In complete metric spaces, the common fixed point theorems for sequences of φ-type contraction set-valued mappings are established, and the corresponding random com- mon fixed point theorems for set-valued mappings a...In complete metric spaces, the common fixed point theorems for sequences of φ-type contraction set-valued mappings are established, and the corresponding random com- mon fixed point theorems for set-valued mappings are also obtained.展开更多
This paper gives internal characterizations of some sequence covering compact images and compact covering compact images of paracompact locally compact spaces, which improve some results on compact images of locally...This paper gives internal characterizations of some sequence covering compact images and compact covering compact images of paracompact locally compact spaces, which improve some results on compact images of locally compact metric spaces.展开更多
The purpose is by using the viscosity approximation method to study the convergence problem of the iterative scheme for an infinite family of nonexpansive mappings and a given contractive mapping in a reflexive Banach...The purpose is by using the viscosity approximation method to study the convergence problem of the iterative scheme for an infinite family of nonexpansive mappings and a given contractive mapping in a reflexive Banach space. Under suitable conditions, it was proved that the iterative sequence converges strongly to a common fixed point which was also the unique solution of some variational inequality in a reflexive Banach space. The results presented extend and improve some recent results.展开更多
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a...Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.展开更多
Genome assembly is a fundamental step in decoding the genetic information of life.Its significance lies in constructing a complete DNA sequence map of organisms,providing the foundation for elucidating the mechanisms ...Genome assembly is a fundamental step in decoding the genetic information of life.Its significance lies in constructing a complete DNA sequence map of organisms,providing the foundation for elucidating the mechanisms of species evolution,exploring gene functions,and identifying disease-related variations.However,some of the repetitive DNA sequences remain“dark materials”in the genome as they are difficult to reveal by the second-generation sequencing approaches.In recent years,breakthroughs in third-generation sequencing technologies have significantly improved the accuracy and continuity of genome assemblies,therefore,being able to resolve the“last piece of the puzzle”in the genome.展开更多
Maize(Zea mays) root system architecture(RSA)mediates the key functions of plant anchorage and acquisition of nutrients and water. In this study,a set of 204 recombinant inbred lines(RILs) was derived from the w...Maize(Zea mays) root system architecture(RSA)mediates the key functions of plant anchorage and acquisition of nutrients and water. In this study,a set of 204 recombinant inbred lines(RILs) was derived from the widely adapted Chinese hybrid ZD958(Zheng58 Chang7-2),genotyped by sequencing(GBS) and evaluated as seedlings for 24 RSA related traits divided into primary,seminal and total root classes. Signi ficant differences between the means of the parental phenotypes were detected for 18 traits,and extensive transgressive segregation in the RIL population was observed for all traits. Moderate to strong relationships among the traits were discovered. A total of 62 quantitative trait loci(QTL) were identi fied that individually explained from1.6% to 11.6%(total root dry weight/total seedling shoot dry weight) of the phenotypic variation. Eighteen,24 and 20 QTL were identi fied for primary,seminal and total root classes of traits,respectively. We found hotspots of 5,3,4 and 12 QTL in maize chromosome bins 2.06,3.02-03,9.02-04,and 9.05-06,respectively,implicating the presence of root gene clusters or pleiotropic effects. These results characterized the phenotypic variation and genetic architecture of seedling RSA in a population derived from a successful maize hybrid.展开更多
Protein trafficking or protein sorting in eukaryotes is a complicated process and is carried out based on the information contaified in the protein. Many methods reported prediction of the subcellular location of prot...Protein trafficking or protein sorting in eukaryotes is a complicated process and is carried out based on the information contaified in the protein. Many methods reported prediction of the subcellular location of proteins from sequence information. However, most of these prediction methods use a flat structure or parallel architecture to perform prediction. In this work, we introduce ensemble classifiers with features that are extracted directly from full length protein sequences to predict locations in the protein-sorting pathway hierarchically. Sequence driven features, sequence mapped features and sequence autocorrelation features were tested with ensemble learners and their performances were compared. When evaluated by independent data testing, ensemble based-bagging algorithms with sequence feature composition, transition and distribution (CTD) successfully classified two datasets with accuracies greater than 90%. We compared our results with similar published methods, and our method equally performed with the others at two levels in the secreted pathway. This study shows that the feature CTD extracted from protein sequences is effective in capturing biological features among compartments in secreted pathways.展开更多
A starting point of curating bioinformatic resources for the public is marked by the establishment of the US National Center for Biotechnology Information(NCBI)in 1988[1].One of its many purposes is certainly to ech...A starting point of curating bioinformatic resources for the public is marked by the establishment of the US National Center for Biotechnology Information(NCBI)in 1988[1].One of its many purposes is certainly to echo the initiative of the Human Genome Project(HGP)––when two landmark reports were published at the same time:‘‘Mapping and Sequencing the Human Genome’’by the National Research Council[2]and‘‘Mapping Our Genes––The Genome Project:How Big,How Fast?’’by the US Congress[3].展开更多
基金Foundation item: Supported by the Science Foundation from the Ministry of Education of Jiangsu Province(04KJD110168, 06KJBll0107)
文摘In complete metric spaces, the common fixed point theorems for sequences of φ-type contraction set-valued mappings are established, and the corresponding random com- mon fixed point theorems for set-valued mappings are also obtained.
文摘This paper gives internal characterizations of some sequence covering compact images and compact covering compact images of paracompact locally compact spaces, which improve some results on compact images of locally compact metric spaces.
基金the Natural Science Foundation of Yibin University (No.2005Z3)
文摘The purpose is by using the viscosity approximation method to study the convergence problem of the iterative scheme for an infinite family of nonexpansive mappings and a given contractive mapping in a reflexive Banach space. Under suitable conditions, it was proved that the iterative sequence converges strongly to a common fixed point which was also the unique solution of some variational inequality in a reflexive Banach space. The results presented extend and improve some recent results.
文摘Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.
基金supported by the National Natural Science Foundation of China(32090034)Zhejiang Provincial Natural Science Foundation of China(2022XHSJJ001)+3 种基金Hangzhou City Leading Innovation and Entrepreneurship Team(TD2020004)“Pioneer”and“Leading Goose”Research and Development Program of Zhejiang(2024SSYS0033)Westlake Education FoundationWestlake Laboratory of Life Sciences and Biomedicine.
文摘Genome assembly is a fundamental step in decoding the genetic information of life.Its significance lies in constructing a complete DNA sequence map of organisms,providing the foundation for elucidating the mechanisms of species evolution,exploring gene functions,and identifying disease-related variations.However,some of the repetitive DNA sequences remain“dark materials”in the genome as they are difficult to reveal by the second-generation sequencing approaches.In recent years,breakthroughs in third-generation sequencing technologies have significantly improved the accuracy and continuity of genome assemblies,therefore,being able to resolve the“last piece of the puzzle”in the genome.
基金supported by 863 Project (2012AA10A305)Chinese Universities Scientific Fund (2014XJ036)+1 种基金NSF (31301321)948 Project (2011-G15)
文摘Maize(Zea mays) root system architecture(RSA)mediates the key functions of plant anchorage and acquisition of nutrients and water. In this study,a set of 204 recombinant inbred lines(RILs) was derived from the widely adapted Chinese hybrid ZD958(Zheng58 Chang7-2),genotyped by sequencing(GBS) and evaluated as seedlings for 24 RSA related traits divided into primary,seminal and total root classes. Signi ficant differences between the means of the parental phenotypes were detected for 18 traits,and extensive transgressive segregation in the RIL population was observed for all traits. Moderate to strong relationships among the traits were discovered. A total of 62 quantitative trait loci(QTL) were identi fied that individually explained from1.6% to 11.6%(total root dry weight/total seedling shoot dry weight) of the phenotypic variation. Eighteen,24 and 20 QTL were identi fied for primary,seminal and total root classes of traits,respectively. We found hotspots of 5,3,4 and 12 QTL in maize chromosome bins 2.06,3.02-03,9.02-04,and 9.05-06,respectively,implicating the presence of root gene clusters or pleiotropic effects. These results characterized the phenotypic variation and genetic architecture of seedling RSA in a population derived from a successful maize hybrid.
文摘Protein trafficking or protein sorting in eukaryotes is a complicated process and is carried out based on the information contaified in the protein. Many methods reported prediction of the subcellular location of proteins from sequence information. However, most of these prediction methods use a flat structure or parallel architecture to perform prediction. In this work, we introduce ensemble classifiers with features that are extracted directly from full length protein sequences to predict locations in the protein-sorting pathway hierarchically. Sequence driven features, sequence mapped features and sequence autocorrelation features were tested with ensemble learners and their performances were compared. When evaluated by independent data testing, ensemble based-bagging algorithms with sequence feature composition, transition and distribution (CTD) successfully classified two datasets with accuracies greater than 90%. We compared our results with similar published methods, and our method equally performed with the others at two levels in the secreted pathway. This study shows that the feature CTD extracted from protein sequences is effective in capturing biological features among compartments in secreted pathways.
基金supported by the National High-tech R&D Program of China (863 Program Grant Nos: 2012AA020402 and 2012AA02A202)
文摘A starting point of curating bioinformatic resources for the public is marked by the establishment of the US National Center for Biotechnology Information(NCBI)in 1988[1].One of its many purposes is certainly to echo the initiative of the Human Genome Project(HGP)––when two landmark reports were published at the same time:‘‘Mapping and Sequencing the Human Genome’’by the National Research Council[2]and‘‘Mapping Our Genes––The Genome Project:How Big,How Fast?’’by the US Congress[3].