Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Fingerprinting codes.

Zeitschriftenartikel zum Thema „Fingerprinting codes“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Fingerprinting codes" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Löfvenberg, J. „Binary Fingerprinting Codes“. Designs, Codes and Cryptography 36, Nr. 1 (Juli 2005): 69–81. http://dx.doi.org/10.1007/s10623-003-1163-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

ZHU, Yan. „Convolutional Fingerprinting Information Codes for Collusion Security“. Journal of Software 17, Nr. 7 (2006): 1617. http://dx.doi.org/10.1360/jos171617.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Nuida, Koji, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa und Hideki Imai. „An improvement of discrete Tardos fingerprinting codes“. Designs, Codes and Cryptography 52, Nr. 3 (02.04.2009): 339–62. http://dx.doi.org/10.1007/s10623-009-9285-z.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Fodor, Gabor, Peter Schelkens und Ann Dooms. „Fingerprinting Codes Under the Weak Marking Assumption“. IEEE Transactions on Information Forensics and Security 13, Nr. 6 (Juni 2018): 1495–508. http://dx.doi.org/10.1109/tifs.2017.2779112.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Murala, Kranthi Kumar, Dr M. Kamaraju und Dr K. Ramanjaneyulu. „Digital Fingerprinting In Encrypted Domain“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, Nr. 1 (15.12.2013): 3138–46. http://dx.doi.org/10.24297/ijct.v12i1.3360.

Der volle Inhalt der Quelle
Annotation:
Digital fingerprinting is a method for protecting multimedia content from illegal redistribution and identified the colluders.In copy protection, a content seller embeds a unique identity as a watermark into the content before it is sold to a buyer. When an illegal copy is found, the seller can identify illegal users by extracting the fingerprint. In this proposing an anonymous fingerprinting  based on a homomorphic additive encryption scheme, it present a construction of anti-collision codes created using BIBD(Balanced incomplete block design) codes technique and dither technique which makes use of LFSR (linear feedback shift register) are used for improving the high robustness and Security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

YAGI, Hideki, Toshiyasu MATSUSHIMA und Shigeichi HIRASAWA. „Fingerprinting Codes for Multimedia Data against Averaging Attack“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, Nr. 1 (2009): 207–16. http://dx.doi.org/10.1587/transfun.e92.a.207.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Wu, Ja-Ling. „Concatenated construction of traceability codes for multimedia fingerprinting“. Optical Engineering 46, Nr. 10 (01.10.2007): 107202. http://dx.doi.org/10.1117/1.2790911.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Skoric, Boris, Stefan Katzenbeisser, Hans Georg Schaathun und Mehmet Utku Celik. „Tardos Fingerprinting Codes in the Combined Digit Model“. IEEE Transactions on Information Forensics and Security 6, Nr. 3 (September 2011): 906–19. http://dx.doi.org/10.1109/tifs.2011.2116783.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gao, Fei, und Gennian Ge. „New Bounds on Separable Codes for Multimedia Fingerprinting“. IEEE Transactions on Information Theory 60, Nr. 9 (September 2014): 5257–62. http://dx.doi.org/10.1109/tit.2014.2331989.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Cotrina-Navau, Josep, und Marcel Fernandez. „A Family of Asymptotically Good Binary Fingerprinting Codes“. IEEE Transactions on Information Theory 56, Nr. 10 (Oktober 2010): 5335–43. http://dx.doi.org/10.1109/tit.2010.2059470.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Škorić, Boris, Stefan Katzenbeisser und Mehmet U. Celik. „Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes“. Designs, Codes and Cryptography 46, Nr. 2 (01.11.2007): 137–66. http://dx.doi.org/10.1007/s10623-007-9142-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

