Academic literature on the topic 'In-app user activity detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'In-app user activity detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "In-app user activity detection"

1

Pathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (February 21, 2022): 67. http://dx.doi.org/10.3390/fi14020067.

Full text
Abstract:
In this study, a simple yet effective framework is proposed to characterize fine-grained in-app user activities performed on mobile applications using a convolutional neural network (CNN). The proposed framework uses a time window-based approach to split the activity’s encrypted traffic flow into segments, so that in-app activities can be identified just by observing only a part of the activity-related encrypted traffic. In this study, matrices were constructed for each encrypted traffic flow segment. These matrices acted as input into the CNN model, allowing it to learn to differentiate previously trained (known) and previously untrained (unknown) in-app activities as well as the known in-app activity type. The proposed method extracts and selects salient features for encrypted traffic classification. This is the first-known approach proposing to filter unknown traffic with an average accuracy of 88%. Once the unknown traffic is filtered, the classification accuracy of our model would be 92%.
APA, Harvard, Vancouver, ISO, and other styles
2

Pathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet M. Kondoz. "Deep Learning for Encrypted Traffic Classification and Unknown Data Detection." Sensors 22, no. 19 (October 9, 2022): 7643. http://dx.doi.org/10.3390/s22197643.

Full text
Abstract:
Despite the widespread use of encryption techniques to provide confidentiality over Internet communications, mobile device users are still susceptible to privacy and security risks. In this paper, a novel Deep Neural Network (DNN) based on a user activity detection framework is proposed to identify fine-grained user activities performed on mobile applications (known as in-app activities) from a sniffed encrypted Internet traffic stream. One of the challenges is that there are countless applications, and it is practically impossible to collect and train a DNN model using all possible data from them. Therefore, in this work, we exploit the probability distribution of a DNN output layer to filter the data from applications that are not considered during the model training (i.e., unknown data). The proposed framework uses a time window-based approach to divide the traffic flow of activity into segments so that in-app activities can be identified just by observing only a fraction of the activity-related traffic. Our tests have shown that the DNN-based framework has demonstrated an accuracy of 90% or above in identifying previously trained in-app activities and an average accuracy of 79% in identifying previously untrained in-app activity traffic as unknown data when this framework is employed.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Hao, and Georgios B. Giannakis. "Exploiting Sparse User Activity in Multiuser Detection." IEEE Transactions on Communications 59, no. 2 (February 2011): 454–65. http://dx.doi.org/10.1109/tcomm.2011.121410.090570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mitra, U., and H. V. Poor. "Activity detection in a multi-user environment." Wireless Personal Communications 3, no. 1-2 (1996): 149–74. http://dx.doi.org/10.1007/bf00333928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Youngho, Tae Oh, and Jeongnyeo Kim. "Analyzing User Awareness of Privacy Data Leak in Mobile Applications." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/369489.

Full text
Abstract:
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT) era, a cloud computing provides an effective platform without human intervention to build a resource-oriented security solution. However, existing malware detection methods are constrained by a vague situation of information leaks. The main goal of this paper is to measure a degree of hiding intention for the mobile application (app) to keep its leaking activity invisible to the user. For real-world application test, we target Android applications, which unleash user privacy data. With the TaintDroid-ported emulator, we make experiments about the timing distance between user events and privacy leaks. Our experiments with Android apps downloaded from the Google Play show that most of leak cases are driven by user explicit events or implicit user involvement which make the user aware of the leakage. Those findings can assist a malware detection system in reducing the rate of false positive by considering malicious intentions. From the experiment, we understand better about app’s internal operations as well. As a case study, we also presents a cloud-based dynamic analysis framework to perform a traffic monitor.
APA, Harvard, Vancouver, ISO, and other styles
6

Parwez, Md Salik, Danda B. Rawat, and Moses Garuba. "Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network." IEEE Transactions on Industrial Informatics 13, no. 4 (August 2017): 2058–65. http://dx.doi.org/10.1109/tii.2017.2650206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bashir, Sulaimon Adebayo, Andrei Petrovski, and Daniel Doolan. "A framework for unsupervised change detection in activity recognition." International Journal of Pervasive Computing and Communications 13, no. 2 (June 5, 2017): 157–75. http://dx.doi.org/10.1108/ijpcc-03-2017-0027.

Full text
Abstract:
Purpose This purpose of this paper is to develop a change detection technique for activity recognition model. The approach aims to detect changes in the initial accuracy of the model after training and when the model is deployed for recognizing new unseen activities without access to the ground truth. The changes between the two sessions may occur because of differences in sensor placement, orientation and user characteristics such as age and gender. However, many of the existing approaches for model adaptation in activity recognition are blind methods because they continuously adapt the recognition model without explicit detection of changes in the model performance. Design/methodology/approach The approach determines the variation between reference activity data belonging to different classes and newly classified unseen data. If there is coherency between the data, it means the model is correctly classifying the instances; otherwise, a significant variation indicates wrong instances are being classified to different classes. Thus, the approach is formulated as a two-level architectural framework comprising of the off-line phase and the online phase. The off-line phase extracts of Shewart Chart change parameters from the training data set. The online phase performs classification of new samples and the detection of the changes in each class of activity present in the data set by using the change parameters computed earlier. Findings The approach is evaluated using a real activity-recognition data set. The results show that there are consistent detections that correlate with the error rate of the model. Originality/value The developed approach does not use ground truth to detect classifier performance degradation. Rather, it uses a data discrimination method and a base classifier to detect the changes by using the parameters computed from the reference data of each class to discriminate outliers in the new data being classified to the same class. The approach is the first, to the best of the authors’ knowledge, that addresses the problem of detecting within-user and cross-user variations that lead to concept drift in activity recognition. The approach is also the first to use statistical process control method for change detection in activity recognition, with a robust integrated framework that seamlessly detects variations in the underlying model performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Jemin, and Hyungshin Kim. "QDroid: Mobile Application Quality Analyzer for App Market Curators." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/1740129.

Full text
Abstract:
Low quality mobile applications have damaged the user experience. However, in light of the number of applications, quality analysis is a daunting task. For that reason, QDroid is proposed, an automated quality analyzer that detects the presence of crashes, excessive resource usage, and compatibility problems, without source codes and human involvement. QDroid was applied to 67 applications for evaluation and discovered 78% more crashes and attained 23% higher Activity coverage than Monkey testing. For detecting excessive resource usage and compatibility problems, QDroid reduced the number of applications that required manual review by up to 96% and 69%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
APA, Harvard, Vancouver, ISO, and other styles
10

Karthikeyan, Dakshinamoorthy, Arun Sivakumar, and Chamundeswari Arumugam. "Android X-Ray - A system for Malware Detection in Android apps using Dynamic Analysis." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (November 7, 2022): 264–71. http://dx.doi.org/10.37394/23209.2022.19.27.

Full text
Abstract:
In recent years, mobile malware takes anywhere between several hours to several days to screen an app for malicious activity. More than 6000 apps are added to the Google Play Store everyday on average. Security analysts face an uphill battle against malware developers as the complexity of malware and code obfuscation techniques are constantly increasing. Currently, most research focuses on the development and application of machine learning techniques for malware detection. However, their success has been limited due to a lack of depth in the data sets available for training models. This paper uses a new method of Dynamic Analysis for Android apps to extract large amounts of information on the behavior of any app which can then be used for training models or to enable security analysts to take an informed decision quickly.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "In-app user activity detection"

1

Myles, Kimberly. "Activity-Based Target Acquisition Methods for Use in Urban Environments." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/28422.

Full text
Abstract:
Many military conflicts are fought in urban environments that subject the U.S. soldier to a number of challenges not otherwise found in traditional battle. In the urban environment, the soldier is subject to threatening attacks not only from the organized army but also from civilians who harbor hostility. U.S. enemies use the civilian crowd as an unconventional tactic to blend in and look like civilians, and in response to this growing trend, soldiers must detect and identify civilians as a threat or non-threat. To identify a civilian as a threat, soldiers must familiarize themselves with behavioral cues that implicate threatening individuals. This study elicited expert strategies regarding how to use nonverbal cues to detect a threat and evaluated the best medium for distinguishing a threat from a non-threat to develop a training guide of heuristics for training novices (i.e., soldiers) in the threat detection domain. Forty experts from the threat detection domain were interviewed to obtain strategies regarding how to use nonverbal cues to detect a threat (Phase 1). The use of nonverbal cues in context and learning from intuitive individuals in the domain stood out as strategies that would promote the efficient use of nonverbal cues in detecting a threat. A new group of 14 experts judged scenarios presented in two media (visual, written) (Phase 2). Expert detection accuracy rates of 61% for the visual medium and 56% for the written medium were not significantly different, F (1, 13) = .44, p = .52. For Phase 3 of the study, a training development guide of heuristics was developed and eight different experts in the threat detection domain subjectively rated the heuristics for their importance and relevance in training novices. Nine heuristics were included in the training guide, and overall, experts gave all heuristics consistently high ratings for importance and relevance. The results of this study can be used to improve accuracy rates in the threat detection domain and other populations: 1) the soldier, 2) the average U.S. citizen, and 3) employees of the Transportation Security Administration.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
2

Henriksson, Mikael. "Implementation of a Hardware Coordinate Wise Descend Algorithm with Maximum Likelihood Estimator for Use in mMTC Activity Detection." Thesis, Linköpings universitet, Datorteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-171071.

