Genome-wide association studies (GWAS) have identified genetic variants at 34 loci contributing to age-related macular degeneration (AMD)1,2,3. We generated transcriptional profiles of postmortem retinas from 453 cont...
详细信息
Genome-wide association studies (GWAS) have identified genetic variants at 34 loci contributing to age-related macular degeneration (AMD)1,2,3. We generated transcriptional profiles of postmortem retinas from 453 controls and cases at distinct stages of AMD and integrated retinal transcriptomes, covering 13,662 protein-coding and 1,462 noncoding genes, with genotypes at more than 9 million common SNPs for expression quantitative trait loci (eQTL) analysis of a tissue not included in Genotype-Tissue Expression (GTEx) and other large datasets4,5. Cis-eQTL analysis identified 10,474 genes under genetic regulation, including 4,541 eQTLs detected only in the retina. Integrated analysis of AMD-GWAS with eQTLs ascertained likely target genes at six reported loci. Using transcriptome-wide association analysis (TWAS), we identified three additional genes, RLBP1, HIC1 and PARP12, after Bonferroni correction. Our studies expand the genetic landscape of AMD and establish the Eye Genotype Expression (EyeGEx) database as a resource for post-GWAS interpretation of multifactorial ocular traits.
Cloud Computing is a current technology used to store large volume of data with minimal cost. Security is a challenging task of cloud computing. Nowadays, data owners are interested to know about the security level of...
详细信息
ISBN:
(纸本)9781538615096
Cloud Computing is a current technology used to store large volume of data with minimal cost. Security is a challenging task of cloud computing. Nowadays, data owners are interested to know about the security level of their data and also transferred their data to another organization for performing different tasks. An existing security technique offered security to complete data with high encryption / decryption time, storage cost and also provides less security to the sensitive attributes without the knowledge of data owner and other organization admin's. To provide a trade-off between high security and low storage cost. the sensitive attributes are identified from entire data and security is applied to sensitive attributes instead of the complete data. In the proposed method, the security mechanisms are applied to sensitive attributes with the knowledge of data owner's and inter-organization admin. Hence, security of sensitive attributes is to be increased with minimal storage cost. High security is demanded by Enhanced Elliptic Curve Cryptography (EECC) algorithm. Elliptic Curve Cryptography yields better security through random keys, but true random key generation is a challenging task. EECC algorithm merged the pseudo random key with data owner private key and specific organization admin key. Compared to ECC algorithm EECC offers better security with the knowledge of customer and other organization admin.
Introduction: This paper introduces a fast method to evaluate the effect of payload distribution on in-train forces. Methods: The method is based on Strong Orthogonal Arrays (SOA) and the excellent space-filling prope...
详细信息
In this paper, a novel relay selection scheme based on Ant Colony optimization (ACO) is formulated to enhance the secrecy of dual hop decode-and-forward (DF) cooperative relay networks in the presence of a passive eav...
详细信息
In this paper, a novel relay selection scheme based on Ant Colony optimization (ACO) is formulated to enhance the secrecy of dual hop decode-and-forward (DF) cooperative relay networks in the presence of a passive eavesdropper. According to the probability of path selection in ACO, a path is selected based on the significance of channel gain (G) and fading coefficients (h). The algorithm has the flexibility of choosing the best relay in the following wireless scenarios, when (i) both channel gain and fading coefficients are significant (ii) only fading coefficients are significant and (iii) only channel gain is significant. A practical scenario where the channels undergo independent non-identical Rayleigh fading, and direct links exist between source to destination (S-D) and source to eavesdropper (S-E) is considered. The performance is evaluated based on secrecy rate (R S ) for the case of randomly distributed relays and for any eavesdropper location. Analysis is done for both partial relay selection (PRS) and best relay selection (BRS) schemes. The effect of relay nodes on secrecy capacity is also analyzed. Numerical results show the performance of the proposed scheme in different wireless scenarios in comparison to traditional relay selection scheme.
To further improve the quality of ontology alignment, it is necessary for an ontology matcher to introduce a user’s knowledge into its automatic matching process, which yields the development of interactive ontology ...
详细信息
作者:
R. KrithigaE. IlavarasanAssistant Professor
Department of Computer Applications Perunthalaivar Kamaraj Arts College Puducherry Professor
Department of Computer Science & Engineering Pondicherry Engineering College Puducherry
Social networks have grown into a popular way for internet surfers to interact with friends in addition to family members, reading news, and also discuss events. Users spend more time on popular social platforms (e.g....
Social networks have grown into a popular way for internet surfers to interact with friends in addition to family members, reading news, and also discuss events. Users spend more time on popular social platforms (e.g., Facebook, Twitter, etc.) storing and sharing their personal information. This fact together with the prospect of communicating thousands of users fascinates the concentration of malicious users. They exploit the implicit trust interactions concerning users with the purpose of accomplishing their malicious objectives, for instance, create malicious links inside the posts/tweets, spread fake news, send out unsolicited messages to genuine users and so on. In this paper, we reviewed various existing techniques on spam profile detection in online social networks.
Cooperative relaying and cooperative jamming have been used to improve the secrecy of wireless networks. In this paper, Artificial Noise (AN) based secrecy enhancement of a dual-hop wireless network consisting of `n...
详细信息
Cooperative relaying and cooperative jamming have been used to improve the secrecy of wireless networks. In this paper, Artificial Noise (AN) based secrecy enhancement of a dual-hop wireless network consisting of `n' amplify-and-forward (AF) relays in the presence of a passive eavesdropper (E) is studied. A practical setting where direct links exist between source-destination (S-D) and source-eavesdropper (S-E) is considered. The source allocates some of its available power to transmit AN in order to confuse the eavesdropper and thereby degrades its channel. The optimum power allocation factor (a) and maximum secrecy rate are estimated analytically and by simulation. The performance is evaluated based on secrecy rate (Rs) and bit error rate (BER); for the case of randomly distributed relays and for any eavesdropper location. Numerical results show the improvement of the proposed cooperative scheme over other schemes.
This paper proposes a human body motion capturing system using the depth images. It consists of three processes to estimate the human pose parameters. First, we develop a pixel-based body part classifier to segment th...
详细信息
This paper proposes a human body motion capturing system using the depth images. It consists of three processes to estimate the human pose parameters. First, we develop a pixel-based body part classifier to segment the human silhouette into different body part sub-regions and extract the primary joints. Second, we convert the distribution of the joints to the feature vector and apply the regression forest to estimate human pose parameters. Third, we apply the temporal constraints mechanism to find the best human pose parameter with the minimum estimation error. In experiments, we show that our system can operate in real-time with sufficient accuracy.
暂无评论