SCHAATHUN, H. G., und M. FERNANDEZ. „Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, Nr. 10 (01.10.2006): 2603–8. http://dx.doi.org/10.1093/ietfec/e89-a.10.2603.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Schäfer, Marcel, Waldemar Berchtold, Teetje Stark, Nils Reimers und Martin Steinebach. „A Novel Attack Model for Collusion Secure Fingerprinting Codes“. Electronic Imaging 2016, Nr. 8 (14.02.2016): 1–11. http://dx.doi.org/10.2352/issn.2470-1173.2016.8.mwsf-085.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Barg, A., G. R. Blakley und G. A. Kabatiansky. „Digital fingerprinting codes: problem statements, constructions, identification of traitors“. IEEE Transactions on Information Theory 49, Nr. 4 (April 2003): 852–65. http://dx.doi.org/10.1109/tit.2003.809570.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Bun, Mark, Jonathan Ullman und Salil Vadhan. „Fingerprinting Codes and the Price of Approximate Differential Privacy“. SIAM Journal on Computing 47, Nr. 5 (Januar 2018): 1888–938. http://dx.doi.org/10.1137/15m1033587.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Kiyavash, N., und P. Moulin. „Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise“. IEEE Transactions on Information Forensics and Security 4, Nr. 3 (September 2009): 293–301. http://dx.doi.org/10.1109/tifs.2009.2026462.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Meerwald, Peter, und Teddy Furon. „Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes“. IEEE Transactions on Information Forensics and Security 7, Nr. 4 (August 2012): 1168–80. http://dx.doi.org/10.1109/tifs.2012.2195655.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Schaathun, Hans Georg. „On error-correcting fingerprinting codes for use with watermarking“. Multimedia Systems 13, Nr. 5-6 (19.09.2007): 331–44. http://dx.doi.org/10.1007/s00530-007-0096-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Cheng, Minquan, Hung-Lin Fu, Jing Jiang, Yuan-Hsun Lo und Ying Miao. „Codes with the identifiable parent property for multimedia fingerprinting“. Designs, Codes and Cryptography 83, Nr. 1 (07.04.2016): 71–82. http://dx.doi.org/10.1007/s10623-016-0203-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Bassey, Joshua, Xiangfang Li und Lijun Qian. „Device Authentication Codes based on RF Fingerprinting using Deep Learning“. ICST Transactions on Security and Safety 8, Nr. 29 (30.11.2021): 172305. http://dx.doi.org/10.4108/eai.30-11-2021.172305.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Bui, Thach V., Binh Q. Nguyen, Thuc D. Nguyen, Noboru Sonehara und Isao Echizen. „Robust fingerprinting codes for database using non-adaptive group testing“. International Journal of Big Data Intelligence 2, Nr. 2 (2015): 81. http://dx.doi.org/10.1504/ijbdi.2015.069095.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Fan, Jinping, Yujie Gu, Masahiro Hachimori und Ying Miao. „Signature Codes for Weighted Binary Adder Channel and Multimedia Fingerprinting“. IEEE Transactions on Information Theory 67, Nr. 1 (Januar 2021): 200–216. http://dx.doi.org/10.1109/tit.2020.3033445.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Cheng, Minquan, und Ying Miao. „On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting“. IEEE Transactions on Information Theory 57, Nr. 7 (Juli 2011): 4843–51. http://dx.doi.org/10.1109/tit.2011.2146130.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Scott, A. J., J. Walgate und B. C. Sanders. „Optimal fingerprinting strategies with one-sided error“. Quantum Information and Computation 7, Nr. 3 (März 2007): 243–64. http://dx.doi.org/10.26421/qic7.3-5.

Der volle Inhalt der Quelle
Annotation:
Fingerprinting enables two parties to infer whether the messages they hold are the same or different when the cost of communication is high: each message is associated with a smaller fingerprint and comparisons between messages are made in terms of their fingerprints alone. In the simultaneous message passing model, it is known that fingerprints composed of quantum information can be made exponentially smaller than those composed of classical information. For small message lengths, we present constructions of optimal classical fingerprinting strategies with one-sided error, in both the one-way and simultaneous message passing models, and provide bounds on the worst-case error probability with the help of extremal set theory. The performance of these protocols is then compared to that for quantum fingerprinting strategies constructed from spherical codes, equiangular tight frames and mutually unbiased bases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Fernandez, Marcel, Josep Cotrina‐Navau und Miguel Soriano. „A class of non‐linear asymptotic fingerprinting codes with ε‐error“. Online Information Review 31, Nr. 1 (27.02.2007): 22–37. http://dx.doi.org/10.1108/14684520710731010.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Sebé, F., und J. Domingo-Ferrer. „Scattering codes to implement short 3-secure fingerprinting for copyright protection“. Electronics Letters 38, Nr. 17 (2002): 958. http://dx.doi.org/10.1049/el:20020648.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Jourdas, J. F., und P. Moulin. „High-Rate Random-Like Spherical Fingerprinting Codes With Linear Decoding Complexity“. IEEE Transactions on Information Forensics and Security 4, Nr. 4 (Dezember 2009): 768–80. http://dx.doi.org/10.1109/tifs.2009.2034188.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Moreira, José, Marcel Fernández und Grigory Kabatiansky. „Constructions of almost secure frameproof codes with applications to fingerprinting schemes“. Designs, Codes and Cryptography 86, Nr. 4 (20.04.2017): 785–802. http://dx.doi.org/10.1007/s10623-017-0359-z.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Jiang, Yuzhou, Emre Yilmaz und Erman Ayday. „Robust Fingerprint of Privacy-Preserving Location Trajectories“. Proceedings on Privacy Enhancing Technologies 2023, Nr. 4 (Oktober 2023): 5–20. http://dx.doi.org/10.56553/popets-2023-0095.