Full text
Abstract:
In this work, a coordinate wise descent algorithm is implemented which serves the purpose of estimating active users in a base station/client wireless communication setup. The implemented algorithm utilizes the sporadic nature of users, which is believed to be the norm with 5G Massive MIMO and Internet of Things, meaning that only a subset of all users are active simultaneously at any given time. This work attempts to estimate the viability of a direct algorithm implementation to test if the performance requirements can be satisfied or if a more sophisticated implementation, such as a parallelized version, needs to be created.The result is an isomorphic ASIC implementation made in a 28 nm FD-SOI process, with proper internal word lengths extracted through simulation. Some techniques to lessen the burden on hardware without losing performance is presented which helps reduce area and increase speed of the implementation. Finally, a parallelized version of the algorithm is proposed, if one should desire to explore an implementation with higher system throughput, at almost no furtherexpense of user estimation error.
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Nai-Hsuan, and 黃乃軒. "User Activity Detection and Pilot Sequence Design for Uplink Grant-free NOMA in 5G Networks." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/u9j7tk.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weaver, Christopher Jordan. "Development of PYRAMDS (Python for Radioisotope Analysis and Multi-Detector Suppression) code used in fission product detection limit improvements with the DGF Pixie-4 digital spectrometer." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-05-2711.

Full text
Abstract:
The work presented here develops a gamma-ray spectral construction and analysis software tool that was used to analyze multi-detector data collected using a digital spectrometer with list mode capabilities. The tool was used to parse the output from three detectors and generate new spectra that the user chooses from post-processing suppression routines, such as simulated anticoincidence and coincidence spectra. Part of this research was also to characterize the improvements in the detection limits and the various detector efficiencies from this method as opposed to creating these spectra using traditional electronic gating systems. A focus is placed on the detection capability improvements for nuclear forensics purposes, particularly the identification and quantification of fission product samples, and structuring the code framework for handling these types of time-dependent samples while increasing the versatility of the detector system. Improvements to the minimum detectable activity for a series of fission products was accomplished through post-processing suppression methods and multi-dimensional spectral data structures are now achievable.
text
APA, Harvard, Vancouver, ISO, and other styles
5

Jallad, Mahmoud 1979. "Performance of several diagnostic systems on detection of occlusal primary caries in permanent teeth." Thesis, 2014. http://hdl.handle.net/1805/6498.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI) Indiana University School of Dentistry Master Degree Thesis.
Detection of caries at an early stage is unequivocally essential for early preventive intervention. Longitudinal assessment of caries lesions, especially under the opaque preventive sealant, would be of utmost importance to the dental community. OBJECTIVES: The aim of this two-part in-vitro study is to evaluate the performance of multiple detection methods: The International Caries Detection and Assessment System (ICDAS); two quantitative light-induced fluorescence systems QLF; Inspektor™ Pro and QLF-D Biluminator™2 (Inspektor Research Systems B.V.; Amsterdam, The Netherlands); and photothermal radiometry and modulated luminescence (PTR/LUM) of The Canary System® (Quantum Dental Technologies; Toronto, Canada). All these are to be evaluated on their detection of caries on posterior human permanent teeth for 1) of primary occlusal lesions, and 2) under the sealant of primary occlusal lesions. METHODS: One hundred and twenty (N = 120) human posterior permanent teeth, selected in compliance with IU-IRB “Institutional Review Board” standards, with non-cavitated occlusal lesions ICDAS (scores 0 to 4) were divided into two equal groups. The second group (N = 60) received an opaque resin dental sealant (Delton® Light-Curing Pit and Fissure Sealant Opaque, Dentsply, York, PA). All lesions were assessed with each detection method twice in a random order except for ICDAS, which was not used following the placement of the sealant. Histological validation was used to compare methods in regard to sensitivity, specificity, % correct, and the area under receiver- operating characteristic curve (AUC). Intra-examiner repeatability and inter-examiner agreement were measured using intraclass correlation coefficient (ICC). RESULTS: 1) Of primary occlusal lesions, sensitivity, specificity, and AUC values were respectively: 0.82, 0.86 and 0.87 (ICDAS); 0.89, 0.60 and 0.90 (Inspektor Pro); 0.96, 0.57 and 0.94 (QLF-D Biluminator 2); and 0.85, 0.43 and 0.79 (The Canary System). Intra-examiner repeatability and inter-examiner agreement were respectively: 0.81 to 0.87: 0.72 (ICDAS); 0.49 to 0.97: 0.73 (Inspektor Pro); 0.96 to 0.99: 0.96 (QLF-D Biluminator 2); and 0.33 to 0.63: 0.48 (The Canary System). 2) Of primary occlusal lesions under the opaque dental sealants, sensitivity, specificity, and AUC values were respectively: 0.99, 0.03 and 0.67 (Inspektor Pro); 1.00, 0.00 and 0.70 (QLF-D Biluminator 2); and 0.54, 0.50 and 0.58 (The Canary System). Intra-examiner repeatability and inter-examiner agreement were respectively: 0.24 to 0.37: 0.29 (Inspektor Pro); 0.80 to 0.84: 0.74 (QLF-D Biluminator 2); and 0.22 to 0.47: 0.01 (The Canary System). CONCLUSION: Limited to these in-vitro conditions, 1) ICDAS remains the method of choice for detection of early caries lesion due to its adequately high accuracy and repeatability. QLF systems demonstrate potential in longitudinal monitoring due to an almost perfect repeatability of QLF-D Biluminator 2. The Canary System performance and repeatability were not acceptable as a valid method of early caries detection. 2) None of the methods demonstrated acceptable ability in detecting of occlusal caries under the opaque sealant. However, QLF-D Biluminator 2, with limitation to these in-vitro conditions and Delton opaque sealant, demonstrated a fair accuracy AUC (0.70) in detecting of caries under sealants at an experimental threshold of 12.5% ΔF.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "In-app user activity detection"

1

Meijer, Ewout H., and Bruno Verschuere. Detection Deception Using Psychophysiological and Neural Measures. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190612016.003.0010.

Full text
Abstract:
The use of physiological signals to detect deception can be traced back almost a century. Historically, the polygraph has been used—and debated. This chapter discusses the merits of polygraph testing, and to what extent the introduction of measures of brain activity—most notably functional magnetic imaging (fMRI)—have solved the problems associated with polygraph testing. It discusses the different question formats used with polygraph and brain activity measures, and argues that these formats are the main factor contributing to the tests’ validity. Moreover, the authors argue that erroneous test outcomes are caused by errors in logical inferences, and that these errors will not be remedied by new technology. The biggest challenge for the field is to find a question format that isolates deception, and to corroborate laboratory data with methodologically sound field studies.
APA, Harvard, Vancouver, ISO, and other styles
2

Shaikh, Mohd Faraz. Machine Learning in Detecting Auditory Sequences in Magnetoencephalography Data : Research Project in Computational Modelling and Simulation. Technische Universität Dresden, 2021. http://dx.doi.org/10.25368/2022.411.

Full text
Abstract:
Does your brain replay your recent life experiences while you are resting? An open question in neuroscience is which events does our brain replay and is there any correlation between the replay and duration of the event? In this study I tried to investigate this question by using Magnetoencephalography data from an active listening experiment. Magnetoencephalography (MEG) is a non-invasive neuroimaging technique used to study the brain activity and understand brain dynamics in perception and cognitive tasks particularly in the fields of speech and hearing. It records the magnetic field generated in our brains to detect the brain activity. I build a machine learning pipeline which uses part of the experiment data to learn the sound patterns and then predicts the presence of sound in the later part of the recordings in which the participants were made to sit idle and no sound was fed. The aim of the study of test replay of learned sound sequences in the post listening period. I have used classification scheme to identify patterns if MEG responses to different sound sequences in the post task period. The study concluded that the sound sequences can be identified and distinguished above theoretical chance level and hence proved the validity of our classifier. Further, the classifier could predict the sound sequences in the post-listening period with very high probability but in order to validate the model results on post listening period, more evidence is needed.
APA, Harvard, Vancouver, ISO, and other styles
3

Ourada, Jason D., and Kenneth L. Appelbaum. Intoxication and drugs in facilities. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199360574.003.0024.

Full text
Abstract:
Active abuse of substances by inmates poses a challenge for correctional psychiatrists. Substance use disorders (SUD) are common among inmates, with higher prevalence usually found in those with general psychiatric conditions. Knowledge about substance use in correctional facilities fosters competent clinical intervention and enhances management at all levels. Psychiatrists working in jails and prisons have the challenging task of maintaining therapeutic alliances with patients who have co-occurring SUDs and also may be actively using substances. Patients might not spontaneously report use during incarceration because they fear retribution by correctional staff or not receiving needed treatment for medical and mental health problems. Psychiatrists need to remain aware of this and to screen for SUD and active substance use as part of comprehensive treatment planning. The clinical challenges in jails and prisons differ, and the substances found in facilities vary geographically. Active substance abuse by inmates presents clinical and systemic challenges for correctional psychiatrists. The interplay among mental health, medical, and custody staff regarding screening, detection, triage, management, and treatment lies at the heart of these challenges. Correctional psychiatrists make important contributions by providing direct assessment and treatment to inmates, and by offering educational, clinical, and policy consultations to other staff. These contributions help prevent potentially life-threatening complications of intoxication and withdrawal, ensure integrated and evidence-based care, and avoid misguided or ill-informed disciplinary or other institutional practices. This chapter highlights these differences, outlines clinical management, and describes an interdisciplinary approach to intervention.
APA, Harvard, Vancouver, ISO, and other styles
4

Walczak, Jean-Sébastien. Understanding the responsiveness of C-fibres. Edited by Paul Farquhar-Smith, Pierre Beaulieu, and Sian Jagger. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780198834359.003.0006.

