DNA extraction from degraded skeletal samples is often particularly challenging. The difficulty derives from the fact that variable environment has a significant effect on DNA preservation. During the years 2002-2015 ...DNA extraction from degraded skeletal samples is often particularly challenging. The difficulty derives from the fact that variable environment has a significant effect on DNA preservation. During the years 2002-2015 unidentified degraded skeletal remains were accumulated at our institute, National Institute of Forensic Medicine (NIFM), most of them with none or partial DNA profile. As new methods rapidly emerge, we revisited these samples with partial DNA profiles in the hope to add additional alleles and eventually be able to identify these previously unidentifiable samples. We have chosen to use these samples to compare two automated methods: Prepfiler Express BTA (Applied Biosystems) and QIAcube (Quiagen), in hope of acquiring a more complete DNA profile and eventually make new identifications possibly comparing these profiles with missing person database. In both methods, a preparation step is required, after which the samples undergo automatic DNA extraction. The two protocols are based on different extraction methods. Fresh or non-problematic bone samples as the positive control gave the same results in both methods. In the degraded skeletal samples, the results were significantly better using the QIAcube method in our hands, but since degraded samples are highly variable the combination of both methods could be useful to receive better and more reliable profiles.展开更多
Based on analyzing the techniques and architecture of existing network Intrusion Detection System(IDS),and probing into the fundament of Immune System(IS),a novel immune model is presented and applied to network IDS,w...Based on analyzing the techniques and architecture of existing network Intrusion Detection System(IDS),and probing into the fundament of Immune System(IS),a novel immune model is presented and applied to network IDS,which is helpful to design an effective IDS.Besides,this paper suggests a scheme to represent the self profile of network.And an automated self profile extraction algorithm is provided to extract self profile from packets.The experimental results prove validity of the scheme and algorithm,which is the foundation of the immune model.展开更多
A rapid,sensitive,and cost-effective analyticalmethod was developed for the analysis of selected semivolatileorganic compounds in water.The method used anautomated online solid-phase extraction technique coupledwith p...A rapid,sensitive,and cost-effective analyticalmethod was developed for the analysis of selected semivolatileorganic compounds in water.The method used anautomated online solid-phase extraction technique coupledwith programmed-temperature vaporization large-volumeinjection gas chromatography/mass spectrometry.Thewater samples were extracted by using a fully automatedmobile rack system based on x-y-z robotic techniquesusing syringes and disposable 96-well extraction plates.The method was validated for the analysis of 30 semivolatileanalytes in drinking water,groundwater,andsurface water.For a sample volume of 10 mL,the linearcalibrations ranged from 0.01 or 0.05 to 2.5μg·L^(-1),and themethod detection limits were less than 0.1μg·L^(-1).For thereagent water samples fortified at 1.0μg·L^(-1)and2.0μg·L^(-1),the obtained mean absolute recoveries were70%-130%with relative standard deviations of less than20%for most analytes.For the drinking water,groundwater,and surface water samples fortified at 1.0μg·L^(-1),theobtained mean absolute recoveries were 50%-130%withrelative standard deviations of less than 20%for mostanalytes.The new method demonstrated three advantages:1)no manipulation except the fortification of surrogatestandards prior to extraction;2)significant cost reductionassociated with sample collection,shipping,storage,andpreparation;and 3)reduced exposure to hazardous solventsand other chemicals.As a result,this new automatedmethod can be used as an effective approach for screeningand/or compliance monitoring of selected semi-volatileorganic compounds in water.展开更多
Sexual assault evidence often contains sperm cells,which are typically separated from nonsperm cells using manual differential lysis procedures.The goal of this study was to evaluate the automated QIAGEN QIAcube for t...Sexual assault evidence often contains sperm cells,which are typically separated from nonsperm cells using manual differential lysis procedures.The goal of this study was to evaluate the automated QIAGEN QIAcube for this purpose and to compare it to manual QIAGEN and manual organic differential methods using DNA yields and STR profile data for assessment.DNA yields were determined by qPCR,followed by multiplex STR amplification,CE analysis,and mixture interpretation.The automated method was capable of effective cell separation,producing DNA yields sufficient for STR amplification.Further,sperm fraction human:male DNA ratios from the QIAcube samples were consistently closer to the desired 1:1 and STR profiles were less likely to result in mixtures,with 6–8fewer female alleles detected(median 1.5 alleles).Ultimately,using the QIAcube for automated differential processing of semen-containing mixtures reduces the need for downstream mixture interpretation and improves STR profile quality with substantially less hands-on time.展开更多
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
文摘DNA extraction from degraded skeletal samples is often particularly challenging. The difficulty derives from the fact that variable environment has a significant effect on DNA preservation. During the years 2002-2015 unidentified degraded skeletal remains were accumulated at our institute, National Institute of Forensic Medicine (NIFM), most of them with none or partial DNA profile. As new methods rapidly emerge, we revisited these samples with partial DNA profiles in the hope to add additional alleles and eventually be able to identify these previously unidentifiable samples. We have chosen to use these samples to compare two automated methods: Prepfiler Express BTA (Applied Biosystems) and QIAcube (Quiagen), in hope of acquiring a more complete DNA profile and eventually make new identifications possibly comparing these profiles with missing person database. In both methods, a preparation step is required, after which the samples undergo automatic DNA extraction. The two protocols are based on different extraction methods. Fresh or non-problematic bone samples as the positive control gave the same results in both methods. In the degraded skeletal samples, the results were significantly better using the QIAcube method in our hands, but since degraded samples are highly variable the combination of both methods could be useful to receive better and more reliable profiles.
基金the National Natural Science Foundation of China(69983005)the Research Fund for the Doctoral Program of Higher Education(RFDP1999048602)
文摘Based on analyzing the techniques and architecture of existing network Intrusion Detection System(IDS),and probing into the fundament of Immune System(IS),a novel immune model is presented and applied to network IDS,which is helpful to design an effective IDS.Besides,this paper suggests a scheme to represent the self profile of network.And an automated self profile extraction algorithm is provided to extract self profile from packets.The experimental results prove validity of the scheme and algorithm,which is the foundation of the immune model.
基金The authors thank LEAP Technologies(Carrboro,NC,USA)for providing the technical support of the automated solid-phase extraction system.
文摘A rapid,sensitive,and cost-effective analyticalmethod was developed for the analysis of selected semivolatileorganic compounds in water.The method used anautomated online solid-phase extraction technique coupledwith programmed-temperature vaporization large-volumeinjection gas chromatography/mass spectrometry.Thewater samples were extracted by using a fully automatedmobile rack system based on x-y-z robotic techniquesusing syringes and disposable 96-well extraction plates.The method was validated for the analysis of 30 semivolatileanalytes in drinking water,groundwater,andsurface water.For a sample volume of 10 mL,the linearcalibrations ranged from 0.01 or 0.05 to 2.5μg·L^(-1),and themethod detection limits were less than 0.1μg·L^(-1).For thereagent water samples fortified at 1.0μg·L^(-1)and2.0μg·L^(-1),the obtained mean absolute recoveries were70%-130%with relative standard deviations of less than20%for most analytes.For the drinking water,groundwater,and surface water samples fortified at 1.0μg·L^(-1),theobtained mean absolute recoveries were 50%-130%withrelative standard deviations of less than 20%for mostanalytes.The new method demonstrated three advantages:1)no manipulation except the fortification of surrogatestandards prior to extraction;2)significant cost reductionassociated with sample collection,shipping,storage,andpreparation;and 3)reduced exposure to hazardous solventsand other chemicals.As a result,this new automatedmethod can be used as an effective approach for screeningand/or compliance monitoring of selected semi-volatileorganic compounds in water.
文摘Sexual assault evidence often contains sperm cells,which are typically separated from nonsperm cells using manual differential lysis procedures.The goal of this study was to evaluate the automated QIAGEN QIAcube for this purpose and to compare it to manual QIAGEN and manual organic differential methods using DNA yields and STR profile data for assessment.DNA yields were determined by qPCR,followed by multiplex STR amplification,CE analysis,and mixture interpretation.The automated method was capable of effective cell separation,producing DNA yields sufficient for STR amplification.Further,sperm fraction human:male DNA ratios from the QIAcube samples were consistently closer to the desired 1:1 and STR profiles were less likely to result in mixtures,with 6–8fewer female alleles detected(median 1.5 alleles).Ultimately,using the QIAcube for automated differential processing of semen-containing mixtures reduces the need for downstream mixture interpretation and improves STR profile quality with substantially less hands-on time.
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.