Der volle Inhalt der Quelle
Annotation:
Location-based services have brought significant convenience to people in their daily lives, and trajectory data are also in high demand. However, directly releasing those data raises privacy and liability (e.g., due to unauthorized distribution of such datasets) concerns since location data contain users' sensitive information, e.g., regular moving patterns and favorite spots. To address this, we propose a novel fingerprinting scheme that simultaneously identifies unauthorized redistribution of location trajectory datasets and provides differential privacy guarantees for shared data. Observing data utility degradation due to differentially private mechanisms, we introduce a utility-focused post-processing scheme to regain spatio-temporal correlations between points in a location trajectory. We further integrate this post-processing scheme into our fingerprinting scheme as a sampling method. The proposed fingerprinting scheme alleviates the degradation in the utility of the shared dataset due to the noise introduced by differentially private mechanisms (i.e., adds the fingerprint by preserving the publicly known statistics of the data). Meanwhile, it does not violate differential privacy throughout the entire process due to immunity to post-processing, a fundamental property of differential privacy. Our proposed fingerprinting scheme is robust against known and well-studied attacks against a fingerprinting scheme including random flipping attacks, correlation-based flipping attacks, and collusions among multiple parties, making it difficult for the attackers to infer the fingerprint codes and avoid accusation. Through experiments on two real-life location trajectory datasets and two synthetic ones, we show that our scheme achieves high fingerprint robustness and outperforms existing approaches. Furthermore, the proposed fingerprinting scheme increases data utility for differentially private datasets, which is beneficial to data analyzers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Rochanakul, Penying. „New Bounds on 2-Frameproof Codes of Length 4“. International Journal of Mathematics and Mathematical Sciences 2020 (23.01.2020): 1–5. http://dx.doi.org/10.1155/2020/4879108.

Der volle Inhalt der Quelle
Annotation:
Frameproof codes were first introduced by Boneh and Shaw in 1998 in the context of digital fingerprinting to protect copyrighted materials. These digital fingerprints are generally denoted as codewords in Qn, where Q is an alphabet of size q and n is a positive integer. A 2-frameproof code is a code C such that any 2 codewords in C cannot form a new codeword under a particular rule. Thus, no pair of users can frame a user who is not a member of the coalition. This paper concentrates on the upper bound for the size of a q-ary 2-frameproof code of length 4. Our new upper bound shows that C≤2q2−2q+1 when q is odd and q>10.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

KURIBAYASHI, Minoru, und Nobuo FUNABIKI. „Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, Nr. 1 (2018): 119–28. http://dx.doi.org/10.1587/transfun.e101.a.119.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Egorova, Elena, Marcel Fernandez, Grigory Kabatiansky und Moon Ho Lee. „Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing“. Designs, Codes and Cryptography 87, Nr. 2-3 (21.09.2018): 455–62. http://dx.doi.org/10.1007/s10623-018-0551-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

HOU, Shuhui, Tetsutaro UEHARA, Takashi SATOH, Yoshitaka MORIMURA und Michihiko MINOH. „Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs“. IEICE Transactions on Information and Systems E92-D, Nr. 5 (2009): 876–87. http://dx.doi.org/10.1587/transinf.e92.d.876.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Korzhik, Valery, Guilermo Morales-Luna, Alexander Kochkarev und Dmitriy Flaxman. „Concatenated digital watermarking system robust to different removal attacks“. Computer Science and Information Systems 11, Nr. 4 (2014): 1581–94. http://dx.doi.org/10.2298/csis131218072k.

Der volle Inhalt der Quelle
Annotation:
A new concatenated digital watermarking system that combines in a serial manner both ?holographic? transform domain and image-normalized method has been proposed and developed. Since the first procedure is resistant to watermarks removal attacks as cropping of windows, removal of rows and columns and JPEG compression, and the second procedure is especially robust against geometric transforms, we get a watermarking system embracing a resistance to the above mentioned attacks. The image corrupting after concatenated watermark usage and error correcting codes applying in order to improve a reliability of fingerprinting application of watermark have been also investigated.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Crawford, Brian H., AKM A. Hussain und Nathan M. Jideama. „Evidence of a Genomic Biomarker in Normal Human Epithelial Mammary Cell Line, MCF-10A, That Is Absent in the Human Breast Cancer Cell Line, MCF-7“. Journal of Biomedicine and Biotechnology 2006 (2006): 1–5. http://dx.doi.org/10.1155/jbb/2006/43181.

Der volle Inhalt der Quelle
Annotation:
This study investigated the use of DNA amplification fingerprinting (DAF) to identify biomarkers useful in the elucidating genetic factors that lead to carcinogenesis. The DNA amplification fingerprinting (DAF) technique was used to generate fingerprint profiles of a normal human mammary epithelial cell line (MCF-10A) and a human breast cancer cell line (MCF-7). When compared with one another, a polymorphic biomarker gene (262base pairs (bps)) was identified in MCF-10A but was not present in MCF-7. This gene was cloned from the genomic DNA of the MCF-10A cell line, and subjected to Genbank database analysis. The analysis of the nucleotide sequence polymorphic marker (Genbank account: AC079630) shows that this biomarker has100%homology with the nucleotide sequence of human chromosome12BAC RP11-476D10(bps19612-19353). The nucleotide sequence was used for possible protein translation product and the result obtained indicated that the gene codes for hypothetical protein XF2620. In order to evaluate the effects that the262bps biomarker would have on the morphology of MCF-7cells, it was transfected into MCF-7cells. There were observable changes in the morphology of the transfected cells. These changes included an increase in cell elongation and a decrease in cell aggregation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Huser, Vojtech, Nick D. Williams und Craig S. Mayer. „Linking Provider Specialty and Outpatient Diagnoses in Medicare Claims Data: Data Quality Implications“. Applied Clinical Informatics 12, Nr. 04 (August 2021): 729–36. http://dx.doi.org/10.1055/s-0041-1732404.

Der volle Inhalt der Quelle
Annotation:
Abstract Background With increasing use of real world data in observational health care research, data quality assessment of these data is equally gaining in importance. Electronic health record (EHR) or claims datasets can differ significantly in the spectrum of care covered by the data. Objective In our study, we link provider specialty with diagnoses (encoded in International Classification of Diseases) with a motivation to characterize data completeness. Methods We develop a set of measures that determine diagnostic span of a specialty (how many distinct diagnosis codes are generated by a specialty) and specialty span of a diagnosis (how many specialties diagnose a given condition). We also analyze ranked lists for both measures. As use case, we apply these measures to outpatient Medicare claims data from 2016 (3.5 billion diagnosis–specialty pairs). We analyze 82 distinct specialties present in Medicare claims (using Medicare list of specialties derived from level III Healthcare Provider Taxonomy Codes). Results A typical specialty diagnoses on average 4,046 distinct diagnosis codes. It can range from 33 codes for medical toxicology to 25,475 codes for internal medicine. Specialties with large visit volume tend to have large diagnostic span. Median specialty span of a diagnosis code is 8 specialties with a range from 1 to 82 specialties. In total, 13.5% of all observed diagnoses are generated exclusively by a single specialty. Quantitative cumulative rankings reveal that some diagnosis codes can be dominated by few specialties. Using such diagnoses in cohort or outcome definitions may thus be vulnerable to incomplete specialty coverage of a given dataset. Conclusion We propose specialty fingerprinting as a method to assess data completeness component of data quality. Datasets covering a full spectrum of care can be used to generate reference benchmark data that can quantify relative importance of a specialty in constructing diagnostic history elements of computable phenotype definitions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Egorova, E. E., M. Fernandez, G. A. Kabatiansky und Y. Miao. „Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise“. Problems of Information Transmission 56, Nr. 4 (Dezember 2020): 388–98. http://dx.doi.org/10.1134/s0032946020040080.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Zhang, Hui, Pingping Lin, Yanming Liu, Chaohua Huang, Guoqiang Huang, Hongtao Jiang, Liangnian Xu, Muqing Zhang, Zuhu Deng und Xinwang Zhao. „Development of SLAF-Sequence and Multiplex SNaPshot Panels for Population Genetic Diversity Analysis and Construction of DNA Fingerprints for Sugarcane“. Genes 13, Nr. 8 (19.08.2022): 1477. http://dx.doi.org/10.3390/genes13081477.

Der volle Inhalt der Quelle
Annotation:
A genetic diversity analysis and identification of plant germplasms and varieties are important and necessary for plant breeding. Deoxyribonucleotide (DNA) fingerprints based on genomic molecular markers play an important role in accurate germplasm identification. In this study, Specific-Locus Amplified Fragment Sequencing (SLAF-seq) was conducted for a sugarcane population with 103 cultivated and wild accessions. In total, 105,325 genomic single nucleotide polymorphisms (SNPs) were called successfully to analyze population components and genetic diversity. The genetic diversity of the population was complex and clustered into two major subpopulations. A principal component analysis (PCA) showed that these accessions could not be completely classified based on geographical origin. After filtration, screening, and comparison, 192 uniformly-distributed SNP loci were selected for the 32 chromosomes of sugarcane. An SNP complex genotyping detection system was established using the SNaPshot typing method and used for the precise genotyping and identification of 180 sugarcane germplasm samples. According to the stability and polymorphism of the SNPs, 32 high-quality SNP markers were obtained and successfully used to construct the first SNP fingerprinting and quick response codes (QR codes) for sugarcane. The results provide new insights for genotyping, classifying, and identifying germplasm and resources for sugarcane breeding
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Ji, Tianxi, Erman Ayday, Emre Yilmaz und Pan Li. „Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data“. Proceedings on Privacy Enhancing Technologies 2024, Nr. 3 (Juli 2024): 659–73. http://dx.doi.org/10.56553/popets-2024-0098.

Der volle Inhalt der Quelle
Annotation:
Sharing genomic databases is critical to the collaborative research in computational biology. A shared database is more informative than specific genome-wide association studies (GWAS) statistics as it enables do-it-yourself calculations. Genomic databases involve intellectual efforts from the curator and sensitive information of participants, thus in the course of data sharing, the curator (database owner) should be able to prevent unauthorized redistributions and protect genomic data privacy. As it becomes increasingly common for a single database be shared with multiple recipients, the shared genomic database should also be robust against collusion attack, where multiple malicious recipients combine their individual copies to forge a pirated one with the hope that none of them can be traced back. The strong correlation among genomic entries also make the shared database vulnerable to attacks that leverage the public correlation models. In this paper, we assess the robustness of shared genomic database under both collusion and correlation threats. To this end, we first develop a novel genomic database fingerprinting scheme, called Gen-Scope. It achieves both copyright protection (by enabling traceability) and privacy preservation (via local differential privacy) for the shared genomic databases. To defend against collusion attacks, we augment Gen-Scope with a powerful traitor tracing technique, i.e., the Tardos codes. Via experiments using a real-world genomic database, we show that Gen-Scope achieves strong fingerprint robustness, e.g., the fingerprint cannot be compromised even if the attacker changes 45% of the entries in its received fingerprinted copy and colluders will be detected with high probability. Additionally, Gen-Scope outperforms the considered baseline methods. Under the same privacy and copyright guarantees, the accuracy of the fingerprinted genomic database obtained by Gen-Scope is around 10% higher than that achieved by the baseline, and in terms of preservations of GWAS statistics, the consistency of variant-phenotype associations can be about 20% higher. Notably, we also empirically show that Gen-Scope can identify at least one of the colluders even if malicious receipts collude after independent correlation attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Cai, Yong, Xiwen Li, Mei Li, Xiaojia Chen, Hao Hu, Jingyun Ni und Yitao Wang. „Traceability and Quality Control in Traditional Chinese Medicine: From Chemical Fingerprint to Two-Dimensional Barcode“. Evidence-Based Complementary and Alternative Medicine 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/251304.

Der volle Inhalt der Quelle
Annotation:
Chemical fingerprinting is currently a widely used tool that enables rapid and accurate quality evaluation of Traditional Chinese Medicine (TCM). However, chemical fingerprints are not amenable to information storage, recognition, and retrieval, which limit their use in Chinese medicine traceability. In this study, samples of three kinds of Chinese medicines were randomly selected and chemical fingerprints were then constructed by using high performance liquid chromatography. Based on chemical data, the process of converting the TCM chemical fingerprint into two-dimensional code is presented; preprocess and filtering algorithm are also proposed aiming at standardizing the large amount of original raw data. In order to know which type of two-dimensional code (2D) is suitable for storing data of chemical fingerprints, current popular types of 2D codes are analyzed and compared. Results show that QR Code is suitable for recording the TCM chemical fingerprint. The fingerprint information of TCM can be converted into data format that can be stored as 2D code for traceability and quality control.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Grass, Gregor, Angelika Schierhorn, Eduard Sorkau, Helmut Müller, Peter Rücknagel, Dietrich H. Nies und Beate Fricke. „Camelysin Is a Novel Surface Metalloproteinase from Bacillus cereus“. Infection and Immunity 72, Nr. 1 (Januar 2004): 219–28. http://dx.doi.org/10.1128/iai.72.1.219-228.2004.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT Bacillus cereus frequently causes food poisoning or nosocomial diseases. Vegetative cells express the novel surface metalloproteinase camelysin (casein-cleaving metalloproteinase) during exponential growth on complex, peptide-rich media. Camelysin is strongly bound to the cell surface and can be solubilized only by detergents or butanol. Camelysin spontaneously migrates from the surface of intact bacterial cells to preformed liposomes. The complete sequence of the camelysin-encoding gene, calY, was determined by reverse PCR on the basis of the N-terminal sequence and some internal tryptic cleavage peptides. The calY gene codes for a polypeptide of 21.569 kDa with a putative signal peptide of 27 amino acids (2.513 kDa) preceding the mature protein (19.056 kDa). Although the predicted amino acid sequence of CalY does not exhibit a typical metalloprotease consensus sequence, high-pressure liquid chromatography-purified camelysin contains one zinc ion per protein molecule. Matrix-assisted laser desorption ionization-time-of-flight mass spectrometry and tryptic peptide mass fingerprinting confirmed the identity of this zinc-binding protein as CalY. Disruption of the calY gene results in a strong decrease in the cell-bound proteolytic activity on various substrates.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Yu, Yue, Yi Zhang, Liang Chen und Ruizhi Chen. „Intelligent Fusion Structure for Wi-Fi/BLE/QR/MEMS Sensor-Based Indoor Localization“. Remote Sensing 15, Nr. 5 (22.02.2023): 1202. http://dx.doi.org/10.3390/rs15051202.

Der volle Inhalt der Quelle
Annotation:
Due to the complexity of urban environments, localizing pedestrians indoors using mobile terminals is an urgent task in many emerging areas. Multi-source fusion-based localization is considered to be an effective way to provide location-based services in large-scale indoor areas. This paper presents an intelligent 3D indoor localization framework that uses the integration of Wi-Fi, Bluetooth Low Energy (BLE), quick response (QR) code, and micro-electro-mechanical system sensors (the 3D-WBQM framework). An enhanced inertial odometry was developed for accurate pedestrian localization and trajectory optimization in indoor spaces containing magnetic interference and external acceleration, and Wi-Fi fine time Measurement stations, BLE nodes, and QR codes were applied for landmark detection to provide an absolute reference for trajectory optimization and crowdsourced navigation database construction. In addition, the robust unscented Kalman filter (RUKF) was applied as a generic integrated model to combine the estimated location results from inertial odometry, BLE, QR, Wi-Fi FTM, and the crowdsourced Wi-Fi fingerprinting for large-scale indoor positioning. The experimental results indicated that the proposed 3D-WBQM framework was verified to realize autonomous and accurate positioning performance in large-scale indoor areas using different location sources, and meter-level positioning accuracy can be acquired in Wi-Fi FTM supported areas.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Smirnova, Irina G., und Ekaterina V. Alekseeva. „Ensuring the Rights and Legal Interests of the Victim when Checking the Crime Report: A Comparative Legal Analysis of the Criminal Procedure Codes of the Russian Federation and the People’s Republic of China“. Ugolovnaya yustitsiya, Nr. 17 (2021): 128–33. http://dx.doi.org/10.17223/23088451/17/25.

Der volle Inhalt der Quelle
Annotation:
The article presents a comparative legal analysis of the norms of the Criminal Procedure Code of the Russian Federation and the Criminal Procedure Code of the People’s Republic of China, which regulate the rights and powers of the victim within the framework of the stage of initiating a criminal case. The authors highlight several significant differences in the legal regulation of this issue. The differences are: the obligation to comply with the rules of jurisdiction in China at the stage of filing a statement of a crime, which is not required under the Code of Criminal Procedure of the Russian Federation; compulsory fingerprinting of a person when filing a crime report with a public security agency implemented in China; the existence of several types of preliminary checks (the list of activities carried out as part of these checks in China is open); intensive development of IT technologies and their introduction into the life of society, including for the fight against crime and ensuring law and order in society, in China.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Mgode, G. F., R. S. Machang'u, M. G. Goris, M. Engelbert, S. Sondij und R. A. Hartskeerl. „New Leptospira serovar Sokoine of serogroup Icterohaemorrhagiae from cattle in Tanzania“. International Journal of Systematic and Evolutionary Microbiology 56, Nr. 3 (01.03.2006): 593–97. http://dx.doi.org/10.1099/ijs.0.63278-0.

Der volle Inhalt der Quelle
Annotation:
The prevalence of leptospirosis is generally high in domestic animals and rodents in Tanzania. Identification of Leptospira isolates from cattle was carried out to establish prevalent Leptospira serovars. Serological typing was done based on monoclonal antibodies and the standard cross-agglutination absorption test. Molecular typing involved pathogenic- and saprophytic-specific PCRs and a PCR specifically amplifying DNA from the species Leptospira kirschneri. DNA fingerprinting with primers derived from sequences of insertion elements IS1500 and IS1533 was carried out. Both serological and molecular characterization indicated that one of the Leptospira isolates, coded RM1, represents a new serovar of the species L. kirschneri of serogroup Icterohaemorrhagiae. The serovar name Sokoine is proposed for this new Leptospira isolate.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Koolstra, Kirsten, Peter Börnert, Boudewijn P. F. Lelieveldt, Andrew Webb und Oleh Dzyubachyk. „Stochastic neighbor embedding as a tool for visualizing the encoding capability of magnetic resonance fingerprinting dictionaries“. Magnetic Resonance Materials in Physics, Biology and Medicine 35, Nr. 2 (23.10.2021): 223–34. http://dx.doi.org/10.1007/s10334-021-00963-8.

Der volle Inhalt der Quelle
Annotation:
Abstract Objective To visualize the encoding capability of magnetic resonance fingerprinting (MRF) dictionaries. Materials and methods High-dimensional MRF dictionaries were simulated and embedded into a lower-dimensional space using t-distributed stochastic neighbor embedding (t-SNE). The embeddings were visualized via colors as a surrogate for location in low-dimensional space. First, we illustrate this technique on three different MRF sequences. We then compare the resulting embeddings and the color-coded dictionary maps to these obtained with a singular value decomposition (SVD) dimensionality reduction technique. We validate the t-SNE approach with measures based on existing quantitative measures of encoding capability using the Euclidean distance. Finally, we use t-SNE to visualize MRF sequences resulting from an MRF sequence optimization algorithm. Results t-SNE was able to show clear differences between the color-coded dictionary maps of three MRF sequences. SVD showed smaller differences between different sequences. These findings were confirmed by quantitative measures of encoding. t-SNE was also able to visualize differences in encoding capability between subsequent iterations of an MRF sequence optimization algorithm. Discussion This visualization approach enables comparison of the encoding capability of different MRF sequences. This technique can be used as a confirmation tool in MRF sequence optimization.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Sić, Siniša, Norbert M. Maier und Andreas M. Rizzi. „Quantitative fingerprinting of O-linked glycans released from proteins using isotopic coded labeling with deuterated 1-phenyl-3-methyl-5-pyrazolone“. Journal of Chromatography A 1408 (August 2015): 93–100. http://dx.doi.org/10.1016/j.chroma.2015.06.065.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Ge, Yuan, Joshua P. Schimel und Patricia A. Holden. „Identification of Soil Bacteria Susceptible to TiO2and ZnO Nanoparticles“. Applied and Environmental Microbiology 78, Nr. 18 (13.07.2012): 6749–58. http://dx.doi.org/10.1128/aem.00941-12.

Der volle Inhalt der Quelle
Annotation:
ABSTRACTBecause soil is expected to be a major sink for engineered nanoparticles (ENPs) released to the environment, the effects of ENPs on soil processes and the organisms that carry them out should be understood. DNA-based fingerprinting analyses have shown that ENPs alter soil bacterial communities, but specific taxon changes remain unknown. We used bar-coded pyrosequencing to explore the responses of diverse bacterial taxa to two widely used ENPs, nano-TiO2and nano-ZnO, at various doses (0, 0.5, 1.0, and 2.0 mg g−1soil for TiO2; 0.05, 0.1, and 0.5 mg g−1soil for ZnO) in incubated soil microcosms. These ENPs significantly altered the bacterial communities in a dose-dependent manner, with some taxa increasing as a proportion of the community, but more taxa decreasing, indicating that effects mostly reduced diversity. Some of the declining taxa are known to be associated with nitrogen fixation (Rhizobiales,Bradyrhizobiaceae, andBradyrhizobium) and methane oxidation (Methylobacteriaceae), while some positively impacted taxa are known to be associated with the decomposition of recalcitrant organic pollutants (Sphingomonadaceae) and biopolymers including protein (StreptomycetaceaeandStreptomyces), indicating potential consequences to ecosystem-scale processes. The latter was suggested by a positive correlation between protease activity and the relative abundance ofStreptomycetaceae(R= 0.49,P= 0.000) andStreptomyces(R= 0.47,P= 0.000). Our results demonstrate that some metal oxide nanoparticles could affect soil bacterial communities and associated processes through effects on susceptible, narrow-function bacterial taxa.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Michael, Claudia, und Andreas M. Rizzi. „Quantitative isomer-specific N-glycan fingerprinting using isotope coded labeling and high performance liquid chromatography–electrospray ionization-mass spectrometry with graphitic carbon stationary phase“. Journal of Chromatography A 1383 (Februar 2015): 88–95. http://dx.doi.org/10.1016/j.chroma.2015.01.028.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Dekio, Itaru, Yuki Sugiura, Susumu Hamada-Tsutsumi, Yoshiyuki Murakami, Hiroto Tamura und Makoto Suematsu. „What Do We See in Spectra?: Assignment of High-Intensity Peaks of Cutibacterium and Staphylococcus Spectra of MALDI-TOF Mass Spectrometry by Interspecies Comparative Proteogenomics“. Microorganisms 9, Nr. 6 (08.06.2021): 1243. http://dx.doi.org/10.3390/microorganisms9061243.

Der volle Inhalt der Quelle
Annotation:
Matrix-assisted laser-desorption/ionization time-of-flight (MALDI–TOF) mass spectrometry is a widely used and reliable technology to identify microbial species and subspecies. The current methodology is based on spectral fingerprinting, analyzing protein peaks, most of which are yet to be characterized. In order to deepen the understanding of these peaks and to develop a more reasonable identification workflow, we applied proteogenomic approaches to assign the high-intensity peaks of MALDI–TOF spectra of two bacterial genera. First, the 3–22 kD proteomes of 5 Cutibacterium strains were profiled by UPLC–MS/MS, and the amino acid sequences were refined by referring to their genome in the public database. Then, the sequences were converted to m/z (x-axis) values based on their molecular masses. When the interspecies comparison of calculated m/z values was well-fitted to the observed peaks, the peak assignments for the five Cutibacterium species were confirmed. Second, the peak assignments for six Staphylococcus species were performed by using the above result for Cutibacterium and referring to ribosomal subunit proteins coded on the S10-spc-alpha operon (the S10-GERMS method), a previous proteomics report by Becher et al., and comprehensive genome analysis. We successfully assigned 13 out of 15 peaks for the Cutibacterium species and 11 out of 13 peaks for the Staphylococcus species. DNA-binding protein HU, the CsbD-like protein, and 50S ribosomal protein L7/L12 were observed in common. The commonality suggests they consist of high-intensity peaks in the MALDI spectra of other bacterial species. Our workflow may lead to the development of a more accurate species identification database of MALDI–TOF mass spectrometry based on genome data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Khan, MZI, und PK De. „DETERMINATION OF APHRODISIN GENE OF SYRIAN HAMSTER BY MOLECULAR TECHNIQUE“. Bangladesh Journal of Veterinary Medicine 8, Nr. 2 (12.07.2012): 175–84. http://dx.doi.org/10.3329/bjvm.v8i2.11202.

Der volle Inhalt der Quelle
Annotation:
Aphrodisin is a secretory protein expressed in the reproductive organs and parotid salivary gland of the female hamster and acts as an aphrodisiac pheromone. RT-PCR and cloning was applied for the determination of aphrodisin gene from the vaginal tissues of the hamster. In the present study, total RNA was extracted from hamster uterus by Trizol method and apparently undegraded 28S, 18S and 5S species of ribosomal RNA was clearly visible. After performing RT-PCR a distinct band of ~475 bp was obtained and showed in electrophoresis gel analysis which was the partial cDNA of aphrodisin protein. After purification of PCR product and its sequencing using OE-F and OE-R primers confirmed the PCR product was the full-length cDNA of mature aphrodisin of 151 amino acids. The pET 21 plasmid purified from DH5-? cell and ligated with Aph-insert of ~475 bp. Subsequent sequencing confirmed error free ligation and presence of aphrodisin insert. No sequence discrepancy was noted with the published cDNA sequence of mature aphrodisin except for a single base mismatch (GGg for GGA), which did not result in any change in the coded amino acid (glycine). SDS-PAGE analysis showed a major protein greater than 17-kDa was observed in the protein profiles of post-lysis pellet of IPTG induced BL-21 cells but not in their lysates. This 17 kDa protein band should represent recombinant aphrodisin protein which is present in the post-lysis pellet since it is not solubilized by simple sonication. Peptide mass fingerprinting and matrix-assisted laser-desorption ionization-time-of-flight (MALDI-TOF) mass spectra analysis of the trypsin digested ~17 kDa recombinant protein, and mass spectrophotometrical (MS) analysis indicated that the overexpressed ~17 kDa protein was closely similar to aphrodisin of Syrian hamster.DOI = http://dx.doi.org/10.3329/bjvm.v8i2.11202 Bangl. J. Vet. Med. (2010). 8 (2) : 175-184
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie