To see the other types of publications on this topic, follow the link: Deletion verification.

Journal articles on the topic 'Deletion verification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Deletion verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Qambar, Aziz Kawa, and Baban Ahmed Mahmood. "Assured data deletion in cloud computing: security analysis and requirements." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1174–83. https://doi.org/10.11591/ijeecs.v28.i2.pp1174-1183.

Full text
Abstract:
With the rapid development of cloud storage, more data owners store their data on the remote cloud to reduce the heavy local storage overhead. Cloud storage provides clients with a storage space that they may outsource and use on a pay-as-you-go basis. Due to data ownership separation and management, local data owners lose control over their data. Hence, all the operations over the outsourced data such as data transfer, update, and deletion, will be executed by the remote cloud server. As a result of that, various security challenges appear in terms of data privacy and integrity. In addition to data deletion that becomes an important security challenge, once a cloud user intends to delete his data, it must be sure that data is deleted from all cloud storage sources and prevent the cloud server from reserving the data maliciously for economic interests. In this paper, we present and discuss several types of research that use different technologies to solve assured deletion problems and verification the deletion result. The paper also presents a thorough analysis of the surveyed protocols in terms of finegrained, security, performance, and requirements of remote cloud storage design.
APA, Harvard, Vancouver, ISO, and other styles
2

Sommer, David M., Liwei Song, Sameer Wagh, and Prateek Mittal. "Athena: Probabilistic Verification of Machine Unlearning." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 268–90. http://dx.doi.org/10.56553/popets-2022-0072.

Full text
Abstract:
The right to be forgotten, also known as the right to erasure, is the right of individuals to have their data erased from an entity storing it. The status of this long held notion was legally solidified recently by the General Data Protection Regulation (GDPR) in the European Union. As a consequence, there is a need for mechanisms whereby users can verify if service providers comply with their deletion requests. In this work, we take the first step in proposing a formal framework, called Athena, to study the design of such verification mechanisms for data deletion requests – also known as machine unlearning – in the context of systems that provide machine learning as a service (MLaaS). Athena allows the rigorous quantification of any verification mechanism based on hypothesis testing. Furthermore, we propose a novel verification mechanism that leverages backdoors and demonstrate its effectiveness in certifying data deletion with high confidence, thus providing a basis for quantitatively inferring machine unlearning. We evaluate our approach over a range of network architectures such as multi-layer perceptrons (MLP), convolutional neural networks (CNN), residual networks (ResNet), and long short-term memory (LSTM) and over 6 different datasets. We demonstrate that: (1) our approach has minimal effect on the accuracy of the ML service but provides high confidence verification of unlearning, even if multiple users employ our system to ascertain compliance with data deletion requests, and (2) our mechanism is robust against servers deploying state-of-the-art backdoor defense methods. Overall, our approach provides a foundation for a quantitative analysis of verifying machine unlearning, which can provide support for legal and regulatory frameworks pertaining to users’ data deletion requests.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Lihua, Chunhui Liu, Boping Li, Haodong Fang, and Jinguang Gu. "A Secure Storage and Deletion Verification Scheme of Microgrid Data Based on Integrating Blockchain into Edge Computing." Electronics 11, no. 23 (2022): 4033. http://dx.doi.org/10.3390/electronics11234033.

Full text
Abstract:
A microgrid generates a large amount of power data during daily operation, which needs to be safely transferred, stored, and deleted. In this paper, we propose a secure storage and deletion verification scheme that combines blockchain and edge computing for the problems of limited storage capacity of blockchain and unverifiable data deletion. Firstly, edge computing is used to preprocess power data to reduce the amount of data and to improve the quality of data. Secondly, a hybrid encryption method that combines the improved ElGamal algorithm and the AES-256 algorithm is used to encrypt outsourcing data, and a secure storage chain is built based on the K-Raft consensus protocol to ensure the security of data in the transmission process. Finally, after initiating a data deletion request and successfully deleting the data, a deletion proof is generated and stored in the chain built, based on the Streamlet consensus protocol. The experimental results illustrate that the basic computing cost, block generation time, and communication delay of this scheme are the most efficient; the efficiency of the improved ElGamal algorithm is three times that of the traditional algorithm; the transaction throughput of the the double-layer blockchain can reach 13,000 tps at most. This scheme can realize the safe storage of microgrid data, and can also realize the efficient deletion and verification of outsourcing data.
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Jun, Minshen Wang, Jinbo Xiong, and Yongjin Hu. "CP-ABE-Based Secure and Verifiable Data Deletion in Cloud." Security and Communication Networks 2021 (March 27, 2021): 1–14. http://dx.doi.org/10.1155/2021/8855341.

Full text
Abstract:
Cloud data, the ownership of which is separated from their administration, usually contain users’ private information, especially in the fifth-generation mobile communication (5G) environment, because of collecting data from various smart mobile devices inevitably containing personal information. If it is not securely deleted in time or the result of data deletion cannot be verified after their expiration, this will lead to serious issues, such as unauthorized access and data privacy disclosure. Therefore, this affects the security of cloud data and hinders the development of cloud computing services seriously. In this paper, we propose a novel secure data deletion and verification (SDVC) scheme based on CP-ABE to achieve fine-grained secure data deletion and deletion verification for cloud data. Based on the idea of access policy in CP-ABE, we construct an attribute association tree to implement fast revoking attribute and reencrypting key to achieve fine-grained control of secure key deletion. Furthermore, we build a rule transposition algorithm to generate random data blocks and combine the overwriting technology with the Merkle hash tree to implement secure ciphertext deletion and generate a validator, which is then used to verify the result of data deletion. We prove the security of the SDVC scheme under the standard model and verify the correctness and effectiveness of the SDVC scheme through theoretical analysis and ample simulation experiment results.
APA, Harvard, Vancouver, ISO, and other styles
5

Tang, YongLi, Shuai Wu, and XiaoJun Wang. "Redactable Blockchain Trust Scheme Based on Reputation Consensus for MEC." Computational Intelligence and Neuroscience 2022 (April 28, 2022): 1–14. http://dx.doi.org/10.1155/2022/3269445.

Full text
Abstract:
Blockchain technology can build trust, reduce costs, and accelerate transactions in the mobile edge computing (MEC) and manage computing resources using the smart contract. However, the immutability of blockchain also poses challenges for the MEC, such as the smart contract with bugs cannot be modified or deleted. We propose a redactable blockchain trust scheme based on reputation consensus and a one-way trapdoor function in response to the problem that data on the blockchain, which is an error or invalid needs to be modified or deleted. The scheme calculates each user’s reputation based on their currency age and behavior. The SM2 asymmetric cryptography algorithm is used as the one-way trapdoor function to construct a new Merkle tree structure, which guarantees the legitimacy of the modification or deletion after verification and vote. The simulation experiments show that the modification or deletion does not change the existing blockchain structure and the links of blocks. Furthermore, the consensus verification accurately passes after the modification or deletion operations, which indicates the proposed scheme is feasible.
APA, Harvard, Vancouver, ISO, and other styles
6

Klausegger, Alfred, Fabian Leditzky, Susanne Krämer, et al. "A Novel Homozygous 9385 bp Deletion in the FERMT1 (KIND1) Gene in a Malaysian Family with Kindler Epidermolysis bullosa and a Review of Large Deletions." International Journal of Molecular Sciences 26, no. 9 (2025): 4237. https://doi.org/10.3390/ijms26094237.

Full text
Abstract:
Kindler Epidermolysis bullosa (KEB; OMIM 173650) is a rare autosomal recessive genodermatosis characterized by bullous poikiloderma and photosensitivity. Additional presentations include blistering, poor wound healing, skin atrophy, and increased risk of skin cancer. Most cases of KEB result from aberrations in the FERMT1 (Fermitin family member 1) gene encoding kindlin-1 and include nonsense, frameshift, splicing, and missense variants. Large deletion variants have been reported in nine cases to date. Most variants are predicted to lead to premature termination of translation and to loss of kindlin-1 function. In this study, we report on a 33-year-old male patient who presented with typical clinical manifestations of KEB. As routine molecular testing failed to obtain a diagnosis, Next Generation Sequencing (NGS) of an Epidermolysis Bullosa (EB)-specific panel was carried out followed by the determination of the deletion breakpoints and verification at the mRNA and protein levels. This approach revealed a new large homozygous deletion of ~9.4 kb in the FERMT1 gene involving exons 7 to 9. Finally, we performed a literature review on large FERMT1 deletions. The deletion is predicted to skip exons 7 to 9 within the mRNA, which results in a frameshift. The patient’s phenotype is likely caused by the resulting truncated and non-functioning protein. Our report further enriches the spectrum of FERMT1 gene variants to improve genotype–phenotype correlations.
APA, Harvard, Vancouver, ISO, and other styles
7

Liehr, Thomas, Sylke Singer, Ulrike Mau-Holzmann, et al. "Results of Chromosomal Microarray Need to Always Be Checked by (Molecular) Cytogenetics—Even If They Seem to Be Simple Deletions." Genes 16, no. 6 (2025): 714. https://doi.org/10.3390/genes16060714.

Full text
Abstract:
Background/Objectives: Chromosome microarrays (CMAs) tend to be used as the first line test or as a test that does not require confirmation or verification by a second test. However, to understand the implications of a duplication or deletion for a family seeking genetic counseling, it is crucial to know the nature of the underlying chromosomal rearrangement. Here, we present seven cases with apparent isolated copy number loss, five of which showed unexpected complexity. Methods: Seven cases were investigated by CMA due to intellectual disability and/or dysmorphic features. Isolated deletions ranging in size from ~0.6 to ~21 Mb were found and referred for further characterization of the underlying chromosomal rearrangement. To elucidate the cases, fluorescence in situ hybridization was performed using locus-specific, whole and partial chromosome painting and/or multicolor banding. Results: Among the seven selected cases, there were five with unexpected complexity. Isolated deletions were actually evidence of chromoanasynthesis, ring chromosome formation, unbalanced translocation, or unbalanced insertion. Conclusions: These results clearly underscore that it seems reasonable to examine every case with a copy number variant—even if it appears to be “only” a simple partial deletion—using banding and/or molecular cytogenetic testing in order to make a qualified assessment of the situation and, on this basis, ensure sound genetic counseling.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhuang, Jianlong, Yu Zheng, Yuying Jiang, Junyu Wang, Shuhong Zeng та Nansong Liu. "Long-Read Sequencing Identified a Large Novel δ/β-Globin Gene Deletion in a Chinese Family". Human Mutation 2023 (4 жовтня 2023): 1–8. http://dx.doi.org/10.1155/2023/2766625.

Full text
Abstract:
Objective. Increasingly rare thalassemia has been identified with the advanced use of long-read sequencing based on long-read technology. Here, we aim to present a novel δ/β-globin gene deletion identified by long-read sequencing technology. Methods. Enrolled in this study was a family from the Quanzhou region of Southeast China. Routine blood analysis and hemoglobin (Hb) capillary electrophoresis were used for hematological screening. Genetic testing for common α- and β-thalassemia was carried out using the reverse dot blot hybridization technique. Long-read sequencing was performed to detect rare globin gene variants. Specific gap-polymerase chain reaction (gap-PCR) and/or Sanger sequencing were further used to verify the detected variants. Results. None of the common α- and β-thalassemia mutations or deletions were observed in the family. However, decreased levels of MCV, MCH, and abnormal Hb bands were observed in the family members, who were suspected as rare thalassemia carriers. Further, long-read sequencing demonstrated a large novel 7.414 kb deletion NG_000007.3:g.63511_70924del partially cover HBB and HBD globin genes causing delta-beta fusion gene in the proband. Parental verification indicated that the deletion was inherited from the proband’s father, while none of the globin gene variants were observed in the proband’s mother. In addition, the novel δ/β-globin gene deletion was further verified by gap-PCR and Sanger sequencing. Conclusion. In this study, we first present a large novel δ/β-globin gene deletion in a Chinese family using long-read sequencing, which may cause δβ-thalassemia. This study further enhances that long-read sequencing would be applied as a sharp tool for detecting rare and novel globin gene variants.
APA, Harvard, Vancouver, ISO, and other styles
9

Cardelli, E., E. Della Torre, and A. Faba. "Experimental Verification of the Deletion and Congruency Properties in Si-Fe Magnetic Steels." IEEE Transactions on Magnetics 45, no. 11 (2009): 5243–46. http://dx.doi.org/10.1109/tmag.2009.2031077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tulkinbekov, Khikmatullo, and Deok-Hwan Kim. "Data Modifications in Blockchain Architecture for Big-Data Processing." Sensors 23, no. 21 (2023): 8762. http://dx.doi.org/10.3390/s23218762.

Full text
Abstract:
Due to the immutability of blockchain, the integration with big-data systems creates limitations on redundancy, scalability, cost, and latency. Additionally, large amounts of invaluable data result in the waste of energy and storage resources. As a result, the demand for data deletion possibilities in blockchain has risen over the last decade. Although several prior studies have introduced methods to address data modification features in blockchain, most of the proposed systems need shorter deletion delays and security requirements. This study proposes a novel blockchain architecture called Unlichain that provides data-modification features within public blockchain architecture. To achieve this goal, Unlichain employed a new indexing technique that defines the deletion time for predefined lifetime data. The indexing technique also enables the deletion possibility for unknown lifetime data. Unlichain employs a new metadata verification consensus among full and meta nodes to avoid delays and extra storage usage. Moreover, Unlichain motivates network nodes to include more transactions in a new block, which motivates nodes to scan for expired data during block mining. The evaluations proved that Unlichain architecture successfully enables instant data deletion while the existing solutions suffer from block dependency issues. Additionally, storage usage is reduced by up to 10%.
APA, Harvard, Vancouver, ISO, and other styles
11

Yang, Changsong, Xiaoling Tao, and Feng Zhao. "Publicly verifiable data transfer and deletion scheme for cloud storage." International Journal of Distributed Sensor Networks 15, no. 10 (2019): 155014771987899. http://dx.doi.org/10.1177/1550147719878999.

Full text
Abstract:
With the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as data transfer and deletion, will be executed by the remote cloud server. As a result, the data transfer and deletion have become two security issues because the selfish remote cloud server might not honestly execute these operations for economic benefits. In this article, we design a scheme that aims to make the data transfer and the transferred data deletion operations more transparent and publicly verifiable. Our proposed scheme is based on vector commitment (VC), which is used to deal with the problem of public verification during the data transfer and deletion. More specifically, our new scheme can provide the data owner with the ability to verify the data transfer and deletion results. In addition, by using the advantages of VC, our proposed scheme does not require any trusted third party. Finally, we prove that the proposed scheme not only can reach the expected security goals but also can satisfy the efficiency and practicality.
APA, Harvard, Vancouver, ISO, and other styles
12

Worden, Kirsten. "Erasing Illusions: A Statutory Framework for Deletion in U.S. Data Privacy." Texas A&M Law Review 12, no. 2 (2025): 925–60. https://doi.org/10.37419/lr.v12.i2.10.

Full text
Abstract:
Since the passage of the California Consumer Privacy Act in 2018, states have rushed to pass their own consumer data protection laws, filling the glaring absence of comprehensive federal privacy law in the United States. These state privacy statutes are largely modeled after the European Union’s (“EU’s”) General Data Protection Regulation (“GDPR”), which introduced the “right to be forgotten.” This right permits EU residents to request that organizations delete their personal information. U.S. state laws have followed the GDPR by adopting a “right to delete.” Yet these new state laws provide little detail about the right to delete and lack mechanisms to ensure enforcement, meaning the U.S. right to delete offers a hollow promise of consumer control. Moreover, the current U.S. privacy regime—including state common law, enforcement by state attorneys general, sector-specific federal laws, and actions by the Federal Trade Commission—fails to compensate for the bare-bones approach to deletion rights employed at the state level. Privacy statutes should include a combination of individual deletion rights and “structural” business requirements to fully protect deletion interests and create meaningful consumer control. Statutes should include broadly drafted deletion provisions, verification requirements, a private right of action, data destruction requirements, data mapping requirements, third-party deletion obligations, and agency reporting mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
13

Qambar Aziz, Kawa, and Baban Ahmed Mahmood. "Assured data deletion in cloud computing: security analysis and requirements." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1174. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp1174-1183.

Full text
Abstract:
With the rapid development of cloud storage, more data owners store their data on the remote cloud to reduce the heavy local storage overhead. Cloud storage provides clients with a storage space that they may outsource and use on a pay-as-you-go basis. Due to data ownership separation and management, local data owners lose control over their data. Hence, all the operations over the outsourced data such as data transfer, update, and deletion, will be executed by the remote cloud server. As a result of that, various security challenges appear in terms of data privacy and integrity. In addition to data deletion that becomes an important security challenge, once a cloud user intends to delete his data, it must be sure that data is deleted from all cloud storage sources and prevent the cloud server from reserving the data maliciously for economic interests. In this paper, we present and discuss several types of research that use different technologies to solve assured deletion problems and verification the deletion result. The paper also presents a thorough analysis of the surveyed protocols in terms of fine-grained, security, performance, and requirements of remote cloud storage design.
APA, Harvard, Vancouver, ISO, and other styles
14

Ping, Yuan, Yu Zhan, Ke Lu, and Baocang Wang. "Public Data Integrity Verification Scheme for Secure Cloud Storage." Information 11, no. 9 (2020): 409. http://dx.doi.org/10.3390/info11090409.

Full text
Abstract:
Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data. Therefore, it is extremely urgent to design security schemes allowing the users to check the integrity of data with acceptable computational and communication overheads. In this paper, we first propose a public data integrity verification scheme based on the algebraic signature and elliptic curve cryptography. This scheme not only allows the third party authority deputize for users to verify the outsourced data integrity, but also resists malicious attacks such as replay attacks, replacing attack and forgery attacks. Data privacy is guaranteed by symmetric encryption. Furthermore, we construct a novel data structure named divide and conquer hash list, which can efficiently perform data updating operations, such as deletion, insertion, and modification. Compared with the relevant schemes in the literature, security analysis and performance evaluations show that the proposed scheme gains some advantages in integrity verification and dynamic updating.
APA, Harvard, Vancouver, ISO, and other styles
15

Mathiyalahan, Subasri, Shobana Manivannan, Mahalakshmi Nagasundaram, and R. Ezhilarasie. "Data Integrity Verification Using MPT (Merkle Patricia Tree) in Cloud Computing." International Journal of Engineering & Technology 7, no. 2.24 (2018): 500. http://dx.doi.org/10.14419/ijet.v7i2.24.12146.

Full text
Abstract:
Data integrity of outsourced data is main problem in CSP (cloud service provider). Space overhead and computation complexity are very high issue in recent PDP(Provable Data Possession) verification schemes. To overcome such issues MPDP (Mobile Provable Data Possession) schemes using hash tree data structure and Boneh-Lynn-Snacham short signature scheme have been used over decade. Data dynamics is well supported in MPDP scheme via block less verification, dynamic data operations, stateless verification, and verification out sourcing. But still there are some operations which can be performed much more efficiently in some other way than that of the two methods prescribed above. Operations in particular, data modification operations like insertion and deletion operations is somewhat difficult or in other words time consuming in hash tree data structure. In this paper, we have deployed an improved hash tree structure called MPT (Merkle Patricia Tree) for integrity checking.MPT is combination of MHT (Merkle Hash Tree) and patricia tree where each node consists of key-value pairs. As of now, MPT has been used only in block chain technology for providing authentication of transactions through Ethereum.
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Sheng, Haiying Xing, Chenlei Hua, Hui-Shan Guo, and Jie Zhang. "An Improved Single-Step Cloning Strategy Simplifies the Agrobacterium tumefaciens-Mediated Transformation (ATMT)-Based Gene-Disruption Method for Verticillium dahliae." Phytopathology® 106, no. 6 (2016): 645–52. http://dx.doi.org/10.1094/phyto-10-15-0280-r.

Full text
Abstract:
The soilborne fungal pathogen Verticillium dahliae infects a broad range of plant species to cause severe diseases. The availability of Verticillium genome sequences has provided opportunities for large-scale investigations of individual gene function in Verticillium strains using Agrobacterium tumefaciens-mediated transformation (ATMT)-based gene-disruption strategies. Traditional ATMT vectors require multiple cloning steps and elaborate characterization procedures to achieve successful gene replacement; thus, these vectors are not suitable for high-throughput ATMT-based gene deletion. Several advancements have been made that either involve simplification of the steps required for gene-deletion vector construction or increase the efficiency of the technique for rapid recombinant characterization. However, an ATMT binary vector that is both simple and efficient is still lacking. Here, we generated a USER-ATMT dual-selection (DS) binary vector, which combines both the advantages of the USER single-step cloning technique and the efficiency of the herpes simplex virus thymidine kinase negative-selection marker. Highly efficient deletion of three different genes in V. dahliae using the USER-ATMT-DS vector enabled verification that this newly-generated vector not only facilitates the cloning process but also simplifies the subsequent identification of fungal homologous recombinants. The results suggest that the USER-ATMT-DS vector is applicable for efficient gene deletion and suitable for large-scale gene deletion in V. dahliae.
APA, Harvard, Vancouver, ISO, and other styles
17

Sravani, P. S. L. "Robust Fingerprint Verification-Using Real Time Security Alerts." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1753–59. https://doi.org/10.22214/ijraset.2025.67644.

Full text
Abstract:
This work presents Robust Fingerprint Authentication with Real-Time Security Alerts, a biometric authentication system that integrates Aadhaar-based identity verification, liveness detection, and real-time SMS notifications. Traditional fingerprint authentication systems store biometric data persistently, increasing the risk of breaches and unauthorized access. To address this, the proposed system ensures immediate deletion of fingerprint data after verification, enhancing security and user privacy. Advanced image processing techniques and deep learning models are employed for liveness detection, mitigating spoofing attacks using fake fingerprints. An OTP-based authentication mechanism adds an additional security layer, while real-time SMS notifications inform users of authentication attempts, improving transparency. The system is implemented using Flask, PostgreSQL, OpenCV, Twilio, and TensorFlow, ensuring scalability, efficiency, and secure data handling. HTTPS encryption and compliance with GDPR and CCPA regulations further strengthen security by enforcing responsible biometric data processing. Experimental results demonstrate 98.5% fingerprint matching accuracy, 97.8% liveness detection success, and 99.3% OTP verification accuracy, surpassing traditional fingerprint authentication models. By integrating multi-layered security features and real-time user alerts, this system provides a privacy-conscious, secure, and efficient biometric authentication solution suitable for applications in banking, government services, and enterprise security
APA, Harvard, Vancouver, ISO, and other styles
18

Allamigeon, Xavier, Uli Fahrenberg, Stéphane Gaubert, Ricardo D. Katz, and Axel Legay. "Tropical Fourier–Motzkin elimination, with an application to real-time verification." International Journal of Algebra and Computation 24, no. 05 (2014): 569–607. http://dx.doi.org/10.1142/s0218196714500258.

Full text
Abstract:
We introduce a generalization of tropical polyhedra able to express both strict and non-strict inequalities. Such inequalities are handled by means of a semiring of germs (encoding infinitesimal perturbations). We develop a tropical analogue of Fourier–Motzkin elimination from which we derive geometrical properties of these polyhedra. In particular, we show that they coincide with the tropically convex union of (non-necessarily closed) cells that are convex both classically and tropically. We also prove that the redundant inequalities produced when performing successive elimination steps can be dynamically deleted by reduction to mean payoff game problems. As a complement, we provide a coarser (polynomial time) deletion procedure which is enough to arrive at a simply exponential bound for the total execution time. These algorithms are illustrated by an application to real-time systems (reachability analysis of timed automata).
APA, Harvard, Vancouver, ISO, and other styles
19

Mun, Seyoung, Songmi Kim, Wooseok Lee, et al. "A study of transposable element-associated structural variations (TASVs) using a de novo-assembled Korean genome." Experimental & Molecular Medicine 53, no. 4 (2021): 615–30. http://dx.doi.org/10.1038/s12276-021-00586-y.

Full text
Abstract:
AbstractAdvances in next-generation sequencing (NGS) technology have made personal genome sequencing possible, and indeed, many individual human genomes have now been sequenced. Comparisons of these individual genomes have revealed substantial genomic differences between human populations as well as between individuals from closely related ethnic groups. Transposable elements (TEs) are known to be one of the major sources of these variations and act through various mechanisms, including de novo insertion, insertion-mediated deletion, and TE–TE recombination-mediated deletion. In this study, we carried out de novo whole-genome sequencing of one Korean individual (KPGP9) via multiple insert-size libraries. The de novo whole-genome assembly resulted in 31,305 scaffolds with a scaffold N50 size of 13.23 Mb. Furthermore, through computational data analysis and experimental verification, we revealed that 182 TE-associated structural variation (TASV) insertions and 89 TASV deletions contributed 64,232 bp in sequence gain and 82,772 bp in sequence loss, respectively, in the KPGP9 genome relative to the hg19 reference genome. We also verified structural differences associated with TASVs by comparative analysis with TASVs in recent genomes (AK1 and TCGA genomes) and reported their details. Here, we constructed a new Korean de novo whole-genome assembly and provide the first study, to our knowledge, focused on the identification of TASVs in an individual Korean genome. Our findings again highlight the role of TEs as a major driver of structural variations in human individual genomes.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Zhaoqi, Feng Ni, Jiang Liu, Niannian Chen, and Xingjun Zhou. "Collaborative Modeling of BPMN and HCPN: Formal Mapping and Iterative Evolution of Process Models for Scenario Changes." Information 16, no. 4 (2025): 323. https://doi.org/10.3390/info16040323.

Full text
Abstract:
Dynamic and changeable business scenarios pose significant challenges to the adaptability and verifiability of process models. Despite its widespread adoption as an ISO-standard modeling language, Business Process Model and Notation (BPMN) faces inherent limitations in formal semantics and verification capabilities, hindering the mathematical validation of process evolution behaviors under scenario changes. To address these challenges, this paper proposes a collaborative modeling framework integrating BPMN with hierarchical colored Petri nets (HCPNs), enabling the efficient iterative evolution and correctness verification of process change through formal mapping and localized evolution mechanism. First, hierarchical mapping rules are established with subnet-based modular decomposition, transforming BPMN elements into an HCPN executable model and effectively resolving semantic ambiguities; second, atomic evolution operations (addition, deletion, and replacement) are defined to achieve partial HCPN updates, eliminating the computational overhead of global remapping. Furthermore, an automated verification pipeline is constructed by analyzing state spaces, validating critical properties such as deadlock freeness and behavioral reachability. Evaluated through an intelligent AI-driven service scenario involving multi-gateway processes, the framework demonstrates behavioral effectiveness. This work provides a pragmatic solution for scenario-driven process evolution in domains requiring agile iteration, such as fintech and smart manufacturing.
APA, Harvard, Vancouver, ISO, and other styles
21

Hołub, Karolina, Boris A. Malyarchuk, Miroslava V. Derenko, et al. "Verification of insertion-deletion markers (InDels) and microsatellites (STRs) as subsidiary tools for inferring Slavic population ancestry." Archives of Forensic Medicine and Criminology 72, no. 3 (2023): 120–37. http://dx.doi.org/10.4467/16891716amsik.22.015.17393.

Full text
Abstract:
Genetic markers for the prediction of biogeographical ancestry have proved to be effective tools for law enforcement agencies for many years now. In this study, we attempted to assess the potential of insertion-deletion markers (InDel) and microsatellites (STRs) as subsidiary polymorphisms for inference of Slavic population ancestry. For that purpose, we genotyped Slavic-speaking populations samples from Belarus, the Czech Republic, Poland, Serbia, Ukraine and Russia in 46 InDels and 15 STRs by PCR and capillary electrophoresis and analyzed for between-population differentiation with the use of distance-based methods (FST, principal component analysis and multidimensional scaling). Additionally, we studied a sample from a Polish individual of well-documented genealogy whose biogeographic ancestry had previously been inferred by commercial genomic services using autosomal single nucleotide polymorphisms (SNPs), mitochondrial DNA and Y-SNP markers. For comparative purposes, we used genotype data collected in the “forInDel” browser and allele frequencies from previously published papers. The results obtained for InDels and STRs show that the Slavic populations constitute a genetically homogeneous group, with the exception of the Czechs differing clearly from the other tested populations. The analysis of the known Polish sample in the Snipper application proves the usefulness of the InDel markers on the continental level only. Conversely, microsatellites not only improve prediction, but are also informative if considered as an independent set of ancestry markers. Weryfikacja markerów insercyjno-delecyjnych (InDels) i mikrosatelitarnych (STR) jako narzędzi pomocniczych do wnioskowania o pochodzeniu populacji słowiańskiej Markery genetyczne do przewidywania pochodzenia biogeograficznego od wielu lat okazują się skutecznymi narzędziami dla organów ścigania. W tym badaniu podjęliśmy próbę oceny potencjału markerów insercyjno-delecyjnych (InDel) i mikrosatelitarnych (STR) jako pomocniczych polimorfizmów do wnioskowania o pochodzeniu populacji słowiańskiej. W tym celu genotypowaliśmy próbki populacji słowiańskojęzycznych z Białorusi, Czech, Polski, Serbii, Ukrainy i Rosji w w zakresie 46 markerów InDel oraz 15 loci STR za pomocą PCR i elektroforezy kapilarnej oraz analizowaliśmy pod kątem różnicowania między populacjami za pomocą metod bazujących na dystansach genetycznych (FST, analiza głównych składowych i skalowanie wielowymiarowe). Dodatkowo zbadaliśmy próbkę mężczyzny z populacji polskiej o dobrze udokumentowanej genealogii, którego pochodzenie biogeograficzne zostało wcześniej ustalone przez komercyjne usługi genomiczne przy użyciu autosomalnych polimorfizmów pojedynczych nukleotydów (SNP), mitochondrialnego DNA i markerów Y-SNP. Do celów porównawczych wykorzystaliśmy dane genotypowe zebrane w przeglądarce „forInDel” i częstości alleli z wcześniej opublikowanych artykułów. Uzyskane wyniki dla InDels i STR wskazują, że populacje słowiańskie stanowią grupę genetycznie jednorodną, z wyjątkiem Czechów wyraźnie różniących się od pozostałych badanych populacji. Analiza znanej polskiej próbki w aplikacji Snipper dowodzi przydatności markerów InDel jedynie na poziomie kontynentalnym. Z kolei, mikrosatelity nie tylko poprawiają wyniki predykcji, ale są informatywne jako niezależny zestaw markerów pochodzenia biogeograficznego.
APA, Harvard, Vancouver, ISO, and other styles
22

Zheng, Hao, Jun Xu, Yu Wang, et al. "Identification and Characterization of a Cryptic Genomic Deletion-Insertion in EYA1 Associated with Branchio-Otic Syndrome." Neural Plasticity 2021 (April 5, 2021): 1–9. http://dx.doi.org/10.1155/2021/5524381.

Full text
Abstract:
Branchio-oto-renal spectrum disorder (BORSD) is characterized by hearing loss accompanied by ear malformations, branchial cysts, and fistulae, with (branchio-oto-renal syndrome (BORS)) or without renal abnormalities (BOS (branchio-otic syndrome)). As the most common causative gene for BORSD, dominant mutations in EYA1 are responsible for approximately 40% of the cases. In a sporadic deaf patient diagnosed as BOS, we identified an apparent heterozygous genomic deletion spanning the first four coding exons and one 5′noncoding exon of EYA1 by targeted next-generation sequencing of 406 known deafness genes. Real-time PCR at multiple regions of EYA1 confirmed the existence of this genomic deletion and extended its 5′boundary beyond the 5′-UTR. Whole genome sequencing subsequently located the 5′and 3′breakpoints to 19268 bp upstream to the ATG initiation codon and 3180 bp downstream to exon 5. PCR amplification across the breakpoints in both the patient and his parents showed that the genomic alteration occurred de novo. Sanger sequencing of this PCR product revealed that it is in fact a GRCh38/hg38:chr8:g.71318554_71374171delinsTGCC genomic deletion-insertion. Our results showed that the genomic variant is responsible for the hearing loss associated with BOS and provided an example for deciphering such cryptic genomic alterations following pipelines of comprehensive exome/genome sequencing and designed verification.
APA, Harvard, Vancouver, ISO, and other styles
23

Hu, Guanggan, Andrena Kamp, Rob Linning, Suresh Naik, and Guus Bakkeren. "Complementation of Ustilago maydis MAPK Mutants by a Wheat Leaf Rust, Puccinia triticina Homolog: Potential for Functional Analyses of Rust Genes." Molecular Plant-Microbe Interactions® 20, no. 6 (2007): 637–47. http://dx.doi.org/10.1094/mpmi-20-6-0637.

Full text
Abstract:
From a large expressed sequence tag (EST) database representing several developmental stages of Puccinia triticina, we discovered a mitogen-activated protein kinase (MAPK) with homology to kinases with known pathogenic functions in other fungi. This PtMAPK1 is similar to the Ustilago maydis MAPK, Ubc3/Kpp2, but has a longer N-terminal extension of 43 amino acids (aa) with identities to U. maydis Kpp6, a homolog of Ubc3/Kpp2 with a 170-aa N-terminal extension. Ubc3/Kpp2 is involved in mating and subsequent pathogenic development, whereas Kpp6 functions during invasive growth in corn tissue. PtMAPK1, expressed from a Ustilago sp.-specific promoter, was able to complement a ubc3/kpp2 deletion mutant and restore mating. It also substantially increased virulence on corn, measured as tumor formation, of a kpp6 deletion mutant. Moreover, this construct restored to near-full pathogenicity a ubc3/kpp2 kpp6 nonpathogenic double deletion mutant. Complementation of the ubc3/kpp2 mutant with the complete PtMAPK gene and verification of expression by reverse-transcription polymerase chain reaction indicated that the rust promoter is recognized in U. maydis. Phylogenetically, these basidiomycete plant pathogens are related, which was reflected in comparison of P. triticina ESTs to U. maydis gene sequences. The U. maydis heterologous expression system allows functional analysis of rust genes, currently frustrated by the lack of efficient transformation and selection procedures.
APA, Harvard, Vancouver, ISO, and other styles
24

KONG, T. Y. "ON TOPOLOGY PRESERVATION IN 2-D AND 3-D THINNING." International Journal of Pattern Recognition and Artificial Intelligence 09, no. 05 (1995): 813–44. http://dx.doi.org/10.1142/s0218001495000341.

Full text
Abstract:
An (m, n)-simple 1 in a binary image I has the property that its deletion “preserves topology” when m-adjacency is used on the 1’s and n-adjacency on the 0’s of I. This paper presents new, easily visualized, necessary and sufficient conditions for a 1 in I to be (m, n)-simple, for (m, n)=(26, 6), (18, 6), (6, 26) or (6, 18) when I is a 3-d image and (m, n)=(8, 4) or (4, 8) when I is a 2-d image. Systematic and fairly general methods of verifying that a given parallel thinning algorithm always preserves topology are described, for the cases where 8-/26-adjacency is used on the 1’s and 4-/6-adjacency on the 0’s, or vice versa. The verification methods for 2-d algorithms are mainly due to Ronse and Hall; the methods for 3-d algorithms were found by Ma and Kong. New proofs are given of the correctness of these verification methods, using the characterizations of simple 1’s presented in this paper.
APA, Harvard, Vancouver, ISO, and other styles
25

Yang, Tiantian, Pengyu Zhang, Jiahui Pan, et al. "Genome-Wide Analysis of the Peroxidase Gene Family and Verification of Lignin Synthesis-Related Genes in Watermelon." International Journal of Molecular Sciences 23, no. 2 (2022): 642. http://dx.doi.org/10.3390/ijms23020642.

Full text
Abstract:
Watermelon (Citrullus lanatus) is an important horticultural crop worldwide, but peel cracking caused by peel hardness severely decreases its quality. Lignification is one of the important functions of class III peroxidase (PRX), and its accumulation in the plant cell wall leads to cell thickening and wood hardening. For in-depth physiological and genetical understanding, we studied the relationship between peel hardness and lignin accumulation and the role of PRXs affecting peel lignin biosynthesis using genome-wide bioinformatics analysis. The obtained results showed that lignin accumulation gradually increased to form the peel stone cell structure, and tissue lignification led to peel hardness. A total of 79 ClPRXs (class III) were identified using bioinformatics analysis, which were widely distributed on 11 chromosomes. The constructed phylogenetics indicated that ClPRXs were divided into seven groups and eleven subclasses, and gene members of each group had highly conserved intron structures. Repeated pattern analysis showed that deletion and replication events occurred during the process of ClPRX amplification. However, in the whole-protein sequence alignment analysis, high homology was not observed, although all contained four conserved functional sites. Repeated pattern analysis showed that deletion and replication events occurred during ClPRXs’ amplification process. The prediction of the promoter cis-acting element and qRT-PCR analysis in four tissues (leaf, petiole, stem, and peel) showed different expression patterns for tissue specificity, abiotic stress, and hormone response by providing a genetic basis of the ClPRX gene family involved in a variety of physiological processes in plants. To our knowledge, we for the first time report the key roles of two ClPRXs in watermelon peel lignin synthesis. In conclusion, the extensive data collected in this study can be used for additional functional analysis of ClPRXs in watermelon growth and development and hormone and abiotic stress response.
APA, Harvard, Vancouver, ISO, and other styles
26

Romero, Tammy A., Ebenezer Tumban, Jeongwon Jun, William B. Lott, and Kathryn A. Hanley. "Secondary structure of dengue virus type 4 3′ untranslated region: impact of deletion and substitution mutations." Journal of General Virology 87, no. 11 (2006): 3291–96. http://dx.doi.org/10.1099/vir.0.82182-0.

Full text
Abstract:
Several studies have generated computer-based predictions of secondary structure of the 3′ untranslated region (UTR) of Dengue virus (DEN); however, experimental verification of the formation of these structures in vitro is lacking. This study assessed the congruence of Mfold predictions of secondary structure of the core region of the DEN type 4 3′ UTR with nuclease maps of this region. Maps and predictions were largely consistent. Maps supported the existence of previously predicted pseudoknots and identified putative regions of dynamic folding. Additionally, this study investigated previously identified conserved elements in the flavivirus 3′ UTR that differ among viruses with different modes of transmission. Specific regions of mosquito-borne DEN type 4 were either deleted or replaced with homologous sequences from tick-borne Langat virus. All of these mutations caused substantial distortion of secondary structure, yet viruses carrying these mutations were viable.
APA, Harvard, Vancouver, ISO, and other styles
27

Mukti, Nilam Indra Permata, Niniek Imaningsih, and Cholid Fadil. "Optimizing the Provision of PBB Billing Letters to Increase Local Revenue at Bapenda UPTB 2 Rungkut Region in Dukuh Sutorejo Village." Unram Journal of Community Service 6, no. 1 (2025): 233–37. https://doi.org/10.29303/ujcs.v6i1.862.

Full text
Abstract:
Optimizing Property Tax (PBB) revenue is a primary focus in enhancing the Regional Original Revenue (PAD) in Surabaya City. This study aims to analyze the implementation of PBB tax bill delivery through a door to door approach in Dukuh Sutorejo Village, Mulyorejo District. The methods used include tax arrears data verification, field validation, and uploading collection results into the Regional Revenue Agency (Bapenda) system. The data were analyzed to identify obstacles to PBB payments, such as discrepancies in Tax Object Numbers (NOP), taxpayers' economic constraints, and a lack of tax awareness. Its results indicate that delivering PBB tax bills directly increases tax payment realization, both through full payment and installment methods. Additionally, field validation successfully identified NOPs that require updates or deletion, thereby improving the efficiency of the tax collection process. Education provided during verification effectively raised taxpayers' awareness of the importance of tax compliance. The conclusion of this study is that the door to door approach, combined with the delivery of PBB tax bills, can be a strategic solution to optimize regional tax revenue. This method is recommended for broader implementation to support sustainable regional development through increased Regional Original Revenue (PAD).
APA, Harvard, Vancouver, ISO, and other styles
28

Cui, Shiyun, Xiao Zhang, Ruihan Zou, Fan Ye, Yutong Wang, and Jing Sun. "MLH1 Exon 12 Gene Deletion Leading to Lynch Syndrome: A Case Report." Oncology Research and Treatment 44, no. 7-8 (2021): 414–21. http://dx.doi.org/10.1159/000516659.

Full text
Abstract:
<b><i>Introduction:</i></b> Deleterious heterozygous mutation of the MLH1 gene is an important cause of Lynch syndrome (LS), an autosomal dominant cancer caused by functional defects in the DNA mismatch repair (MMR) complex. <b><i>Case Report:</i></b> The proband was a 35-year-old patient with confirmed colorectal cancer (CRC). Immunohistochemical (IHC) staining revealed the absence of MLH1 and PMS2 expression in the colorectal tissue specimens of the patient. Genetic counselling and tumor gene testing were performed using next-generation sequencing technology. The genetic tumor verification report showed the deletion of 4 bases in exon 12 of the tested MLH1 gene and a transcoding mutation. To our knowledge, this germline splice site mutation of MLH1 has not been reported before. The proband accepted several therapeutic regimens including PD-1 inhibitor and ultimately died of multiple organ failure. <b><i>Conclusion:</i></b> Nonsense mutations and frameshift mutations of MMR genes are the most common causes of LS. Common mutations include those in MSH2, MLH1, MSH6, and PMS2. We report a mutation of MLH1 that has never been reported before. We recommend that patients with a history of colon or rectal cancer receive universal MMR or MSI testing and checkpoint inhibitor therapy for the first-line treatment of deficient MMR CRC.
APA, Harvard, Vancouver, ISO, and other styles
29

Jiao, Wen Zhe, Guo Qing Wang, Xiao Xue Ye, and Zheng Jun Zhai. "Efficient Dynamic Data Possession Checking in Cloud Computing." Advanced Materials Research 709 (June 2013): 603–10. http://dx.doi.org/10.4028/www.scientific.net/amr.709.603.

Full text
Abstract:
Cloud computing has been envisioned as a next generation information technology (IT) paradigm. The risk of losing data stored with any untrustworthy service provider is the key barrier to widespread uptake of cloud computing. This paper proposes an algebraic signature based remote data possession checking (RPDP) scheme to verify the integrity of the data stored in the cloud. This scheme uses skip-list to support fully dynamic data operation, including insertion, modification and deletion. The scheme allows verification without the need for the auditor to compare against the original data, which reduces the communication complexity dramatically. The storage complexity of cloud user is reduced to several bytes information. Extensive security analysis shows that the proposed scheme is highly provably secure.
APA, Harvard, Vancouver, ISO, and other styles
30

Baumgärtner, Maja, Uwe Kärst, Birgit Gerstel, Martin Loessner, Jürgen Wehland, and Lothar Jänsch. "Inactivation of Lgt Allows Systematic Characterization of Lipoproteins from Listeria monocytogenes." Journal of Bacteriology 189, no. 2 (2006): 313–24. http://dx.doi.org/10.1128/jb.00976-06.

Full text
Abstract:
ABSTRACT Lipoprotein anchoring in bacteria is mediated by the prolipoprotein diacylglyceryl transferase (Lgt), which catalyzes the transfer of a diacylglyceryl moiety to the prospective N-terminal cysteine of the mature lipoprotein. Deletion of the lgt gene in the gram-positive pathogen Listeria monocytogenes (i) impairs intracellular growth of the bacterium in different eukaryotic cell lines and (ii) leads to increased release of lipoproteins into the culture supernatant. Comparative extracellular proteome analyses of the EGDe wild-type strain and the Δlgt mutant provided systematic insight into the relative expression of lipoproteins. Twenty-six of the 68 predicted lipoproteins were specifically released into the extracellular proteome of the Δlgt strain, and this proved that deletion of lgt is an excellent approach for experimental verification of listerial lipoproteins. Consequently, we generated Δlgt ΔprfA double mutants to detect lipoproteins belonging to the main virulence regulon that is controlled by PrfA. Overall, we identified three lipoproteins whose extracellular levels are regulated and one lipoprotein that is posttranslationally modified depending on PrfA. It is noteworthy that in contrast to previous studies of Escherichia coli, we unambiguously demonstrated that lipidation by Lgt is not a prerequisite for activity of the lipoprotein-specific signal peptidase II (Lsp) in Listeria.
APA, Harvard, Vancouver, ISO, and other styles
31

Shin, Jiho, and Jung-Taek Seo. "Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger." Sustainability 14, no. 20 (2022): 13281. http://dx.doi.org/10.3390/su142013281.

Full text
Abstract:
With the diffusion of mobile devices and Internet hyperconnectivity technology, all daily living records of individuals are being recorded on mobile devices in real time. However, from the user’s point of view, the reliability of privacy protection, that is, whether the user’s data on the mobile device completely disappears when it is deleted, is critical. This is because, for the sustainability of social growth, it is necessary to control the digitalization and technology that heightens the risks of the future society. Therefore, this study aims to check the traces of the SQLite database to see if instant messenger messages deleted by the user can be recovered. When the SQLite database record is deleted, if the database shrink function or other application-level deletion does not work, it is possible to recover the deleted record. We chose two iOS-based instant messengers, WhatsApp and WeChat, and analyzed the SQLite DB file and Table Schema where messages are stored. As a result of the experiment in this study, it was verified that the area where the deleted message was stored in the SQLite DB file was overwritten with 0 × 00 or updated with a NULL value, making it impossible to recover the deleted message. This process operates at the app level, and user data is safely protected.
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Xiaolong, Xiaoqian Zhang, Yandong Luo, et al. "Large Fragment InDels Reshape Genome Structure of Porcine Alveolar Macrophage 3D4/21 Cells." Genes 13, no. 9 (2022): 1515. http://dx.doi.org/10.3390/genes13091515.

Full text
Abstract:
The porcine monomyeloid cell line, or 3D4/21 cells, is an effective tool to study the immune characteristics and virus infection mechanism of pigs. Due to the introduction of the neomycin resistance gene and the SV40 large T antigen gene, its genome has undergone essential changes, which are still unknown. Studying the variation in genome structure, especially the large fragments of insertions and deletions (InDels), is one of the proper ways to reveal these issues. In this study, an All-seq method was established by combining Mate-pair and Shotgun sequencing methods, and the detection and verification of large fragments of InDels were performed on 3D4/21 cells. The results showed that there were 844 InDels with a length of more than 1 kb, of which 12 regions were deletions of more than 100 kb in the 3D4/21 cell genome. In addition, compared with porcine primary alveolar macrophages, 82 genes including the CD163 had lost transcription in 3D4/21 cells, and 72 genes gained transcription as well. Further referring to the Hi-C structure, it was found that the fusion of the topologically associated domains (TADs) caused by the deletion may lead to abnormal gene function. The results of this study provide a basis for elaborating the genome structure and functional variation in 3D4/21 cells, provide a method for rapid and convenient detection of large-scale InDels, and provide useful clues for the study of the porcine immune function genome and the molecular mechanism of virus infection.
APA, Harvard, Vancouver, ISO, and other styles
33

Dangreau, Lisa, Mohammad J. Hosen, Julie De Zaeytijd, Bart P. Leroy, Paul J. Coucke, and Olivier M. Vanakker. "Gonadal Mosaicism as a Rare Inheritance Pattern in Recessive Genodermatoses: Report of Two Cases with Pseudoxanthoma Elasticum and Literature Review." Current Issues in Molecular Biology 46, no. 9 (2024): 9998–10007. http://dx.doi.org/10.3390/cimb46090597.

Full text
Abstract:
Germline mosaicism in autosomal recessive disorders is considered a rare disease mechanism with important consequences for diagnosis and patient counseling. In this report, we present two families with PXE in which paternal germline mosaicism for an ABCC6 whole-gene deletion was observed. The first family further illustrates the clinical challenges in PXE, with a typical PXE retinopathy in an apparently heterozygous carrier parent. A systematic review of the literature on gonadal mosaicism in autosomal recessive genodermatoses revealed 16 additional patients. As in most reported families, segregation analysis data are not mentioned, and this may still be an underrepresentation. Though rare, the possibility of germline mosaicism emphasizes the need for variant verification in parents and sibs of a newly diagnosed proband, as it has significant implications for genetic counseling and management.
APA, Harvard, Vancouver, ISO, and other styles
34

Chernetskaya, D. M., V. L. Surin, V. V. Salomashkina, et al. "Molecular and genetic verification of von Willebrand disease type 2N." Russian journal of hematology and transfusiology 67, no. 2 (2022): 172–80. http://dx.doi.org/10.35754/0234-5730-2022-67-2-172-180.

Full text
Abstract:
Introduction. Von Willebrand disease (vWD) is caused by von Willebrand factor (vWF) dysfunction resulting from pathogenic variants in the vWF gene coding the vWF protein. vWD type 2N is of particular interest, as it is characterized by almost normal vWF antigen level (Ag:vWF) and vWF loss of ability to bind FVIII and protect it from premature clearance, which leads to a low FVIII coagulation activity (FVIII:C). Therefore, the same phenotype occurs in patients with 2N type of vWD and hemophilia A.Aim — to identify patients with 2N type vWD using molecular genetic methods.Methods. Data from the medical histories of vWD patients were used. The major parameter in consideration was FVIII:C to vWF:Ag ratio, which is expected to be below 0.7 in type 2N of vWD. Pathogenic variants in exons and exon-intron junctions of the vWF gene were identified by Sanger sequencing. Due to recessive inheritance of type 2N, verification of the 2N vWD diagnosis required the identification of two pathogenic variants.Results. Three patients were considered as suffering from type 2N of vWD according to hemostasis parameters (FVIII:C/vWF:Ag < 0.7). One patient with a preliminary hemophilia A diagnosis was included after sequencing of the F8 gene, which showed no alterations, so 2N type of vWD was suspected. In all cases, sequencing of the relevant functional regions of the vWF gene led to verification of vWD type 2N. One woman (patient # 4) had a homozygous pathogenic variant p.Arg854Gln (c.2561 G>A) associated with type 2N vWD. One woman (patient # 3) was a compound heterozygote for the pathogenic variant p.Arg816Trp (c.2446 C>T) associated with type 2N and a newly described insertion c.2098_2099insG, that leads to a frameshift. The woman with FVIII:C/vWF:Ag < 0.7 (patient # 1) and the patient # 2 with preliminary hemophilia А diagnosis were both compound heterozygotes for the same combination of pathogenic variants — c.2435delC and p.Thr791Met (c.2372 C>T). Pathogenic variant p.Thr791Met is associated with type 2N, while the deletion c.2435delC should lead to allele disabling.Conclusion. Molecular methods allow more precise differentiation of type 2N from other types of vWD and hemophilia A.
APA, Harvard, Vancouver, ISO, and other styles
35

Cao, Yanhua, Xiongwei Zhao, Yajuan Liu, et al. "Genome-wide identification of ZmHMAs and association of natural variation in ZmHMA2 and ZmHMA3 with leaf cadmium accumulation in maize." PeerJ 7 (October 23, 2019): e7877. http://dx.doi.org/10.7717/peerj.7877.

Full text
Abstract:
P1B-type ATPases, known as heavy metal ATPases (HMAs), play an important role in the control of cadmium (Cd) accumulation in plants. In this study, a total of 12 ZmHMA genes were identified in the maize genome and particularly classified into six clusters based on their phylogenetic relationship and motif compositions. Furthermore, the expression patterns of different ZmHMA genes varied with developmental stages, and were tissue specific under normal conditions. ZmHMA2 and ZmHMA3 genes exhibited significant up-regulation under Cd treatment. Eventually, the association analysis between 103 inbred lines and alleles in ZmHMA2 and ZmHMA3 revealed that one insertion–deletion (InDel) in the intron from ZmHMA2 was associated with leaf Cd concentration under low Cd condition at the seedling stage. Twenty polymorphisms in ZmHMA3 were significantly associated with leaf Cd concentration under various Cd levels at seedling and maturing stages. Five single nucleotide polymorphisms (SNPs) and two InDels of these significantly associated polymorphic loci from ZmHMA3 caused the amino acid substitutions and insertion or deletion events. Importantly, the proteins encoded by ZmHMA2 and ZmHMA3 genes were located in the plasma membrane. This comprehensive analysis will provide an important theoretical basis for future functional verification of ZmHMA genes to unravel the mechanisms of Cd accumulation in leaves of maize. Additionally, the favorable alleles in ZmHMA3 will lay a foundation for the marker-assisted selection of low Cd accumulation in maize.
APA, Harvard, Vancouver, ISO, and other styles
36

Shin, Jiho. "Memory-Driven Forensic Analysis of SQL Server: A Buffer Pool and Page Inspection Approach." Sensors 25, no. 11 (2025): 3512. https://doi.org/10.3390/s25113512.

Full text
Abstract:
This study proposes a memory-based forensic procedure for real-time recovery of deleted data in Microsoft SQL Server environments. This approach is particularly relevant for sensor-driven and embedded systems—such as those used in IoT gateways and edge computing platforms—where lightweight SQL engines store critical operational and measurement data locally and are vulnerable to insider manipulation. Traditional approaches to deleted data recovery have primarily relied on transaction log analysis or static methods involving the examination of physical files such as .mdf and .ldf after taking the database offline. However, these methods face critical limitations in real-time applicability and may miss volatile data that temporarily resides in memory. To address these challenges, this study introduces a methodology that captures key deletion event information through transaction log analysis immediately after data deletion and directly inspects memory-resident pages loaded in the server’s Buffer Pool. By analyzing page structures in the Buffer Pool and cross-referencing them with log data, we establish a memory-driven forensic framework that enables both the recovery and verification of deleted records. In the experimental validation, records were deleted in a live SQL Server environment, and a combination of transaction log analysis and in-memory page inspection allowed for partial or full recovery of the deleted data. This demonstrates the feasibility of real-time forensic analysis without interrupting the operational database. The findings of this research provide a foundational methodology for enhancing the speed and accuracy of digital forensics in time-sensitive scenarios, such as insider threats or cyber intrusion incidents, by enabling prompt and precise recovery of deleted data directly from memory. These capabilities are especially critical in IoT environments, where real-time deletion recovery supports sensor data integrity, forensic traceability, and uninterrupted system resilience.
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Lei, Mingwei Cao, and Yeguo Sun. "A fusion data security protection scheme for sensitive E-documents in the open network environment." PLOS ONE 16, no. 12 (2021): e0258464. http://dx.doi.org/10.1371/journal.pone.0258464.

Full text
Abstract:
E-documents are carriers of sensitive data, and their security in the open network environment has always been a common problem with the field of data security. Based on the use of encryption schemes to construct secure access control, this paper proposes a fusion data security protection scheme. This scheme realizes the safe storage of data and keys by designing a hybrid symmetric encryption algorithm, a data security deletion algorithm, and a key separation storage method. The scheme also uses file filter driver technology to design a user operation state monitoring method to realize real-time monitoring of user access behavior. In addition, this paper designs and implements a prototype system. Through the verification and analysis of its usability and security, it is proved that the solution can meet the data security protection requirements of sensitive E-documents in the open network environment.
APA, Harvard, Vancouver, ISO, and other styles
38

Foy, T. M., D. M. Page, T. J. Waldschmidt, et al. "An essential role for gp39, the ligand for CD40, in thymic selection." Journal of Experimental Medicine 182, no. 5 (1995): 1377–88. http://dx.doi.org/10.1084/jem.182.5.1377.

Full text
Abstract:
The interactions between CD40 on B cells and its ligand gp39 on activated T helper cells are known to be essential for the development of thymus-dependent humoral immunity. However, CD40 is also functionally expressed on thymic epithelial cells and dendritic cells, suggesting that gp39-CD40 interactions may also play a role in thymic education, the process by which self-reactive cells are deleted from the T cell repertoire. Six systems of negative selection were studied for their reliance on gp39-CD40 interactions to mediate negative selection. In all cases, when the antigen/superantigen was endogenously expressed (in contrast to exogenously administered), negative selection was blocked by loss of gp39 function. Specifically, blockade of gp39-CD40 interactions prevented the deletion of thymocytes expressing V beta 3, V beta 11, and V beta 12, specificities normally deleted in BALB/c mice because of the endogenous expression of minor lymphocyte-stimulating determinants. Independent verification of a role of gp39 in negative selection was provided by studies in gp39-deficient mice where alterations in T cell receptor (TCR) V beta expression were also observed. Studies were also performed in the AND TCR transgenic (Tg) mice, which bear the V alpha 11, V beta 3 TCR and recognize both pigeon cytochrome c (PCC)/IEk and H-2As. Neonatal administration of anti-gp39 to AND TCR Tg mice that endogenously express H-2As or endogenously produce PCC prevented the deletion of TCR Tg T cells. In contrast, deletion mediated by high-dose PCC peptide antigen (administered exogenously) in AND TCR mice was unaltered by administration of anti-gp39. In addition, deletion by Staphylococcus enterotoxin B in conventional mice was also unaffected by anti-gp39 administration. gp39 expression was induced on thymocytes by mitogens or by antigen on TCR Tg thymocytes. Immunohistochemical analysis of B7-2 expression in the thymus indicated that, in the absence of gp39, B7-2 expression was substantially reduced. Taken together, these data suggest that gp39 may influence negative selection through the regulation of costimulatory molecule expression. Moreover, the data support the hypothesis that, for negative selection to some endogenously produced antigens, negative selection may be dependent on TCR engagement and costimulation.
APA, Harvard, Vancouver, ISO, and other styles
39

Radosavljević, Zvonko, and Dejan Ivković. "Contribution to determining the limits of the efficiency of target tracking." Scientific Technical Review 73, no. 2 (2023): 26–32. http://dx.doi.org/10.5937/str2302029r.

Full text
Abstract:
The track quality measuring by the track probability existence in order to determine the limits of the possibility of effective target tracking is present in this paper. The most known algorithms for radar target tracking do not have tools to measure track quality. There is no valid procedure that guarantees the verification of the optimal algorithm for a specific application in targets tracking. Standard Integrated Track Splitting (ITS) is the efficient, fully automatic multi target tracking algorithm with initialization, maintenance and deletion tracks and is well-known single and multi target tracking algorithm, also proposed for the purpose of testing the limits of successful tracking. The paper allows the user to choose optimal parameter by the proposed parameters - thresholds of confirmed and false tracks in order to achieve better false track discrimination (FTD). In particular, a diagram of RMSE position errors is also given in the comparison of the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
40

Hu, Ping, Dawen Jiao, Jiahui Qi, and Sidi Chen. "Influence and remedial measures of missing test data on magnetic field source location of underwater vehicle." Journal of Physics: Conference Series 2486, no. 1 (2023): 012061. http://dx.doi.org/10.1088/1742-6596/2486/1/012061.

Full text
Abstract:
Abstract Due to the incomplete data collected, it will increase the difficulty of inversion location in the field source inversion of the static magnetic field data of underwater vehicles. Therefore, it is very necessary to study the influence of data loss on the static magnetic source location of underwater vehicles and the field source location for timely remedy of missing data. In this paper, the static magnetic equivalent source model of underwater vehicle was established. Then the inversion positioning algorithm was used to locate the magnetic field source of the underwater vehicle obtained from the test, and the influence of the location result under the incomplete data information was analyzed. We used deleting method, linear interpolation method and sliding filling method to populate the data to fill the remedy of missing data. Using the localization algorithm to carried out the inversion location of source, then we took the location of source inversion and the size of the magnetic dipole moment to the ellipsoid model to get fitting curve of magnetic field. The simulation curve of contrast verification test data with experimental data and the lack of remedial method was feasible. The results show that the missing data can not be ignored for the location of the underwater vehicle’s magnetic field source, and the data pairs filled with missing data can be effectively located for the equivalent static magnetic field source of the underwater vehicle through using deletion method, linear interpolation method and sliding filling method.
APA, Harvard, Vancouver, ISO, and other styles
41

Cheremokhin, D. A., S. S. Deryabina, I. A. Tuzankina, E. V. Vlasova, N. V. Nikitina, and M. A. Bolkov. "Variability of CATCH-22 symptome complex within the framework of 22q11.2 deletion syndrome." Medical Immunology (Russia) 23, no. 6 (2021): 1357–66. http://dx.doi.org/10.15789/1563-0625-voc-2363.

Full text
Abstract:
Chromosomal pathology is one of the most common causes of congenital malformations. The CATCH-22 symptom complex is most often associated with a microdeletion of chromosome 22, upon detection of which it is customary to diagnose DiGeorge syndrome, a known primary immunodeficiency or syndrome of innate errors of immunity. According to our data on the frequency of occurrence among all chromosomal abnormalities, DiGeorge’s syndrome takes second place in the Sverdlovsk region after Down’s syndrome, but its diagnosis is not simple due to varying severity of clinical manifestations, as well as different forms of the chromosome 22 defects. Along with several typical variants of 22q11 microdeletions, there duplications of critical regions are also reported, accompanied by immunodeficiency and other symptoms of CATCH-22. The effectiveness of diagnosing chromosomal abnormalities both in pre- and postnatal period largely depends on the grouping criteria of the patients with suspected chromosomal abnormalities, and on the methods used to identify hereditary pathology. In our study, we analyzed and compared the results of studies of 23 patients with various rearrangements of the 22q11.2 region, which were observed by a geneticist and clinical immunologist. The paper presents data on the polymorphism of phenotypes associated with rearrangements of the 22q11.2 region with an analysis of pathomorphological manifestations depending on the type of structural anomaly, i.e, del22q11.2, or dup22q11.2. The results of analysis demonstrate importance of different diagnostic options for laboratory studies of microdeletion and microduplication syndromes associated with immune-dependent pathology. We also compared the results of molecular genetic diagnostics and phenotypic manifestations in deletions and duplications of the 22q11.2 region. To identify the rearrangements of 22q11.2 region, two different methods were used – Prenatal BoBs and multiplex ligase-dependent probes’ amplification (MLPA). In particular, the both methods were used in the same patient to verify diagnosis, thus enabling to show differences in their efficiency. It was concluded that 22q11.2 deletion syndrome exhibits wide heterogeneity in phenotypic traits: neurological and immunological manifestations, anomalies in musculoskeletal development and internal organs, skull deformities and facial dysmorphia. Each clinical case was unique, requiring careful analysis of clinical manifestations. It is necessary to have a wide range of laboratory options for molecular genetic verification of the diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Cheng-Zhi, Ling-Ling Guo, Qing-Hua Guo, and Yi-Ming Mu. "NBPF9 Gene May Be Involved in Congenital Hypopituitarism: A Whole-Genome Study of a Boy with Pituitary Stalk Interruption Syndrome and His Family." International Journal of Endocrinology 2020 (July 18, 2020): 1–9. http://dx.doi.org/10.1155/2020/5401738.

Full text
Abstract:
Pituitary stalk interruption syndrome (PSIS) is a rare congenital defect manifesting as various degrees of anterior pituitary hormone deficiency. Scattered familial cases have been found, revealing some genetic variants. However, most of the previous research studies involved an affected sibling, and the gene spectra of the patients’ entire family have rarely been reported. We conducted a study of a family consisting of a PSIS patient with his unaffected sibling and healthy parents of Han Chinese background using whole-genome sequencing. Bioinformatic analysis was carried out, and mutations related to PSIS, single-nucleotide variants (SNVs), insertion-deletion (InDELs), and structural variations (SVs) in all the four samples were filtered. After Sanger sequencing, we confirmed the variants obtained and selected three candidate genes for functional verification. The gene variations in this boy with PSIS and his lineal relatives are reported herein; de novo sequencing revealed that the NBPF9 gene may be involved in the pathogenesis of PSIS.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Zilong, Kaden Wang, and Fengyi Li. "Optimization of biohydrogen production by modifying metabolic pathways in Clostridium Thermocellum." Theoretical and Natural Science 76, no. 1 (2025): 154–60. https://doi.org/10.54254/2753-8818/2024.19983.

Full text
Abstract:
The ever-escalating energy crisis of disruptions in the supply of fossil fuels suggests the need for alternative means with sustainable energy sources. Of these, biohydrogen stands out as promising because it is clean and efficient. Our research aims to provide strategies for fine-tuning the biohydrogen production process using the dark fermentation pathway of Clostridium. Thermocellum since it efficiently degrades cellulose under anaerobic conditions and has high-temperature tolerance, improving hydrogen yield. Sugarcane bagasse enforces this integration by providing abundant resources at little cost, which can support circular economies. However, such problems as ethanol toxicity to C. Thermocellum require genetic modifications to enhance production efficiency. The plasmid design overexpresses NADH-dependent [FeFe] hydrogenase, knocks out ethanol production pathways, and hence maximizes biohydrogen output. The design of the plasmid mainly uses Golden gate assembly and homologous recombination to achieve gene overexpression and deletion, and restriction sites were designed for virtual digestion in plasmid verification.
APA, Harvard, Vancouver, ISO, and other styles
44

Liu, Guoyong, Xiuli Han, Xiang Yu, Yu Wang, Jinbiao Ma, and Yongqing Yang. "Identification of Aly1 and Aly2 as Modulators of Cytoplasmic pH in Saccharomyces cerevisiae." Current Issues in Molecular Biology 46, no. 1 (2023): 171–82. http://dx.doi.org/10.3390/cimb46010013.

Full text
Abstract:
The regulation of intracellular pH in yeast (Saccharomyces cerevisiae) cells is critical for cell function and viability. In yeast, protons (H+) can be excreted from the cell by plasma membrane ATPase PMA1 and pumped into vacuoles by vacuolar H+-ATPase. Because PMA1 is critical to the survival of yeast cells, it is unknown whether other compensatory components are involved in pH homeostasis in the absence of PMA1. To elucidate how intracellular pH is regulated independently of PMA1, we employed a screening approach by exposing the yeast haploid deletion mutant library (ver 4.0) to the selective plant plasma membrane H+-ATPase inhibitor PS-1, which we previously reported. After repeated screenings and verification, we identified two proteins, Aly1 and Aly2, that play a role in the regulation of intracellular pH when PMA1 is deficient. Our research uncovers a new perspective on the regulation of intracellular pH related to PMA1 and also preliminarily reveals a role for Aly1 and Aly2 in the regulation of intracellular pH.
APA, Harvard, Vancouver, ISO, and other styles
45

Siti Marya Ulpah and Tatang. "Analisis Bahasa Tulis Aksara Arab pada Anak dengan Gangguan Disleksia: Kajian Psikolinguistik." SPHOTA: Jurnal Linguistik dan Sastra 16, no. 1 (2024): 25–35. http://dx.doi.org/10.36733/sphota.v16i1.7707.

Full text
Abstract:
This research was conducted because there are problems with written Arabic script in children with dyslexia which has the potential to affect language abilities. This research aims to find out, understand, explain and describe the forms of written Arabic script in children with dyslexia. This research uses descriptive qualitative research. The subject of this research was RSK, a 10-year-old child who was in the fifth grade of elementary school. The data source for this research comes from written language documentation of the research subjects. Data collection techniques used in this research are interviews, documentation and observation. Research data was analyzed using data reduction techniques, data presentation, data verification and conclusions. The results of this research are that dyslexia in children causes various errors in children's written language. These errors include inversion (writing backward), writing the wrong period, substitution (replacing letters), and deletion (removing letters). This error occurs in hijaiyah letters which have similar visual shape and sound proximity to other hijaiyah letters.
APA, Harvard, Vancouver, ISO, and other styles
46

Lu, Yaohua, and Gangyi Ding. "Quantum Secure Multi-Party Summation with Graph State." Entropy 26, no. 1 (2024): 80. http://dx.doi.org/10.3390/e26010080.

Full text
Abstract:
Quantum secure multi-party summation (QSMS) is a fundamental problem in quantum secure multi-party computation (QSMC), wherein multiple parties compute the sum of their data without revealing them. This paper proposes a novel QSMS protocol based on graph state, which offers enhanced security, usability, and flexibility compared to existing methods. The protocol leverages the structural advantages of graph state and employs random graph state structures and random encryption gate operations to provide stronger security. Additionally, the stabilizer of the graph state is utilized to detect eavesdroppers and channel noise without the need for decoy bits. The protocol allows for the arbitrary addition and deletion of participants, enabling greater flexibility. Experimental verification is conducted to demonstrate the security, effectiveness, and practicality of the proposed protocols. The correctness and security of the protocols are formally proven. The QSMS method based on graph state introduces new opportunities for QSMC. It highlights the potential of leveraging quantum graph state technology to securely and efficiently solve various multi-party computation problems.
APA, Harvard, Vancouver, ISO, and other styles
47

Arissabarno, Cahyo, Sritrusta Sukaridhoto, Idris Winarno, and Rizqi Putri Nourma Budiarti. "Event-driven integration of electronic medical records with blockchain and InterPlanetary file system." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2131–42. https://doi.org/10.11591/eei.v14i3.9355.

Full text
Abstract:
The integrity, security, and accessibility of electronic medical record (EMR) are often compromised by traditional systems, which struggle to ensure data integrity, transparent audit trails, and secure long-term storage. This research addresses these challenges by integrating EMR with a private blockchain and InterPlanetary file system (IPFS) cluster, using change data capture (CDC) for real-time updates and integrate with existing EMR systems, avoiding the need for building new EMR software. Implemented in the OpenEMR framework, the system's performance is evaluated across various processes, including document uploading, sharing, access, deletion, and integrity verification. Testing with anonymized medical records in PDF formats ranging from 1 MB to 100 MB shows that uploading to IPFS takes 0.7 seconds per MB, blockchain transaction processing averages 4.2 seconds, CDC time is 1.1 seconds per MB, and OpenEMR uploads average 0.98 seconds per MB. These results demonstrate significant improvements in data security, integrity, and availability, following the CIA triad principles. The system provides a traceable and secure solution for EMR management.
APA, Harvard, Vancouver, ISO, and other styles
48

B., Rakesh, Lalitha K., Sushama C., Parveen Sultana H., and Rajitha O. "Distributed scheme to authenticate data storage security in cloud computing." Bulletin of Electrical Engineering and Informatics 8, no. 2 (2019): 683–89. https://doi.org/10.11591/eei.v8i2.1475.

Full text
Abstract:
Cloud computing is the revolution in current generation IT enterprise displaces database and application software to the large data centers for IT services. In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure–coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
APA, Harvard, Vancouver, ISO, and other styles
49

Szczepanek, Joanna, Sylwia Górka, Krzysztof Domagalski, et al. "Whole genome and transcriptome analysis of genetic determinants associated with cyclophosphamide in vitro in pediatric acute leukemias." Journal of Analytical & Pharmaceutical Research 10, no. 6 (2021): 229–38. http://dx.doi.org/10.15406/japlr.2021.10.00389.

Full text
Abstract:
Introduction: The main objective was to implement the determinations of the ex vivo resistance to cyclophosphamide and to identify the genetic profile for pediatric patients with acute leukemias. Methods: In order to determine the ex vivo drug resistance profile, MTT cytotoxicity assay was performed on mononuclear cells. Gene expression profiles were prepared on the basis of cRNA hybridization to oligonucleotide arrays of the human genome (Affymetrix). We performed also array-based comparative genomic hybridization using a SurePrint G3 Human CGH Microarray. Data was analyzed by bioinformatics tools. Verification of the relative expression level of 20 genes was carried out by qRT- PCR. Results: We observed a multitude of differentially expressed genes, e.g. ANXA1 (FC=3,04), BCL2A1 (FC=2,69), SERPINA1 (FC=2,12), DHRS7 (FC=2,13), PCDH9 (FC=- 4,58), TTC28 (FC=-2,25) and DUSP1 (FC=-2,91). The expression of genes that code for inflammation mediated by chemokine and cytokine signaling, Wnt, angiogenesis and integrin signaling and T cell activation pathways genes affect the sensitivity of leukemic blasts to cyclophosphamide. Transcriptome level changes are associated with chromosomal aberrations, especially located on chromosomes 8, 10, 14, 15, 16 and 22. Conclusion: Our work delineated genes with differentiated expression and recurrent copy number changes, and revealed novel amplified loci and frequent deletions in resistant to cyclophosphamide cells, which may guide future work aimed at identifying the relevant target genes. In particular, deletion seems to be a frequent mechanism of IFIT3 gene inactivation. ANXA1, SERPINA1, TCF7 and BCL2A1 may also be included among the candidate genes of resistance (Ontological analysis).
APA, Harvard, Vancouver, ISO, and other styles
50

Ho, Sherry Sze Yee, Samuel S. Chong, Evelyn SC Koay, et al. "Microsatellite Markers within —SEA Breakpoints for Prenatal Diagnosis of HbBarts Hydrops Fetalis." Clinical Chemistry 53, no. 2 (2007): 173–79. http://dx.doi.org/10.1373/clinchem.2006.075085.

Full text
Abstract:
Abstract Background: We sought to develop a rapid prenatal diagnostic test for simultaneous detection of HbBarts hydrops fetalis and exclusion of maternal contamination. Methods: We developed a multiplex quantitative fluorescent PCR (QF-PCR) test that detects the presence/ absence of 2 microsatellite markers (16PTEL05/16PTEL06) located within breakpoints of the Southeast Asia (—SEA) deletion. HbBarts hydrops fetalis (—SEA/—SEA) is diagnosed by absence of both markers, and maternal contamination of fetal DNA is excluded by absence of noninherited maternal alleles. Fetal and parental DNA samples from 50 families were analyzed in a blinded clinical validation study, and QF-PCR results were compared with their respective molecular genotypes. Results: The multiplex QF-PCR results included correct diagnoses of HbBarts hydrops fetalis in 11 of the fetuses tested, correct verification as unaffected in 20 fetuses, and correct identification as either carriers (αα/—SEA) or unaffected homozygotes in 18. Misidentification as unaffected occurred for 1 carrier. Sensitivity for diagnosis of HbBarts hydrops fetalis was 100% [lower 95% confidence interval, 76.2%], and specificity was 100% (lower 95% confidence interval, 92.6%). None of the samples tested showed any traces of noninherited maternal alleles; thus false-positives because of maternal contamination were eliminated. Conclusions: In this QF-PCR method, detection of maternally and paternally inherited fetal alleles allowed diagnosis of the double-deletion syndrome, and the ability to differentiate between these alleles allowed simultaneous exclusion of maternal contamination of the fetal genetic material. This novel strategy using cell-free fetal DNA in maternal plasma could form the basis for noninvasive testing for HbBarts hydrops fetalis.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography