Learn More
In this paper, we predicted UV-responding microRNAs in wine grape genome by homolog search based computational approach. We successfully predicted 13 grape microRMAs from total 16 query Ath-microRNAs. The MiPred software prediction results, the stem-loop structure feature analysis and pol IIpromoter prediction results showed that these 13 putative microRNAs(More)
Rapid adoption of next generation sequencing (NGS) in genomic medicine has been driven by low cost, high throughput sequencing and rapid advances in our understanding of the genetic bases of human diseases. Today, the NGS method has dominated sequencing space in genomic research, and quickly entered clinical practice. Because unique features of NGS(More)
In this work, mixed-mode silica particles functionalized with octyl and sulfonic acid groups was conveniently prepared by co-bonding a mixture of n-octyltriethoxysilane and 3-mercaptopropyltriethoxysilane and then oxidized with hydrogen peroxide. Candida rugosa lipase (CRL) was immobilized on the mixed-mode silica particles via hydrophobic and strong(More)
Epistasis is one of the central themes in viral evolution due to its importance in drug resistance, immune escape, and interspecies transmission. However, there is a lack of experimental approach to systematically probe for epistatic residues. By utilizing the information from natural occurring sequences and high-throughput genetics, this study established(More)
Near-infrared spectroscopy (NIRS), a rapid and efficient tool, was used to determine the total amount of nine ginsenosides in Panax ginseng. In the study, the regression models were established using multivariate regression methods with the results from conventional chemical analytical methods as reference values. The multivariate regression methods,(More)
A novel switched state feedback controller is proposed to stabilize the networked control system (NCS) with disturbance, time delay and packet dropout. For the NCS wherein time delay is less than one sampling period, between k-1 sampling periods and k sampling periods (k is a integer greater than or equal to two), design procedures of the state feedback(More)
This paper presents a framework to analyze the security of data transmission protocols in wireless sensor network. This framework defines three attack models in terms of the adversary's attacking ability, and provides an ideal model to verify whether a given protocol is secure or not under these three different attack models. Furthermore, we give a formal(More)