Search results for "coding"
showing 10 items of 920 documents
Polymorphisms of beta-lactoglobulin promoter region in three Sicilian goat breeds
2012
Several beta-lactoglobulin (BLG) polymorphisms have been described within the proximal promoter region and coding region of the caprine gene, although no genetic variants affecting the protein amino acid composition and/or expression level have been characterized so far. Binding sites for several transcription factors (TFs) are present in the BLG promoter region. The aims of this work were to sequence the full-length promoter region of three Sicilian goat breeds in order to identify polymorphisms, analyze the identified haplotypes, search for differences between breeds for the presence of polymorphisms in this gene region, search for putative TFs binding sites, and check if polymorphisms la…
Protein Interactions within the Set1 Complex and Their Roles in the Regulation of Histone 3 Lysine 4 Methylation
2006
Set1 is the catalytic subunit and the central component of the evolutionarily conserved Set1 complex (Set1C) that methylates histone 3 lysine 4 (H3K4). Here we have determined protein/protein interactions within the complex and related the substructure to function. The loss of individual Set1C subunits differentially affects Set1 stability, complex integrity, global H3K4 methylation, and distribution of H3K4 methylation along active genes. The complex requires Set1, Swd1, and Swd3 for integrity, and Set1 amount is greatly reduced in the absence of the Swd1-Swd3 heterodimer. Bre2 and Sdc1 also form a heteromeric subunit, which requires the SET domain for interaction with the complex, and Sdc…
Reducing Overhearing Energy in Wake-Up Radio-Enabled WPANs: Scheme and Performance
2018
Wake-up Radio (WuR)-enabled wireless personal area networks (WPANs) are more popular over conventional WPANs thanks to WuR's on-demand transmission feature and overwhelming energy consumption superiority. In a WuRenabled WPAN, overhearing occurs when a wake-up receiver decodes and validates the address of a wake-up call which is not intended to it. However, such overhearing consumes a portion of the required reception energy for unintended nodes. To diminish overhearing thus conserve total reception energy in a network, we propose a bit-by-bit address decoding (BBAD) scheme and compare it with another addressing scheme for WuR that uses a micro-controller unit to decode and match the whole …
Analyzing the Contextual Nature of Collaborative Activity
2010
This chapter discusses a methodology designed to explore the contextual nature of collaborative activity. The methods that can be generally considered to be based on ‘socio-cultural’ discourse analysis are discussed as a means to explore how different aspects of a situation mediate students’ shared meaning-making. First, an analysis is demonstrated, illustrating how different immediate and mediated contexts are embedded in students’ discourse as they are engaged in face-to-face collaborative activity in a computer-mediated context. Second, a multidimensional coding scheme is presented for analyzing the contextualized process of collaborative knowledge construction in an asynchronous web-ba…
DNA traces the origin of honey by identifying plants, bacteria and fungi
2021
The regional origin of a food product commonly affects its value. To this, DNA-based identification of tissue remains could offer fine resolution. For honey, this would allow the usage of not only pollen but all plant tissue, and also that of microbes in the product, for discerning the origin. Here we examined how plant, bacterial and fungal taxa identified by DNA metabarcoding and metagenomics differentiate between honey samples from three neighbouring countries. To establish how the taxonomic contents of honey reflect the country of origin, we used joint species distribution modelling. At the lowest taxonomic level by metabarcoding, with operational taxonomic units, the country of origin …
Toward a model for students’ combinatorial thinking
2021
Abstract Combinatorics has many applications in different disciplines, however, only a few studies have explored students’ combinatorial thinking at the upper secondary and tertiary levels concurrently. The present research is a grounded theory study of eight Year 12 and five undergraduate students, who have participated in semi-structured interviews and responded to eight combinatorial tasks. Three types of combinatorial tasks were designed: combinatorial reasoning, evaluating, and problem-posing tasks. In the open coding phase of data analysis, seventy-one codes were identified which categorized into seven main categories at the axial coding phase. At the selective coding phase, five rela…
Threats to validity when using open-ended items in international achievement studies : Coding responses to the PISA 2012 problem-solving test in Finl…
2015
Open-ended (OE) items are widely used to gather data on student performance in international achievement studies. However, several factors may threaten validity when using such items. This study examined Finnish coders’ opinions about threats to validity when coding responses to OE items in the PISA 2012 problem-solving test. A total of 6 discussions during 6 coder practice sessions (on 6 OE items) and an interview between 5 coders were audiorecorded and analyzed by means of content analysis, and 3 main threats to validity were found: (1) unclear and complex questions; (2) arbitrary and illogical coding rubrics; and (3) unclear and ambiguous responses. Suggestions are given as to how to res…
Prior precision modulates the minimisation of prediction error in human auditory cortex
2018
AbstractThe predictive coding model of perception proposes that successful representation of the perceptual world depends upon cancelling out the discrepancy between prediction and sensory input (i.e., prediction error). Recent studies further suggest a distinction between prediction error associated with non-predicted stimuli of different prior precision (i.e., inverse variance). However, it is not fully understood how prediction error from different precision levels is minimised in the predictive process. The current research used magnetoencephalography (MEG) to examine whether prior precision modulates the cortical dynamics of the making of perceptual inferences. We presented participant…
A Geometric Algebra Based Distributional Model to Encode Sentences Semantics
2013
Word space models are used to encode the semantics of natural language elements by means of high dimensional vectors [23]. Latent Semantic Analysis (LSA) methodology [15] is well known and widely used for its generalization properties. Despite of its good performance in several applications, the model induced by LSA ignores dynamic changes in sentences meaning that depend on the order of the words, because it is based on a bag of words analysis. In this chapter we present a technique that exploits LSA-based semantic spaces and geometric algebra in order to obtain a sub-symbolic encoding of sentences taking into account the words sequence in the sentence. © 2014 Springer-Verlag Berlin Heidel…
Lightweight algorithms for constructing and inverting the BWT of string collections
2013
Recent progress in the field of \{DNA\} sequencing motivates us to consider the problem of computing the Burrows‚ÄìWheeler transform (BWT) of a collection of strings. A human genome sequencing experiment might yield a billion or more sequences, each 100 characters in length. Such a dataset can now be generated in just a few days on a single sequencing machine. Many algorithms and data structures for compression and indexing of text have the \{BWT\} at their heart, and it would be of great interest to explore their applications to sequence collections such as these. However, computing the \{BWT\} for 100 billion characters or more of data remains a computational challenge. In this work we ad…