Full text
Abstract:
In the paper discussed in this chapter, Ainsley Iggo used electrophysiology to characterize mechanosensory fibres from the saphenous nerve in cats. Using fine techniques of dissection he recorded from single units and therefore could discriminate between the various types of sensitivity of afferent fibres. This article describes properties of primary afferent neurons in response to precise calibrated mechanical stimuli and focused on mechanical sensitivity of C-fibres. In addition, the manuscript describes the properties of skin-receptor fields. The paper showed that not all C-fibres responded to high-intensity stimuli and that receptive fields were quite small. In addition, it provided a qualitative evaluation of stimuli necessary to activate those fibres. Hence, by isolating fibres that responded only to strong stimulation, this article showed that the peripheral nervous system is equipped with a specific apparatus for detecting nociceptive stimuli; this was a great step forward in understanding the physiology of pain.
APA, Harvard, Vancouver, ISO, and other styles
5

Ufimtseva, Nataliya V., Iosif A. Sternin, and Elena Yu Myagkova. Russian psycholinguistics: results and prospects (1966–2021): a research monograph. Institute of Linguistics, Russian Academy of Sciences, 2021. http://dx.doi.org/10.30982/978-5-6045633-7-3.

Full text
Abstract:
The monograph reflects the problems of Russian psycholinguistics from the moment of its inception in Russia to the present day and presents its main directions that are currently developing. In addition, theoretical developments and practical results obtained in the framework of different directions and research centers are described in a concise form. The task of the book is to reflect, as far as it is possible in one edition, firstly, the history of the formation of Russian psycholinguistics; secondly, its methodology and developed methods; thirdly, the results obtained in different research centers and directions in different regions of Russia; fourthly, to outline the main directions of the further development of Russian psycholinguistics. There is no doubt that in the theoretical, methodological and applied aspects, the main problems and the results of their development by Russian psycholinguistics have no analogues in world linguistics and psycholinguistics, or are represented by completely original concepts and methods. We have tried to show this uniqueness of the problematics and the methodological equipment of Russian psycholinguistics in this book. The main role in the formation of Russian psycholinguistics was played by the Moscow psycholinguistic school of A.A. Leontyev. It still defines the main directions of Russian psycholinguistics. Russian psycholinguistics (the theory of speech activity - TSA) is based on the achievements of Russian psychology: a cultural-historical approach to the analysis of mental phenomena L.S. Vygotsky and the system-activity approach of A.N. Leontyev. Moscow is the most "psycholinguistic region" of Russia - INL RAS, Moscow State University, Moscow State Linguistic University, RUDN, Moscow State Pedagogical University, Moscow State Pedagogical University, Sechenov University, Moscow State University and other Moscow universities. Saint Petersburg psycholinguists have significant achievements, especially in the study of neurolinguistic problems, ontolinguistics. The most important feature of Russian psycholinguistics is the widespread development of psycholinguistics in the regions, the emergence of recognized psycholinguistic research centers - St. Petersburg, Tver, Saratov, Perm, Ufa, Omsk, Novosibirsk, Voronezh, Yekaterinburg, Kursk, Chelyabinsk; psycholinguistics is represented in Cherepovets, Ivanovo, Volgograd, Vyatka, Kaluga, Krasnoyarsk, Irkutsk, Vladivostok, Abakan, Maikop, Barnaul, Ulan-Ude, Yakutsk, Syktyvkar, Armavir and other cities; in Belarus - Minsk, in Ukraine - Lvov, Chernivtsi, Kharkov, in the DPR - Donetsk, in Kazakhstan - Alma-Ata, Chimkent. Our researchers work in Bulgaria, Hungary, Vietnam, China, France, Switzerland. There are Russian psycholinguists in Canada, USA, Israel, Austria and a number of other countries. All scientists from these regions and countries have contributed to the development of Russian psycholinguistics, to the development of psycholinguistic theory and methods of psycholinguistic research. Their participation has not been forgotten. We tried to present the main Russian psycholinguists in the Appendix - in the sections "Scientometrics", "Monographs and Manuals" and "Dissertations", even if there is no information about them in the Electronic Library and RSCI. The principles of including scientists in the scientometric list are presented in the Appendix. Our analysis of the content of the resulting monograph on psycholinguistic research in Russia allows us to draw preliminary conclusions about some of the distinctive features of Russian psycholinguistics: 1. cultural-historical approach to the analysis of mental phenomena of L.S.Vygotsky and the system-activity approach of A.N. Leontiev as methodological basis of Russian psycholinguistics; 2. theoretical nature of psycholinguistic research as a characteristic feature of Russian psycholinguistics. Our psycholinguistics has always built a general theory of the generation and perception of speech, mental vocabulary, linked specific research with the problems of ontogenesis, the relationship between language and thinking; 3. psycholinguistic studies of speech communication as an important subject of psycholinguistics; 4. attention to the psycholinguistic analysis of the text and the development of methods for such analysis; 5. active research into the ontogenesis of linguistic ability; 6. investigation of linguistic consciousness as one of the important subjects of psycholinguistics; 7. understanding the need to create associative dictionaries of different types as the most important practical task of psycholinguistics; 8. widespread use of psycholinguistic methods for applied purposes, active development of applied psycholinguistics. The review of the main directions of development of Russian psycholinguistics, carried out in this monograph, clearly shows that the direction associated with the study of linguistic consciousness is currently being most intensively developed in modern Russian psycholinguistics. As the practice of many years of psycholinguistic research in our country shows, the subject of study of psycholinguists is precisely linguistic consciousness - this is a part of human consciousness that is responsible for generating, understanding speech and keeping language in consciousness. Associative experiments are the core of most psycholinguistic techniques and are important both theoretically and practically. The following main areas of practical application of the results of associative experiments can be outlined. 1. Education. Associative experiments are the basis for constructing Mind Maps, one of the most promising tools for systematizing knowledge, assessing the quality, volume and nature of declarative knowledge (and using special techniques and skills). Methods based on smart maps are already widely used in teaching foreign languages, fast and deep immersion in various subject areas. 2. Information search, search optimization. The results of associative experiments can significantly improve the quality of information retrieval, its efficiency, as well as adaptability for a specific person (social group). When promoting sites (promoting them in search results), an associative experiment allows you to increase and improve the quality of the audience reached. 3. Translation studies, translation automation. An associative experiment can significantly improve the quality of translation, take into account intercultural and other social characteristics of native speakers. 4. Computational linguistics and automatic word processing. The results of associative experiments make it possible to reveal the features of a person's linguistic consciousness and contribute to the development of automatic text processing systems in a wide range of applications of natural language interfaces of computer programs and robotic solutions. 5. Advertising. The use of data on associations for specific words, slogans and texts allows you to predict and improve advertising texts. 6. Social relationships. The analysis of texts using the data of associative experiments makes it possible to assess the tonality of messages (negative / positive moods, aggression and other characteristics) based on user comments on the Internet and social networks, in the press in various projections (by individuals, events, organizations, etc.) from various social angles, to diagnose the formation of extremist ideas. 7. Content control and protection of personal data. Associative experiments improve the quality of content detection and filtering by identifying associative fields in areas subject to age restrictions, personal information, tobacco and alcohol advertising, incitement to ethnic hatred, etc. 8. Gender and individual differences. The data of associative experiments can be used to compare the reactions (and, in general, other features of thinking) between men and women, different social and age groups, representatives of different regions. The directions for the further development of Russian psycholinguistics from the standpoint of the current state of psycholinguistic science in the country are seen by us, first of all:  in the development of research in various areas of linguistic consciousness, which will contribute to the development of an important concept of speech as a verbal model of non-linguistic consciousness, in which knowledge revealed by social practice and assigned by each member of society during its inculturation is consolidated for society and on its behalf;  in the expansion of the problematics, which is formed under the influence of the growing intercultural communication in the world community, which inevitably involves the speech behavior of natural and artificial bilinguals in the new object area of psycholinguistics;  in using the capabilities of national linguistic corpora in the interests of researchers studying the functioning of non-linguistic and linguistic consciousness in speech processes;  in expanding research on the semantic perception of multimodal texts, the scope of which has greatly expanded in connection with the spread of the Internet as a means of communication in the life of modern society;  in the inclusion of the problems of professional communication and professional activity in the object area of psycholinguistics in connection with the introduction of information technologies into public practice, entailing the emergence of new professions and new features of the professional ethos;  in the further development of the theory of the mental lexicon (identifying the role of different types of knowledge in its formation and functioning, the role of the word as a unit of the mental lexicon in the formation of the image of the world, as well as the role of the natural / internal metalanguage and its specificity in speech activity);  in the broad development of associative lexicography, which will meet the most diverse needs of society and cognitive sciences. The development of associative lexicography may lead to the emergence of such disciplines as associative typology, associative variantology, associative axiology;  in expanding the spheres of applied use of psycholinguistics in social sciences, sociology, semasiology, lexicography, in the study of the brain, linguodidactics, medicine, etc. This book is a kind of summarizing result of the development of Russian psycholinguistics today. Each section provides a bibliography of studies on the relevant issue. The Appendix contains the scientometrics of leading Russian psycholinguists, basic monographs, psycholinguistic textbooks and dissertations defended in psycholinguistics. The content of the publications presented here is convincing evidence of the relevance of psycholinguistic topics and the effectiveness of the development of psycholinguistic problems in Russia.
APA, Harvard, Vancouver, ISO, and other styles
6

Chinoy, Hector, and Robert G. Cooper. Polymyositis and dermatomyositis. Oxford University Press, 2013. http://dx.doi.org/10.1093/med/9780199642489.003.0124.

Full text
Abstract:
Polymyositis (PM), dermatomyositis (DM), and inclusion body myositis (IBM) form part of the idiopathic inflammatory myopathies (IIM), a heterogeneous group of rare autoimmune diseases characterized by an acquired proximal muscle weakness, raised muscle enzymes (including creatine kinase), inflammatory cell infiltrates in muscle biopsy tissue, electrophysiological abnormalities, and presence of circulating myositis-specific/myositis-associated autoantibodies. The underlying aetiology of IIM is poorly understood, but likely involves interactions between environmental and genetic risk factors. Myositis may also manifest in association with other connective tissue disorders. The predominant clinical presentation of IIM is skeletal muscle weakness, but many extramuscular features can also occur. Access to good neuropathological support is essential in securing an accurate IIM diagnosis and excluding non-inflammatory myopathies, although IBM is often difficult to distinguish from PM. Antibody testing can help define IIM clinical subtypes, including cancer-associated myositis, predict prognosis, and help in optimizing treatment decisions. MRI can be invaluable for differentiating disease activity from damage, and detecting treatment-induced interval changes. Therapeutic effectiveness of new and existing treatments (where the evidence base remains poor) depends on making a prompt diagnosis and initiating early and appropriately aggressive treatment to prevent establishment of muscle damage. This chapter attempts to summarize the salient features of IIM and update the reader about currently used diagnostics and treatment paradigms in this rare and understudied disease.
APA, Harvard, Vancouver, ISO, and other styles
7

Harper, Lorraine, and David Jayne. The patient with vasculitis. Edited by Giuseppe Remuzzi. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199592548.003.0160.

Full text
Abstract:
The goals of treatment in renal vasculitis are to stop vasculitic activity and recover renal function. Subsequent strategies are required to prevent vasculitis returning and to address longer-term co-morbidities caused by tissue damage, drug toxicity, and increased cardiovascular and malignancy risk.Cyclophosphamide and high-dose glucocorticoids remain the standard induction therapy with alternative immunosuppressives, such as azathioprine, to prevent relapse. Plasma exchange improves renal recovery in severe presentations. Refractory disease resulting from a failure of induction or remission maintenance therapy requires alternative agents and rituximab has been particularly effective. Replacement of cyclophosphamide by rituximab for remission induction is supported by recent evidence. Methotrexate is effective in non-renal vasculitis but difficult to use in patients with renal impairment. Mycophenolate mofetil seems to be effective but there is less long-term evidence.Drug toxicity contributes to co-morbidity and mortality and has led to newer regimens with reduced cyclophosphamide exposure. Glucocorticoid toxicity remains a major problem with controversy over the rapidity with which glucocorticoids can be reduced or withdrawn.Disease relapse occurs in about 50% of patients. Early detection is less likely to lead to an adverse affect on outcomes. Rates of cardiovascular disease and malignancy are higher than in control populations but strategies to reduce their risk, apart from cyclophosphamide-sparing regimens, have not been developed. Thromboembolic events occur in 10% and may be linked to the recently identified autoantibodies to plasminogen and tissue plasminogen activator.Renal impairment at diagnosis is a strong predictor of patient survival and renal outcome. Other predictors include patient age, antineutrophil cytoplasmic antibody subtype, disease extent and response to therapy. Chronic kidney disease can stabilize for many years but the risks of end-stage renal disease are increased by acute kidney injury at presentation or renal relapse. Renal transplantation is successful with similar outcomes to other causes of end-stage renal disease.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "In-app user activity detection"

1

Baek, Jonghun, Geehyuk Lee, Wonbae Park, and Byoung-Ju Yun. "Accelerometer Signal Processing for User Activity Detection." In Lecture Notes in Computer Science, 610–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30134-9_82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scardino, Giuseppe, Ignazio Infantino, and Filippo Vella. "Recognition of Human Identity by Detection of User Activity." In Lecture Notes in Computer Science, 49–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tokhtabayev, Arnur, Anton Kopeikin, Nurlan Tashatov, and Dina Satybaldina. "Malware Analysis and Detection via Activity Trees in User-Dependent Environment." In Lecture Notes in Computer Science, 211–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Märker, Marcus, Sebastian Wolf, Oliver Scharf, Daniel Plorin, and Tobias Teich. "KNX-Based Sensor Monitoring for User Activity Detection in AAL-environments." In Ambient Assisted Living and Daily Activities, 18–25. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13105-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lukashin, Aleksey, Mikhail Popov, Dmitrii Timofeev, and Igor Mikhalev. "Employee Performance Analytics Approach Based on Anomaly Detection in User Activity." In Proceedings of International Scientific Conference on Telecommunications, Computing and Control, 321–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6632-9_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Faisal, and Marina Gavrilova. "Biometric-Based User Authentication and Activity Level Detection in a Collaborative Environment." In Transparency in Social Media, 165–80. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18552-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ortega, Jose Luis Gomez, Liangxiu Han, and Nicholas Bowring. "Modelling and Detection of User Activity Patterns for Energy Saving in Buildings." In Emerging Trends and Advanced Technologies for Computational Intelligence, 165–85. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33353-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Flores-Martin, Daniel, Sergio Laso, Javier Berrocal, and Juan M. Murillo. "Contigo: Monitoring People’s Activity App for Anomalies Detection." In Lecture Notes in Bioengineering, 3–14. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97524-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zeng, Fuwei, Tie Bao, and Wenhao Xiang. "Machine Learning in Short Video APP User Activity Prediction." In Human Centered Computing, 568–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37429-7_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kleanthous, Styliani, Constantinos Herodotou, George Samaras, and Panayiotis Germanakos. "Detecting Personality Traces in Users’ Social Activity." In Social Computing and Social Media, 287–97. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39910-2_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "In-app user activity detection"

1

Hasara Pathmaperuma, Madushi, Yogachandran Rahulamathavan, Safak Dogan, and Ahmet M. Kondoz. "User Mobile App Encrypted Activity Detection." In ESCC '21: The 2nd European Symposium on Computer and Communications. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3478301.3478303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Swarnalaxmi, S., I. Elakkiya, M. Thilagavathi, Anil Thomas, and Gunasekaran Raja. "User Activity Analysis Driven Anomaly Detection in Cellular Network." In 2018 Tenth International Conference on Advanced Computing (ICoAC). IEEE, 2018. http://dx.doi.org/10.1109/icoac44903.2018.8939064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hu, Qiaona, Baoming Tang, and Derek Lin. "Anomalous User Activity Detection in Enterprise Multi-source Logs." In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 2017. http://dx.doi.org/10.1109/icdmw.2017.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marchenkov, Sergey, and Dmitry Korzun. "User presence detection based on tracking network activity in smartroom." In 2014 16th Conference of Open Innovations Association (FRUCT16). IEEE, 2014. http://dx.doi.org/10.1109/fruct.2014.7000941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alcaraz, Juan J., Mario Lopez-Martinez, Javier Vales-Alonso, and Joan Garcia-Haro. "Background detection of primary user activity in Opportunistic Spectrum Access." In 2015 IEEE International Conference on Signal Processing for Communications (ICC). IEEE, 2015. http://dx.doi.org/10.1109/icc.2015.7248523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Avrahami, Daniel, Eveline van Everdingen, and Jennifer Marlow. "Supporting Multitasking in Video Conferencing using Gaze Tracking and On-Screen Activity Detection." In IUI'16: 21st International Conference on Intelligent User Interfaces. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2856767.2856801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Charoenkulvanich, Nathawan, Rie Kamikubo, Ryo Yonetani, and Yoichi Sato. "Assisting group activity analysis through hand detection and identification in multiple egocentric videos." In IUI '19: 24th International Conference on Intelligent User Interfaces. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3301275.3302297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chi, Yuhao, Lei Liu, Guanghui Song, Chau Yuen, Yong Liang Guan, and Ying Li. "Message Passing in C-RAN: Joint User Activity and Signal Detection." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, A. Sharath, and Sanjay Singh. "Detection of User Cluster with Suspicious Activity in Online Social Networking Sites." In 2013 2nd International Conference on Advanced Computing, Networking and Security (ADCONS). IEEE, 2013. http://dx.doi.org/10.1109/adcons.2013.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Boljanovic, Veljko, Dejan Vukobratovic, Petar Popovski, and Cedomir Stefanovic. "User activity detection in massive random access: Compressed sensing vs. coded slotted ALOHA." In 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2017. http://dx.doi.org/10.1109/spawc.2017.8227652.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "In-app user activity detection"

1

Chen, Yona, Jeffrey Buyer, and Yitzhak Hadar. Microbial Activity in the Rhizosphere in Relation to the Iron Nutrition of Plants. United States Department of Agriculture, October 1993. http://dx.doi.org/10.32747/1993.7613020.bard.

Full text
Abstract:
Iron is the fourth most abundant element in the soil, but since it forms insoluble hydroxides at neutral and basic pH, it often falls short of meeting the basic requirements of plants and microorganisms. Most aerobic and facultative aerobic microorganisms possess a high-affinity Fe transport system in which siderophores are excreted and the consequent Fe complex is taken up via a cognate specific receptor and a transport pathway. The role of the siderophore in Fe uptake by plants and microorganisms was the focus of this study. In this research Rhizopus arrhizus was found to produce a novel siderophore named Rhizoferrin when grown under Fe deficiency. This compound was purified and its chemical structure was elucidated. Fe-Rhizoferrin was found to alleviate Fe deficiency when applied to several plants grown in nutrient solutions. It was concluded that Fe-Rhizoferrin is the most efficient Fe source for plants when compared with other among microbial siderophores known to date and its activity equals that of the most efficient synthetic commercial iron fertilizer-Fe EDDHA. Siderophores produced by several rhizosphere organisms including Rhizopus Pseudomonas were purified. Monoclonal antibodies were produced and used to develop a method for detection of the siderophores produced by plant-growth-promoting microorganisms in barley rhizosphere. The presence of an Fe-ferrichrome uptake in fluorescent Pseudomonas spp. was demonstrated, and its structural requirements were mapped in P. putida with the help of biomimetic ferrichrome analogs. Using competition experiments, it was shown that FOB, Cop B and FC share at least one common determinant in their uptake pathway. Since FC analogs did not affect FOB or Cop-mediated 55Fe uptake, it could be concluded that these siderophores make use of a different receptor(s) than FC. Therefore, recognition of Cop, FOB and FC proceeds through different receptors having different structural requirements. On the other hand, the phytosiderophores mugineic acid (MA and DMA), were utilized indirectly via ligand exchange by P. putida. Receptors from different biological systems seem to differ in their structural requirements for siderophore recognition and uptake. The design of genus- or species-specific drugs, probes or chemicals, along with an understanding of plant-microbe and microbe-microbe relationships as well as developing methods to detect siderophores using monoclonal antibodies are useful for manipulating the composition of the rhizosphere microbial population for better plant growth, Fe-nutrition and protection from diseases.
APA, Harvard, Vancouver, ISO, and other styles
2

Cytryn, Eddie, Mark R. Liles, and Omer Frenkel. Mining multidrug-resistant desert soil bacteria for biocontrol activity and biologically-active compounds. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7598174.bard.

Full text
Abstract:
Control of agro-associated pathogens is becoming increasingly difficult due to increased resistance and mounting restrictions on chemical pesticides and antibiotics. Likewise, in veterinary and human environments, there is increasing resistance of pathogens to currently available antibiotics requiring discovery of novel antibiotic compounds. These drawbacks necessitate discovery and application of microorganisms that can be used as biocontrol agents (BCAs) and the isolation of novel biologically-active compounds. This highly-synergistic one year project implemented an innovative pipeline aimed at detecting BCAs and associated biologically-active compounds, which included: (A) isolation of multidrug-resistant desert soil bacteria and root-associated bacteria from medicinal plants; (B) invitro screening of bacterial isolates against known plant, animal and human pathogens; (C) nextgeneration sequencing of isolates that displayed antagonistic activity against at least one of the model pathogens and (D) in-planta screening of promising BCAs in a model bean-Sclerotiumrolfsii system. The BCA genome data were examined for presence of: i) secondary metabolite encoding genes potentially linked to the anti-pathogenic activity of the isolates; and ii) rhizosphere competence-associated genes, associated with the capacity of microorganisms to successfully inhabit plant roots, and a prerequisite for the success of a soil amended BCA. Altogether, 56 phylogenetically-diverse isolates with bioactivity against bacterial, oomycete and fungal plant pathogens were identified. These strains were sent to Auburn University where bioassays against a panel of animal and human pathogens (including multi-drug resistant pathogenic strains such as A. baumannii 3806) were conducted. Nineteen isolates that showed substantial antagonistic activity against at least one of the screened pathogens were sequenced, assembled and subjected to bioinformatics analyses aimed at identifying secondary metabolite-encoding and rhizosphere competence-associated genes. The genome size of the bacteria ranged from 3.77 to 9.85 Mbp. All of the genomes were characterized by a plethora of secondary metabolite encoding genes including non-ribosomal peptide synthase, polyketidesynthases, lantipeptides, bacteriocins, terpenes and siderophores. While some of these genes were highly similar to documented genes, many were unique and therefore may encode for novel antagonistic compounds. Comparative genomic analysis of root-associated isolates with similar strains not isolated from root environments revealed genes encoding for several rhizospherecompetence- associated traits including urea utilization, chitin degradation, plant cell polymerdegradation, biofilm formation, mechanisms for iron, phosphorus and sulfur acquisition and antibiotic resistance. Our labs are currently writing a continuation of this feasibility study that proposes a unique pipeline for the detection of BCAs and biopesticides that can be used against phytopathogens. It will combine i) metabolomic screening of strains from our collection that contain unique secondary metabolite-encoding genes, in order to isolate novel antimicrobial compounds; ii) model plant-based experiments to assess the antagonistic capacities of selected BCAs toward selected phytopathogens; and iii) an innovative next-generation-sequencing based method to monitor the relative abundance and distribution of selected BCAs in field experiments in order to assess their persistence in natural agro-environments. We believe that this integrated approach will enable development of novel strains and compounds that can be used in large-scale operations.
APA, Harvard, Vancouver, ISO, and other styles
3

Barefoot, Susan F., Bonita A. Glatz, Nathan Gollop, and Thomas A. Hughes. Bacteriocin Markers for Propionibacteria Gene Transfer Systems. United States Department of Agriculture, June 2000. http://dx.doi.org/10.32747/2000.7573993.bard.

Full text
Abstract:
The antibotulinal baceriocins, propionicin PLG-1 and jenseniin G., were the first to be identified, purified and characterized for the dairy propionibaceria and are produced by Propionibacterium thoenii P127 and P. thoenii/jensenii P126, respectively. Objectives of this project were to (a) produce polyclonal antibodies for detection, comparison and monitoring of propionicin PLG-1; (b) identify, clone and characterize the propionicin PLG-1 (plg-1) and jenseniin G (jnG) genes; and (3) develop gene transfer systems for dairy propionibacteria using them as models. Polyclonal antibodies for detection, comparison and monitoring of propionicin PLG-1 were produced in rabbits. Anti-PLG-1 antiserum had high titers (256,000 to 512,000), neutralized PLG-1 activity, and detected purified PLG-1 at 0.10 mg/ml (indirect ELISA) and 0.033 mg/ml (competitive indirect ELISA). Thirty-nine of 158 strains (most P. thoenii or P. jensenii) yielded cross-reacting material; four strains of P. thoenii, including two previously unidentified bacteriocin producers, showed biological activity. Eight propionicin-negative P127 mutants produced neither ELISA response nor biological activity. Western blot analyses of supernates detected a PLG-1 band at 9.1 kDa and two additional protein bands with apparent molecular weights of 16.2 and 27.5 kDa. PLG-1 polyclonal antibodies were used for detection of jenseniin G. PLG-1 antibodies neutralized jenseniin G activity and detected a jenseniin G-sized, 3.5 kDa peptide. Preliminary immunoprecipitation of crude preparations with PLG-1 antibodies yielded three proteins including an active 3-4 kDa band. Propionicin PLG-1 antibodies were used to screen a P. jensenii/thoenii P126 genomic expression library. Complete sequencing of a cloned insert identified by PLG-1 antibodies revealed a putative response regulator, transport protein, transmembrane protein and an open reading frame (ORF) potentially encoding jenseniin G. PCR cloning of the putative plg-1 gene yielded a 1,100 bp fragment with a 355 bp ORF encoding 118 amino acids; the deduced N-terminus was similar to the known PLG-1 N-terminus. The 118 amino acid sequence deduced from the putative plg-1 gene was larger than PLG-1 possibly due to post-translational processing. The product of the putative plg-1 gene had a calculated molecular weight of 12.8 kDa, a pI of 11.7, 14 negatively charged residues (Asp+Glu) and 24 positively charged residues (Arg+Lys). The putative plg-1 gene was expressed as an inducible fusion protein with a six-histidine residue tag. Metal affinity chromatography of the fused protein yielded a homogeneous product. The fused purified protein sequence matched the deduced putative plg-1 gene sequence. The data preliminarily suggest that both the plg-1 and jnG genes have been identified and cloned. Demonstrating that antibodies can be produced for propionicin PLG-1 and that those antibodies can be used to detect, monitor and compare activity throughout growth and purification was an important step towards monitoring PLG-1 concentrations in food systems. The unexpected but fortunate cross-reactivity of PLG-1 antibodies with jenseniin G led to selective recovery of jenseniin G by immunoprecipitation. Further refinement of this separation technique could lead to powerful affinity methods for rapid, specific separation of the two bacteriocins and thus facilitate their availability for industrial or pharmaceutical uses. Preliminary identification of genes encoding the two dairy propionibacteria bacteriocins must be confirmed; further analysis will provide means for understanding how they work, for increasing their production and for manipulating the peptides to increase their target species. Further development of these systems would contribute to basic knowledge about dairy propionibacteria and has potential for improving other industrially significant characteristics.
APA, Harvard, Vancouver, ISO, and other styles
4

Sessa, Guido, and Gregory Martin. role of FLS3 and BSK830 in pattern-triggered immunity in tomato. United States Department of Agriculture, January 2016. http://dx.doi.org/10.32747/2016.7604270.bard.

Full text
Abstract:
Pattern-recognition receptors (PRRs) located on the plant cell surface initiate immune responses by perceiving conserved pathogen molecules known as pathogen-associated molecular patterns (PAMPs). PRRs typically function in multiprotein complexes that include transmembrane and cytoplasmickinases and contribute to the initiation and signaling of pattern-triggered immunity (PTI). An important challenge is to identify molecular components of PRR complexes and downstream signaling pathways, and to understand the molecular mechanisms that mediate their function. In research activities supported by BARD-4931, we studied the role of the FLAGELLIN SENSING 3 (FLS3) PRR in the response of tomato leaves to flagellin-derivedPAMPs and PTI. In addition, we investigated molecular properties of the tomato brassinosteroid signaling kinase 830 (BSK830) that physically interacts with FLS3 and is a candidate for acting in the FLS3 signaling pathway. Our investigation refers to the proposal original objectives that were to: 1) Investigate the role of FLS3 and its interacting proteins in PTI; 2) Investigate the role of BSK830 in PTI; 3) Examine molecular and phosphorylation dynamics of the FLS3-BSK830 interaction; 4) Examine the possible interaction of FLS3 and BSK830 with Pstand Xcveffectors. We used CRISPR/Cas9 techniques to develop plants carrying single or combined mutations in the FLS3 gene and in the paralogsFLS2.1 and FLS2.2 genes, which encode the receptor FLAGELLIN SENSING2 (FLS2), and analyzed their function in PTI. Domain swapping analysis of the FLS2 and FLS3 receptors revealed domains of the proteins responsible for PAMP detection and for the different ROS response initiated by flgII-28/FLS3 as compared to flg22/FLS2. In addition, in vitro kinase assays and point mutations analysis identified FLS2 and FLS3 domains required for kinase activity and ATP binding. In research activities on tomato BSK830, we found that it interacts with PRRs and with the co-receptor SERK3A and PAMP treatment affects part of these interactions. CRISPR/Cas9 bsk830 mutant plants displayed enhanced pathogen susceptibility and reduced ROS production upon PAMP treatment. In addition, BSK830 interacted with 8 Xanthomonastype III secreted effectors. Follow up analysis revealed that among these effectors XopAE is part of an operon, is translocated into plant cells, and displays E3 ubiquitinligase activity. Our investigation was also extended to other Arabidopsis and tomato BSK family members. Arabidopsis BSK5 localized to the plant cell periphery, interacted with receptor-like kinases, and it was phosphorylatedin vitro by the PEPR1 and EFRPRRs. bsk5 mutant plants displayed enhanced susceptibility to pathogens and were impaired in several, but not all, PAMP-induced responses. Conversely, BSK5 overexpression conferred enhanced disease resistance and caused stronger PTI responses. Genetic complementation suggested that proper localization, kinase activity, and phosphorylation by PRRs are critical for BSK5 function. BSK7 and BSK8 specifically interacted with the FLS2 PRR, their respective mutant plants were more susceptible to B. cinereaand displayed reduced flg22-induced responses. The tomato BSK Mai1 was found to interact with the M3KMAPKKK, which is involved in activation of cell death associated with effector-triggered immunity. Silencing of Mai1 in N. benthamianaplants compromised cell death induced by a specific class of immune receptors. In addition, co-expression of Mai1 and M3Kin leaves enhanced MAPKphosphorylation and cell death, suggesting that Mai1 acts as a molecular link between pathogen recognition and MAPK signaling. Finally, We identified the PP2C phosphatase Pic1 that acts as a negative regulator of PTI by interacting with and dephosphorylating the receptor-like cytoplasmickinase Pti1, which is a positive regulator of plant immunity. The results of this investigation shed new light on the molecular characteristics and interactions of components of the immune system of crop plants providing new knowledge and tools for development of novel strategies for disease control.
APA, Harvard, Vancouver, ISO, and other styles
5

Smit, Amelia, Kate Dunlop, Nehal Singh, Diona Damian, Kylie Vuong, and Anne Cust. Primary prevention of skin cancer in primary care settings. The Sax Institute, August 2022. http://dx.doi.org/10.57022/qpsm1481.

Full text
Abstract:
Overview Skin cancer prevention is a component of the new Cancer Plan 2022–27, which guides the work of the Cancer Institute NSW. To lessen the impact of skin cancer on the community, the Cancer Institute NSW works closely with the NSW Skin Cancer Prevention Advisory Committee, comprising governmental and non-governmental organisation representatives, to develop and implement the NSW Skin Cancer Prevention Strategy. Primary Health Networks and primary care providers are seen as important stakeholders in this work. To guide improvements in skin cancer prevention and inform the development of the next NSW Skin Cancer Prevention Strategy, an up-to-date review of the evidence on the effectiveness and feasibility of skin cancer prevention activities in primary care is required. A research team led by the Daffodil Centre, a joint venture between the University of Sydney and Cancer Council NSW, was contracted to undertake an Evidence Check review to address the questions below. Evidence Check questions This Evidence Check aimed to address the following questions: Question 1: What skin cancer primary prevention activities can be effectively administered in primary care settings? As part of this, identify the key components of such messages, strategies, programs or initiatives that have been effectively implemented and their feasibility in the NSW/Australian context. Question 2: What are the main barriers and enablers for primary care providers in delivering skin cancer primary prevention activities within their setting? Summary of methods The research team conducted a detailed analysis of the published and grey literature, based on a comprehensive search. We developed the search strategy in consultation with a medical librarian at the University of Sydney and the Cancer Institute NSW team, and implemented it across the databases Embase, MEDLINE, PsycInfo, Scopus, Cochrane Central and CINAHL. Results were exported and uploaded to Covidence for screening and further selection. The search strategy was designed according to the SPIDER tool for Qualitative and Mixed-Methods Evidence Synthesis, which is a systematic strategy for searching qualitative and mixed-methods research studies. The SPIDER tool facilitates rigour in research by defining key elements of non-quantitative research questions. We included peer-reviewed and grey literature that included skin cancer primary prevention strategies/ interventions/ techniques/ programs within primary care settings, e.g. involving general practitioners and primary care nurses. The literature was limited to publications since 2014, and for studies or programs conducted in Australia, the UK, New Zealand, Canada, Ireland, Western Europe and Scandinavia. We also included relevant systematic reviews and evidence syntheses based on a range of international evidence where also relevant to the Australian context. To address Question 1, about the effectiveness of skin cancer prevention activities in primary care settings, we summarised findings from the Evidence Check according to different skin cancer prevention activities. To address Question 2, about the barriers and enablers of skin cancer prevention activities in primary care settings, we summarised findings according to the Consolidated Framework for Implementation Research (CFIR). The CFIR is a framework for identifying important implementation considerations for novel interventions in healthcare settings and provides a practical guide for systematically assessing potential barriers and facilitators in preparation for implementing a new activity or program. We assessed study quality using the National Health and Medical Research Council (NHMRC) levels of evidence. Key findings We identified 25 peer-reviewed journal articles that met the eligibility criteria and we included these in the Evidence Check. Eight of the studies were conducted in Australia, six in the UK, and the others elsewhere (mainly other European countries). In addition, the grey literature search identified four relevant guidelines, 12 education/training resources, two Cancer Care pathways, two position statements, three reports and five other resources that we included in the Evidence Check. Question 1 (related to effectiveness) We categorised the studies into different types of skin cancer prevention activities: behavioural counselling (n=3); risk assessment and delivering risk-tailored information (n=10); new technologies for early detection and accompanying prevention advice (n=4); and education and training programs for general practitioners (GPs) and primary care nurses regarding skin cancer prevention (n=3). There was good evidence that behavioural counselling interventions can result in a small improvement in sun protection behaviours among adults with fair skin types (defined as ivory or pale skin, light hair and eye colour, freckles, or those who sunburn easily), which would include the majority of Australians. It was found that clinicians play an important role in counselling patients about sun-protective behaviours, and recommended tailoring messages to the age and demographics of target groups (e.g. high-risk groups) to have maximal influence on behaviours. Several web-based melanoma risk prediction tools are now available in Australia, mainly designed for health professionals to identify patients’ risk of a new or subsequent primary melanoma and guide discussions with patients about primary prevention and early detection. Intervention studies have demonstrated that use of these melanoma risk prediction tools is feasible and acceptable to participants in primary care settings, and there is some evidence, including from Australian studies, that using these risk prediction tools to tailor primary prevention and early detection messages can improve sun-related behaviours. Some studies examined novel technologies, such as apps, to support early detection through skin examinations, including a very limited focus on the provision of preventive advice. These novel technologies are still largely in the research domain rather than recommended for routine use but provide a potential future opportunity to incorporate more primary prevention tailored advice. There are a number of online short courses available for primary healthcare professionals specifically focusing on skin cancer prevention. Most education and training programs for GPs and primary care nurses in the field of skin cancer focus on treatment and early detection, though some programs have specifically incorporated primary prevention education and training. A notable example is the Dermoscopy for Victorian General Practice Program, in which 93% of participating GPs reported that they had increased preventive information provided to high-risk patients and during skin examinations. Question 2 (related to barriers and enablers) Key enablers of performing skin cancer prevention activities in primary care settings included: • Easy access and availability of guidelines and point-of-care tools and resources • A fit with existing workflows and systems, so there is minimal disruption to flow of care • Easy-to-understand patient information • Using the waiting room for collection of risk assessment information on an electronic device such as an iPad/tablet where possible • Pairing with early detection activities • Sharing of successful programs across jurisdictions. Key barriers to performing skin cancer prevention activities in primary care settings included: • Unclear requirements and lack of confidence (self-efficacy) about prevention counselling • Limited availability of GP services especially in regional and remote areas • Competing demands, low priority, lack of time • Lack of incentives.
APA, Harvard, Vancouver, ISO, and other styles
6

Gafny, Ron, A. L. N. Rao, and Edna Tanne. Etiology of the Rugose Wood Disease of Grapevine and Molecular Study of the Associated Trichoviruses. United States Department of Agriculture, September 2000. http://dx.doi.org/10.32747/2000.7575269.bard.

Full text
Abstract:
Rugose wood is a complex disease of grapevines, characterized by modification of the woody cylinder of affected vines. The control of rugose wood is based on the production of healthy propagation material. Detection of rugose wood in grapevines is difficult and expensive: budwood from tested plants is grafted onto sensitive Vitis indicators and the appearance of symptoms is monitored for 3 years. The etiology of rugose wood is complex and has not yet been elucidated. Several elongated clostero-like viruses are consistently found in affected vines; one of them, grapevine virus A (GVA), is closely associated with Kober stem grooving, a component of the rugose wood complex. GVA has a single-stranded RNA genome of 7349 nucleotides, excluding a polyA tail at the 3' terminus. The GVA genome includes five open reading frames (ORFs 1-5). ORF 4, which encodes for the coat protein of GVA, is the only ORF for which the function was determined experimentally. The original objectives of this research were: 1- To produce antisera to the structural and non-structural proteins of GVA and GVB and to use these antibodies to establish an effective detection method. 2- Develop full length infectious cDNA clones of GVA and GVB. 3- Study the roll of GVA and GVB in the etiology of the grapevine rugose wood disease. 4- Determine the function of Trichovirus (now called Vitivirus) encoded genes in the virus life cycle. Each of the ORFs 2, 3, 4 and 5 genes of GVA were cloned and expressed in E. coli and used to produce antisera. Both the CP (ORF 4) and the putative MP (ORF 3) were detected with their corresponding antisera in-GVA infected N. benthamiana and grapevine. The MP was first detected at an early stage of the infection, 6-12 h after inoculation, and the CP 2-3 days after inoculation. The MP could be detected in GVA-infected grapevines that tested negative for CP, both with CP antiserum and with a commercially available ELISA kit. Antisera to ORF 2 and 5 encoded proteins could react with the recombinant proteins but failed to detect both proteins in GVA infected plants. A full-length cDNA clone of grapevine virus A (GVA) was constructed downstream from the bacteriophage T7 RNA polymerase promoter. Capped in vitro transcribed RNA was infectious in N. benthamiana and N. clevelandii plants. Symptoms induced by the RNA transcripts or by the parental virus were indistinguishable. The infectivity of the in vitro-transcribed RNA was confirmed by serological detection of the virus coat and movement proteins and by observation of virions by electron microscopy. The full-length clone was modified to include a gus reporter gene and gus activity was detected in inoculated and systemic leaves of infected plants. Studies of GVA mutants suggests that the coat protein (ORF 4) is essential for cell to cell movement, the putative movement protein (ORF 3) indeed functions as a movement protein and that ORF 2 is not required for virus replication, cell to cell or systemic movement. Attempts to infect grapevines by in-vitro transcripts, by inoculation of cDNA construct in which the virus is derived by the CaMV 35S promoter or by approach grafting with infected N. benthamiana, have so far failed. Studies of the subcellular distribution of GFP fusion with each of ORF 2, 3 and 4 encoded protein showed that the CP fusion protein accumulated as a soluble cytoplasmatic protein. The ORF 2 fusion protein accumulated in cytoplasmatic aggregates. The MP-GFP fusion protein accumulated in a large number of small aggregates in the cytoplasm and could not move from cell to cell. However, in conditions that allowed movement of the fusion protein from cell to cell (expression by a PVX vector or in young immature leaves) the protein did not form cytoplasmatic aggregates but accumulated in the plasmodesmata.
APA, Harvard, Vancouver, ISO, and other styles
7

Mizrach, Amos, Michal Mazor, Amots Hetzroni, Joseph Grinshpun, Richard Mankin, Dennis Shuman, Nancy Epsky, and Robert Heath. Male Song as a Tool for Trapping Female Medflies. United States Department of Agriculture, December 2002. http://dx.doi.org/10.32747/2002.7586535.bard.

Full text
Abstract:
This interdisciplinaray work combines expertise in engineering and entomology in Israel and the US, to develop an acoustic trap for mate-seeking female medflies. Medflies are among the world's most economically harmful pests, and monitoring and control efforts cost about $800 million each year in Israel and the US. Efficient traps are vitally important tools for medfly quarantine and pest management activities; they are needed for early detection, for predicting dispersal patterns and for estimating medfly abundance within infested regions. Early detection facilitates rapid response to invasions, in order to contain them. Prediction of dispersal patterns facilitates preemptive action, and estimates of the pests' abundance lead to quantification of medfly infestations and control efforts. Although olfactory attractants and traps exist for capturing male and mated female medflies, there are still no satisfactorily efficient means to attract and trap virgin and remating females (a significant and dangerous segment of the population). We proposed to explore the largely ignored mechanism of female attraction to male song that the flies use in courtship. The potential of such an approach is indicated by studies under this project. Our research involved the identification, isolation, and augmentation of the most attractive components of male medfly songs and the use of these components in the design and testing of traps incorporating acoustic lures. The project combined expertise in acoustic engineering and instrumentation, fruit fly behavior, and integrated pest management. The BARD support was provided for 1 year to enable proof-of-concept studies, aimed to determine: 1) whether mate-seeking female medflies are attracted to male songs; and 2) over what distance such attraction works. Male medfly calling song was recorded during courtship. Multiple acoustic components of male song were examined and tested for synergism with substrate vibrations produced by various surfaces, plates and loudspeakers, with natural and artificial sound playbacks. A speaker-funnel system was developed that focused the playback signal to reproduce as closely as possible the near-field spatial characteristics of the sounds produced by individual males. In initial studies, the system was tasted by observing the behavior of females while the speaker system played songs at various intensities. Through morning and early afternoon periods of peak sexual activity, virgin female medflies landed on a sheet of filter paper at the funnel outlet and stayed longer during broadcasting than during the silent part of the cycle. In later studies, females were captured on sticky paper at the funnel outlet. The mean capture rates were 67 and 44%, respectively, during sound emission and silent control periods. The findings confirmed that female trapping was improved if a male calling song was played. The second stage of the research focused on estimating the trapping range. Initial results indicated that the range possibly extended to 70 cm, but additional, verification tests remain to be conducted. Further studies are planned also to consider effects of combining acoustic and pheromonal cues.
APA, Harvard, Vancouver, ISO, and other styles
8

Fluhr, Robert, and Maor Bar-Peled. Novel Lectin Controls Wound-responses in Arabidopsis. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7697123.bard.

Full text
Abstract:
Innate immune responses in animals and plants involve receptors that recognize microbe-associated molecules. In plants, one set of this defense system is characterized by large families of TIR–nucleotide binding site–leucine-rich repeat (TIR-NBS-LRR) resistance genes. The direct interaction between plant proteins harboring the TIR domain with proteins that transmit and facilitate a signaling pathway has yet to be shown. The Arabidopsis genome encodes TIR-domain containing genes that lack NBS and LRR whose functions are unknown. Here we investigated the functional role of such protein, TLW1 (TIR LECTIN WOUNDRESPONSIVE1). The TLW1 gene encodes a protein with two domains: a TIR domain linked to a lectin-containing domain. Our specific aim in this proposal was to examine the ramifications of the TL1-glycan interaction by; A) The functional characterization of TL1 activity in the context of plant wound response and B) Examine the hypothesis that wounding induced specific polysaccharides and examine them as candidates for TL-1 interactive glycan compounds. The Weizmann group showed TLW1 transcripts are rapidly induced by wounding in a JA-independent pathway and T-DNA-tagged tlw1 mutants that lack TLW1 transcripts, fail to initiate the full systemic wound response. Transcriptome methodology analysis was set up and transcriptome analyses indicates a two-fold reduced level of JA-responsive but not JA-independent transcripts. The TIR domain of TLW1 was found to interact directly with the KAT2/PED1 gene product responsible for the final b-oxidation steps in peroxisomal-basedJA biosynthesis. To identify potential binding target(s) of TL1 in plant wound response, the CCRC group first expressed recombinant TL1 in bacterial cells and optimized conditions for the protein expression. TL1 was most highly expressed in ArcticExpress cell line. Different types of extraction buffers and extraction methods were used to prepare plant extracts for TL1 binding assay. Optimized condition for glycan labeling was determined, and 2-aminobenzamide was used to label plant extracts. Sensitivity of MALDI and LC-MS using standard glycans. THAP (2,4,6- Trihydroxyacetophenone) showed minimal background peaks at positive mode of MALDI, however, it was insensitive with a minimum detection level of 100 ng. Using LC-MS, sensitivity was highly increased enough to detect 30 pmol concentration. However, patterns of total glycans displayed no significant difference between different extraction conditions when samples were separated with Dionex ICS-2000 ion chromatography system. Transgenic plants over-expressing lectin domains were generated to obtain active lectin domain in plant cells. Insertion of the overexpression construct into the plant genome was confirmed by antibiotic selection and genomic DNA PCR. However, RT-PCR analysis was not able to detect increased level of the transcripts. Binding ability of azelaic acid to recombinant TL1. Azelaic acid was detected in GST-TL1 elution fraction, however, DHB matrix has the same mass in background signals, which needs to be further tested on other matrices. The major findings showed the importance of TLW1 in regulating wound response. The findings demonstrate completely novel and unexpected TIR domain interactions and reveal a control nexus and mechanism that contributes to the propagation of wound responses in Arabidopsis. The implications are to our understanding of the function of TIR domains and to the notion that early molecular events occur systemically within minutes of a plant sustaining a wound. A WEB site (http://genome.weizmann.ac.il/hormonometer/) was set up that enables scientists to interact with a collated plant hormone database.
APA, Harvard, Vancouver, ISO, and other styles
9

Perl-Treves, Rafael, Rebecca Grumet, Nurit Katzir, and Jack E. Staub. Ethylene Mediated Regulation of Sex Expression in Cucumis. United States Department of Agriculture, January 2005. http://dx.doi.org/10.32747/2005.7586536.bard.

Full text
Abstract:
Monoecious species such as melon and cucumber develop separate male and female (or bisexual) flowers on the same plant individual. They display complex genetic and hormonal regulation of sex patterns along the plant. Ethylene is known to play an important role in promoting femaleness and inhibiting male development, but many questions regarding critical sites of ethylene production versus perception, the relationship between ethylene and the sex determining loci, and the possible differences between melon and cucumber in this respect are still open. The general goal of the project was to elucidate the role of ethylene in determining flower sex in Cucumis species, melon and cucumber. The specific Objectives were: 1. Clone and characterize expression patterns of cucumber genes involved in ethylene biosynthesis and perception. 2. Genetic mapping of cloned genes and markers with respect to sex loci in melon and cucumber. 3. Produce and analyze transgenic melons altered in ethylene production or perception. In the course of the project, some modifications/adjustments were made: under Objective 2 (genetic mapping) a set of new mapping populations had to be developed, to allow better detection of polymorphism. Under Objective 3, cucumber transformation systems became available to us and we included this second model species in our plan. The main findings of our study support the pivotal role of ethylene in cucumber and melon sex determination and later stages of reproductive development. Modifying ethylene production resulted in profound alteration of sex patterns in melon: femaleness increased, and also flower maturation and fruit set were enhanced, resulting in earlier, more concentrated fruit yield in the field. Such effect was previously unknown and could have agronomic value. Our results also demonstrate the great importance of ethylene sensitivity in sex expression. Ethylene perception genes are expressed in sex-related patterns, e.g., gynoecious lines express higher levels of receptor-transcripts, and copper treatments that activate the receptor can increase femaleness. Transgenic cucumbers with increased expression of an ethylene receptor showed enhanced femaleness. Melons that expressed a defective receptor produced fewer hermaphrodite flowers and were insensitive to exogenous ethylene. When the expression of defective receptor was restricted to specific floral whorls, we saw that pistils were not inhibited by the blocked perception at the fourth whorl. Such unexpected findings suggest an indirect effect of ethylene on the affected whorl; it also points at interesting differences between melon and cucumber regarding the mode of action of ethylene. Such effects will require further study. Finally, our project also generated and tested a set of novel genetic tools for finer identification of sex determining genes in the two species and for efficient breeding for these characters. Populations that will allow easier linkage analysis of candidate genes with each sex locus were developed. Moreover, effects of modifier genes on the major femaleness trait were resolved. QTL analysis of femaleness and related developmental traits was conducted, and a comprehensive set of Near Isogenic Lines that differ in specific QTLs were prepared and made available for the private and public research. Marker assisted selection (MAS) of femaleness and fruit yield components was directly compared with phenotypic selection in field trials, and the relative efficiency of MAS was demonstrated. Such level of genetic resolution and such advanced tools were not used before to study these traits, that act as primary yield components to determine economic yields of cucurbits. In addition, this project resulted in the establishment of workable transformation procedures in our laboratories and these can be further utilized to study the function of sex-related genes in detail.
APA, Harvard, Vancouver, ISO, and other styles
10

Delwiche, Michael, Boaz Zion, Robert BonDurant, Judith Rishpon, Ephraim Maltz, and Miriam Rosenberg. Biosensors for On-Line Measurement of Reproductive Hormones and Milk Proteins to Improve Dairy Herd Management. United States Department of Agriculture, February 2001. http://dx.doi.org/10.32747/2001.7573998.bard.

Full text
Abstract:
The original objectives of this research project were to: (1) develop immunoassays, photometric sensors, and electrochemical sensors for real-time measurement of progesterone and estradiol in milk, (2) develop biosensors for measurement of caseins in milk, and (3) integrate and adapt these sensor technologies to create an automated electronic sensing system for operation in dairy parlors during milking. The overall direction of research was not changed, although the work was expanded to include other milk components such as urea and lactose. A second generation biosensor for on-line measurement of bovine progesterone was designed and tested. Anti-progesterone antibody was coated on small disks of nitrocellulose membrane, which were inserted in the reaction chamber prior to testing, and a real-time assay was developed. The biosensor was designed using micropumps and valves under computer control, and assayed fluid volumes on the order of 1 ml. An automated sampler was designed to draw a test volume of milk from the long milk tube using a 4-way pinch valve. The system could execute a measurement cycle in about 10 min. Progesterone could be measured at concentrations low enough to distinguish luteal-phase from follicular-phase cows. The potential of the sensor to detect actual ovulatory events was compared with standard methods of estrus detection, including human observation and an activity monitor. The biosensor correctly identified all ovulatory events during its testperiod, but the variability at low progesterone concentrations triggered some false positives. Direct on-line measurement and intelligent interpretation of reproductive hormone profiles offers the potential for substantial improvement in reproductive management. A simple potentiometric method for measurement of milk protein was developed and tested. The method was based on the fact that proteins bind iodine. When proteins are added to a solution of the redox couple iodine/iodide (I-I2), the concentration of free iodine is changed and, as a consequence, the potential between two electrodes immersed in the solution is changed. The method worked well with analytical casein solutions and accurately measured concentrations of analytical caseins added to fresh milk. When tested with actual milk samples, the correlation between the sensor readings and the reference lab results (of both total proteins and casein content) was inferior to that of analytical casein. A number of different technologies were explored for the analysis of milk urea, and a manometric technique was selected for the final design. In the new sensor, urea in the sample was hydrolyzed to ammonium and carbonate by the enzyme urease, and subsequent shaking of the sample with citric acid in a sealed cell allowed urea to be estimated as a change in partial pressure of carbon dioxide. The pressure change in the cell was measured with a miniature piezoresistive pressure sensor, and effects of background dissolved gases and vapor pressures were corrected for by repeating the measurement of pressure developed in the sample without the addition of urease. Results were accurate in the physiological range of milk, the assay was faster than the typical milking period, and no toxic reagents were required. A sampling device was designed and built to passively draw milk from the long milk tube in the parlor. An electrochemical sensor for lactose was developed starting with a three-cascaded-enzyme sensor, evolving into two enzymes and CO2[Fe (CN)6] as a mediator, and then into a microflow injection system using poly-osmium modified screen-printed electrodes. The sensor was designed to serve multiple milking positions, using a manifold valve, a sampling valve, and two pumps. Disposable screen-printed electrodes with enzymatic membranes were used. The sensor was optimized for electrode coating components, flow rate, pH, and sample size, and the results correlated well (r2= 0.967) with known lactose concentrations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography