, the distribution sphere[1-4] is divided into four regions with same volume. The picture is clearer and more intuitive than that in [1] .A rule on the angular distribution of the representative points of bases of protein sequences is given. Besides, in 300 representative pointS of human protein sequence samples we find that there are three (not only one) points outside the sphere.展开更多
This paper proposes a new block matching criterion called the bit-correlation matching function for image sequence coding. When using the identical fast searching algorithm, the bit-correlation matching function not o...This paper proposes a new block matching criterion called the bit-correlation matching function for image sequence coding. When using the identical fast searching algorithm, the bit-correlation matching function not only results in nearly the same accuracy in displacement estimation as the mean square error function, but also makes the algorithm low in computation complexity and easy to parallel implementation, thus reducing the coding time of image sequence efficiently.展开更多
This paper proved the statement that a good linear block encoder is in fact a good local-random sequence generator. Furthermore, this statement discovers the deep relationship between the error-correcting coding theor...This paper proved the statement that a good linear block encoder is in fact a good local-random sequence generator. Furthermore, this statement discovers the deep relationship between the error-correcting coding theory and the modern cryptography.展开更多
To compress screen image sequence in real-time remote and interactive applications,a novel compression method is proposed.The proposed method is named as CABHG.CABHG employs hybrid coding schemes that consist of intra...To compress screen image sequence in real-time remote and interactive applications,a novel compression method is proposed.The proposed method is named as CABHG.CABHG employs hybrid coding schemes that consist of intra-frame and inter-frame coding modes.The intra-frame coding is a rate-distortion optimized adaptive block size that can be also used for the compression of a single screen image.The inter-frame coding utilizes hierarchical group of pictures(GOP) structure to improve system performance during random accesses and fast-backward scans.Experimental results demonstrate that the proposed CABHG method has approximately 47%-48% higher compression ratio and 46%-53% lower CPU utilization than professional screen image sequence codecs such as TechSmith Ensharpen codec and Sorenson 3 codec.Compared with general video codecs such as H.264 codec,XviD MPEG-4 codec and Apple's Animation codec,CABHG also shows 87%-88% higher compression ratio and 64%-81% lower CPU utilization than these general video codecs.展开更多
A novel kind of multidimension symbol/sequence trellis coded modulation (TCM) based on TCM of lower coding rate has been constructed. The redundancy of this new kind of TCM is provided not only by the modulated symbo...A novel kind of multidimension symbol/sequence trellis coded modulation (TCM) based on TCM of lower coding rate has been constructed. The redundancy of this new kind of TCM is provided not only by the modulated symbol sequence but also by the PN sequences for spreading spectrum as well. The performance of direct sequence spread spectrum multiple access (DS/SSMA) system with this symbol/sequence TCM over flat Rayleigh fading channel has been investigated by theoretical analysis and numerical simulation. The results obtained in this research demonstrate the performance improvements of this system in comparison with that of the DS/SSMA system with conventional TCM under the same conditions.展开更多
Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher ...Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.展开更多
文摘Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using complementary DNA (cDNA) derived from messenger RNA (mRNA) extracted from plant tissues and generated by reverse transcription. However, some CDS are difficult to acquire through this process as they are expressed at extremely low levels or have specific spatial and/or temporal expression patterns in vivo. These challenges require the development of alternative CDS cloning technologies. In this study, we found that the genomic intron-containing gene coding sequences (gDNA) from Arabidopsis thaliana, Oryza sativa, Brassica napus, and Glycine max can be correctly transcribed and spliced into mRNA in Nicotiana benthamiana. In contrast, gDNAs from Triticum aestivum and Sorghum bicolor did not function correctly. In transient expression experiments, the target DNA sequence is driven by a constitutive promoter. Theoretically, a sufficient amount of mRNA can be extracted from the N. benthamiana leaves, making it conducive to the cloning of CDS target genes. Our data demonstrate that N. benthamiana can be used as an effective host for the cloning CDS of plant genes.
基金The study was financially supported by Projects from Shaanxi Province(2021LLRH-07-03-01 and 2023-ZDLNY-07)Yangling Seed Industry Innovation(YLzy-yc2021-01).The funders had no role in study design,data collection and analysis,decision to publish,or preparation of the manuscript.
文摘Genetic manipulation(either restraint or enhancement)of the biosynthesis pathway ofα-linolenic acid(ALA)in seed oil is an important goal in Brassica napus breeding.B.napus is a tetraploid plant whose genome often har-bors four and six homologous copies,respectively,of the two fatty acid desaturases FAD2 and FAD3,which con-trol the last two steps of ALA biosynthesis during seed oil accumulation.In this study,we compared their promoters,coding sequences,and expression levels in three high-ALA inbred lines 2006L,R8Q10,and YH25005,a low-ALA line A28,a low-ALA/high-oleic-acid accession SW,and the wildtype ZS11.The expression levels of most FAD2 and FAD3 homologs in the three high-ALA accessions were higher than those in ZS11 and much higher than those in A28 and SW.The three high-ALA accessions shared similar sequences with the pro-moters and CDSs of BnFAD3.C4 and BnFAD3.A3.In A28 and SW,substitution of three amino acid residues in BnFAD2.A5 and BnFAD2.C5,an absence of BnFAD2.C1 locus,and a 549 bp long deletion on the BnFAD3.A3 promoter were detected.The profile of BnFAD2 mutation in the two low-ALA accessions A28 and SW is different from that reported in previous studies.The mutations in BnFAD3 in the high-ALA accessions are reported for thefirst time.In identifying the sites of these mutations,we provide detailed information to aid the design of mole-cular markers for accelerated breeding schemes.
基金Project(2011CB707102)supported by the National Basic Research Program of ChinaProjects(40901220,41001302)supported by the National Natural Science Foundation of China+1 种基金Project(122025)supported by Fok Ying Tong Education Foundation,ChinaProject(N100401009)supported by Fundamental Research Funds for Central Universities,China
文摘Technologies of underground mobile positioning were proposed based on LiDAR data and coded sequence pattern landmarks for mine shafts and tunnels environment to meet the needs of fast and accurate positioning and navigation of equipments in the mine underground without satellite navigation signals. A coded sequence pattern was employed for automatic matching of 3D scans. The methods of SIFT feature, Otsu segmentation and fast hough transformation were described for the identification, positioning and interpretation of the coded sequence patterns, respectively. The POSIT model was presented for speeding up computation of the translation and rotation parameters of LiDAR point data, so as to achieve automatic 3D mapping of mine shafts and tunnels. The moving positioning experiment was applied to evaluating the accuracy of proposed pose estimation method from LiDAR scans and coded sequence pattern landmarks acquired in an indoor environment. The performance was evaluated using ground truth data of the indoor setting so as to measure derivations with six degrees of freedom.
基金Project supported in part by the International Technology Collaboration Research Program of China (Grant No 2007DFA706700)
文摘Proteomics is the study of proteins and their interactions in a cell. With the successful completion of the Human Cenome Project, it comes the postgenome era when the proteomics technology is emerging. This paper studies protein molecule from the algebraic point of view. The algebraic system (∑, +, *) is introduced, where ∑ is the set of 64 codons. According to the characteristics of (∑, +, *), a novel quasi-amino acids code classification method is introduced and the corresponding algebraic operation table over the set ZU of the 16 kinds of quasi-amino acids is established. The internal relation is revealed about quasi-amino acids. The results show that there exist some very close correlations between the properties of the quasi-amino acids and the codon. All these correlation relationships may play an important part in establishing the logic relationship between codons and the quasi-amino acids during the course of life origination. According to Ma F et al (2003 J. Anhui Agricultural University 30 439), the corresponding relation and the excellent properties about amino acids code are very difficult to observe. The present paper shows that (ZU, +,×) is a field. Furthermore, the operational results display that the eodon tga has different property from other stop codons. In fact, in the mitochondrion from human and ox genomic codon, tga is just tryptophane, is not the stop codon like in other genetic code, it is the case of the Chen W C et al (2002 Acta Biophysiea Siniea 18(1) 87). The present theory avoids some inexplicable events of the 20 kinds of amino acids code, in other words it solves the problem of 'the 64 codon assignments of mRNA to amino acids is probably completely wrong' proposed by Yang (2006 Progress in Modern Biomedicine 6 3).
基金Supported by the National Natural Science Foundation(NNSF)of China(No.11171150)Foundation of Science and Technology on Information Assurance Laboratory(No.KJ-13-001)+1 种基金Funding of Jiangsu Innovation Program for Graduate Education(CXLX13-127,Fundamental Research Funds for the Central Universities)Funding for Outstanding Doctoral Dissertation in NUAA(BCXJ-13-17)
文摘Let p =ef +1 be an odd prime with positive integers e and f. In this paper, we calculate the values of Gauss periods of order e =3, 4, 6 over a finite field GF(q), where q is a prime with q≠p. As applications, several cyclotomic sequences of order e =3, 4, 6 are employed to construct a number of classes of cyclic codes over GF(q) with prime length. Under certain conditions, the linear complexity and reciprocal minimal polynomials of cyclotomic sequences are calculated, and the lower bounds on the minimum distances of these cyclic codes are obtained.
文摘Development of efficient gene prediction algorithms is one of the fundamental efforts in gene prediction study in the area of genomics. In genomic signal processing the basic step of the identification of protein coding regions in DNA sequences is based on the period-3 property exhibited by nucleotides in exons. Several approaches based on signal processing tools and numerical representations have been applied to solve this problem, trying to achieve more accurate predictions. This paper presents a new indicator sequence based on amino acid sequence, called as aminoacid indicator sequence, derived from DNA string that uses the existing signal processing based time-domain and frequency domain methods to predict these regions within the billions long DNA sequence of eukaryotic cells which reduces the computational load by one-third. It is known that each triplet of bases, called as codon, instructs the cell machinery to synthesize an amino acid. The codon sequence therefore uniquely identifies an amino acid sequence which defines a protein. Thus the protein coding region is attributed by the codons in amino acid sequence. This property is used for detection of period-3 regions using amino acid sequence. Physico-chemical properties of amino acids are used for numerical representation. Various accuracy measures such as exonic peaks, discriminating factor, sensitivity, specificity, miss rate, wrong rate and approximate correlation are used to demonstrate the efficacy of the proposed predictor. The proposed method is validated on various organisms using the standard data-set HMR195, Burset and Guigo and KEGG. The simulation result shows that the proposed method is an effective approach for protein coding prediction.
基金National Natural Science Foundation of China(General Program),No.31870971Medical Health Science and Technology Project of Zhejiang Province,No.2023KY155.
文摘BACKGROUND Accumulating evidence suggests that the maxillary process,to which cranial crest cells migrate,is essential to tooth development.Emerging studies indicate that Cd271 plays an essential role in odontogenesis.However,the underlying mechanisms have yet to be elucidated.AIM To establish the functionally heterogeneous population in the maxillary process,elucidate the effects of Cd271 deficiency on gene expression differences.METHODS p75NTR knockout(Cd271-/-)mice(from American Jackson laboratory)were used to collect the maxillofacial process tissue of p75NTR knockout mice,and the wildtype maxillofacial process of the same pregnant mouse wild was used as control.After single cell suspension,the cDNA was prepared by loading the single cell suspension into the 10x Genomics Chromium system to be sequenced by NovaSeq6000 sequencing system.Finally,the sequencing data in Fastq format were obtained.The FastQC software is used to evaluate the quality of data and CellRanger analyzed the data.The gene expression matrix is read by R software,and Seurat is used to control and standardize the data,reduce the dimension and cluster.We search for marker genes for subgroup annotation by consulting literature and database;explore the effect of p75NTR knockout on mesenchymal stem cells(MSCs)gene expression and cell proportion by cell subgrouping,differential gene analysis,enrichment analysis and protein-protein interaction network analysis;understand the interaction between MSCs cells and the differentiation trajectory and gene change characteristics of p75NTR knockout MSCs by cell communication analysis and pseudo-time analysis.Last we verified the findings single cell sequencing in vitro.RESULTS We identified 21 cell clusters,and we re-clustered these into three subclusters.Importantly,we revealed the cell–cell communication networks between clusters.We clarified that Cd271 was significantly associated with the regulation of mineralization.CONCLUSION This study provides comprehensive mechanistic insights into the maxillary-process-derived MSCs and demonstrates that Cd271 is significantly associated with the odontogenesis in mesenchymal populations.
基金Supported by the National Natural Science Foundation of China (No.60772087, No.90604035)111 Project (No.111- 2-14)
文摘In this paper, a multicarrier DS-CDMA system which employs Z-Complementary Se- quences (ZCS) as spreading code is investigated. The new system can not only eliminate multipath interference and Multiple Access Interference (MAI), but also support flexible number of users com- pared with system using Orthogonal Complementary (OC) codes. Multicarrier DS-CDMA using OC codes can be regarded as a special case of our proposed system. Zero Correlation Zone (ZCZ) of ZCS can be flexibly adjusted to meet the requirements on the user number and maximum multipath and in- ter-user delay, in this way, more users can be supported without losing interference-free property. The effectiveness of the proposed system is validated through theoretical analysis and simulation results.
文摘Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.
文摘A novel diagrammtic method is proposed to show the angular distribution of bases of human protein sequences. Using this method, the distribution sphere[1-4] is divided into four regions with same volume. The picture is clearer and more intuitive than that in [1] .A rule on the angular distribution of the representative points of bases of protein sequences is given. Besides, in 300 representative pointS of human protein sequence samples we find that there are three (not only one) points outside the sphere.
基金Supported by the National Natural Science Foundation of ChinaNational Key Lab. on Integrated Serrices Network
文摘This paper proposes a new block matching criterion called the bit-correlation matching function for image sequence coding. When using the identical fast searching algorithm, the bit-correlation matching function not only results in nearly the same accuracy in displacement estimation as the mean square error function, but also makes the algorithm low in computation complexity and easy to parallel implementation, thus reducing the coding time of image sequence efficiently.
基金Supported by Trans-century Training Program Foundation for the Talents by the State Education Commission
文摘This paper proved the statement that a good linear block encoder is in fact a good local-random sequence generator. Furthermore, this statement discovers the deep relationship between the error-correcting coding theory and the modern cryptography.
基金Project(60873230) supported by the National Natural Science Foundation of China
文摘To compress screen image sequence in real-time remote and interactive applications,a novel compression method is proposed.The proposed method is named as CABHG.CABHG employs hybrid coding schemes that consist of intra-frame and inter-frame coding modes.The intra-frame coding is a rate-distortion optimized adaptive block size that can be also used for the compression of a single screen image.The inter-frame coding utilizes hierarchical group of pictures(GOP) structure to improve system performance during random accesses and fast-backward scans.Experimental results demonstrate that the proposed CABHG method has approximately 47%-48% higher compression ratio and 46%-53% lower CPU utilization than professional screen image sequence codecs such as TechSmith Ensharpen codec and Sorenson 3 codec.Compared with general video codecs such as H.264 codec,XviD MPEG-4 codec and Apple's Animation codec,CABHG also shows 87%-88% higher compression ratio and 64%-81% lower CPU utilization than these general video codecs.
文摘A novel kind of multidimension symbol/sequence trellis coded modulation (TCM) based on TCM of lower coding rate has been constructed. The redundancy of this new kind of TCM is provided not only by the modulated symbol sequence but also by the PN sequences for spreading spectrum as well. The performance of direct sequence spread spectrum multiple access (DS/SSMA) system with this symbol/sequence TCM over flat Rayleigh fading channel has been investigated by theoretical analysis and numerical simulation. The results obtained in this research demonstrate the performance improvements of this system in comparison with that of the DS/SSMA system with conventional TCM under the same conditions.
文摘Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.