2,584 research outputs found

    Aspergillus westerdijkiae polyketide synthase gene “aoks1” is involved in the biosynthesis of ochratoxin A

    Get PDF
    OchratoxinA (OTA) is a potential nephrotoxic, teratogenic, immunogenic, hepatotoxic and carcinogenic mycotoxin, produced by Aspergillus westerdijkiae NRRL 3174. Herein we describe the characterization of a putative OTA-polyketide synthasegene “aoks1”, cloned by using gene walking approach. The predicted amino acid sequence of the 2 kb clone display 34–60% similarities to different polyketide synthasegenes including lovastatine biosynthesis gene “lovb” in A. terreus, compactin biosynthesis gene “mlcA” in Penicillium citrinum and OTA biosynthesis gene “otapksPN” in P. nordicum. Based on the reverse transcription PCR and kinetic secondary metabolites production studies, aoks1 expression was found to be associated with OTA biosynthesis. Further a mutant, in which the aoks1gene was inactivated by Escherichia coli hygromycin B phosphotransferase gene, lost the capacity to produce OTA, but still producing mellein. To our knowledge this report describes for the first time characterization of a gene involved in OTA biosynthesis, with the information about mellein which was proposed in the literature to be an intermediate OTA. This study also suggests that aoks1 may be the second polyketide synthase gene required for OTA biosynthesis in A. westerdijkiae NRRL 3174

    Fluctuations in canal water supplies: a case study

    Get PDF
    Irrigation management / Water allocation / Canals / Water distribution / Water supply / Performance evaluation / Irrigated farming / Irrigation systems / Pakistan / Chishtian Sub-Division / Fordwah Distributary

    India should reconsider its decision not to participate in the belt and road initiative

    Get PDF
    Following India’s decision not to attend the Belt and Road Initiative Conference in Beijing last month, Nafees Ahmad discusses the objections which may have motivated the boycott. He writes that in spite of its reservations, India would be well advised to engage with BRI as it stands to gain more by participating, despite the tensions in its bilateral relationship with China

    Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities)

    Get PDF
    There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities. Many vulnerabilities are caused by software errors that are created by software developers. Insecure software development practices are common due to a variety of factors, which include inefficiencies within existing knowledge transfer mechanisms based on vulnerability databases (VDBs), software developers perceiving security as an afterthought, and lack of consideration of security as part of the software development lifecycle (SDLC). The resulting communication gap also prevents developers and security experts from successfully sharing essential security knowledge. The cybersecurity community makes their expert knowledge available in forms including vulnerability databases such as CAPEC and CWE, and pattern catalogues such as Security Patterns, Attack Patterns, and Software Fault Patterns. However, these sources are not effective at providing software developers with an understanding of how malicious hackers can exploit vulnerabilities in the software systems they create. As developers are familiar with pattern-based approaches, this paper proposes the use of Vulnerability Anti-Patterns (VAP) to transfer usable vulnerability knowledge to developers, bridging the communication gap between security experts and software developers. The primary contribution of this paper is twofold: (1) it proposes a new pattern template – Vulnerability Anti-Pattern – that uses anti-patterns rather than patterns to capture and communicate knowledge of existing vulnerabilities, and (2) it proposes a catalogue of Vulnerability Anti-Patterns (VAP) based on the most commonly occurring vulnerabilities that software developers can use to learn how malicious hackers can exploit errors in software

    Stewardship in health policy and its relevance to Pakistan

    Get PDF
    Since the concept of stewardship in health care first appeared in World Health Report 2000 there has been very limited discussion in the academia about its implications. In the present paper we revisit this concept and review the literature that has been written about it. We have particularly focused on the role of stewardship in health policy of Pakistan. We also highlight the improvement that stewardship can bring about in the health policy of Pakistan and the possible constraints that might be faced during its implementation phase. The literature available is on the concept of stewardship in health policy. The search was done through the database of PubMed with key words including; stewardship, health policy, governance, and role of state. A total of 22 articles were shortlisted and included in the review. The concept of stewardship has a lot of potential to reinterpret and reinvigorate the role of the state in Public Health of nations across the globe, including Pakistan

    Optimal-Dimensionality Sampling on the Sphere: Improvements and Variations

    Get PDF
    For the accurate representation and reconstruction of band-limited signals on the sphere, an optimal-dimensionality sampling scheme has been recently proposed which requires the optimal number of samples equal to the number of degrees of freedom of the signal in the spectral (harmonic) domain. The computation of the spherical harmonic transform (SHT) associated with the optimal-dimensionality sampling requires the inversion of a series of linear systems in an iterative manner. The stability of the inversion depends on the placement of iso-latitude rings of samples along co-latitude. In this work, we have developed a method to place these iso-latitude rings of samples with the objective of improving the well-conditioning of the linear systems involved in the computation of the SHT. We also propose a multi-pass SHT algorithm to iteratively improve the accuracy of the SHT of band-limited signals. Furthermore, we review the changes in the computational complexity and improvement in accuracy of the SHT with the embedding of the proposed methods. Through numerical experiments, we illustrate that the proposed variations and improvements in the SHT algorithm corresponding to the optimal-dimensionality sampling scheme significantly enhance the accuracy of the SHT.Comment: 5 Pages, 4 figure

    ServeNet: A Deep Neural Network for Web Services Classification

    Full text link
    Automated service classification plays a crucial role in service discovery, selection, and composition. Machine learning has been widely used for service classification in recent years. However, the performance of conventional machine learning methods highly depends on the quality of manual feature engineering. In this paper, we present a novel deep neural network to automatically abstract low-level representation of both service name and service description to high-level merged features without feature engineering and the length limitation, and then predict service classification on 50 service categories. To demonstrate the effectiveness of our approach, we conduct a comprehensive experimental study by comparing 10 machine learning methods on 10,000 real-world web services. The result shows that the proposed deep neural network can achieve higher accuracy in classification and more robust than other machine learning methods.Comment: Accepted by ICWS'2
    corecore