scholarly journals Rat gene mapping using PCR-analyzed microsatellites.

Genetics ◽  
1992 ◽  
Vol 131 (3) ◽  
pp. 701-721 ◽  
Author(s):  
T Serikawa ◽  
T Kuramoto ◽  
P Hilbert ◽  
M Mori ◽  
J Yamada ◽  
...  

Abstract One hundred and seventy-four rat loci which contain short tandem repeat sequences were extracted from the GenBank or EMBL data bases and used to define primers for amplification by the polymerase chain reaction (PCR) of the microsatellite regions, creating PCR-formatted sequence-tagged microsatellite sites (STMSs). One hundred and thirty-four STMSs for 118 loci, including 6 randomly cloned STMSs, were characterized: (i) PCR-analyzed loci were assigned to specific chromosomes using a panel of rat x mouse somatic cell hybrid clones. (ii) Length variation of the STMSs among 8 inbred rat strains could be visualized at 85 of 107 loci examined (79.4%). (iii) A genetic map, integrating biochemical, coat color, mutant and restriction fragment length polymorphism loci, was constructed based on the segregation of 125 polymorphic markers in seven rat backcrosses and in two F2 crosses. Twenty four linkage groups were identified, all of which were assigned to a defined chromosome. As a reflection of the bias for coding sequences in the public data bases, the STMSs described herein are often associated with genes. Hence, the genetic map we report coincides with a gene map. The corresponding map locations of the homologous mouse and human genes are also listed for comparative mapping purposes.

Res Publica ◽  
1989 ◽  
Vol 31 (2) ◽  
pp. 181-188
Author(s):  
Louis Vanvelthoven

Opening up as many sources of information as possible is particularly conducive to the development of workable policy plans and to efficient decision-making in a democratic political system. It follows that MPs can greatly benefit from using computerized information systems.As far as the parliamentary activities are concerned, we can distinguish between internal and external information flow. The contents of the parliamentary documents, the procedure for processing them and the information on the parliamentary control are part of the internal information flow. The external information on the other hand refers to the relations between the MPs and the executive and the judiciary branches, supranational and international institutions as well as the library.To date, the House of Representatives has been the only assembly that has set up a computerized information system . The data bases of the House comprise : the parliamentary documents and the state of advancement of all proceedings linked to these documents (bath in the House and in the Senate) until the publication of the text in the official state journal. Other databases relate to the parliamentary control : interpellations, motions, oral questions and the entire text of the written parliamentary questions.The record of the House will also be stored in a data base giving references. The library fund has been integrated in the interlibrary network DOBIS-LIBIS.  A data base was also designed for the press information, and linked to an image processing system.What has been realized in the House to date must also be feasible for the other parliamentary assemblies. Viewed from that perspective, it seems advisable that data bases be centralized in one parliamentary information DP centre. Access to this centre should be particulary user-friendly and uniform, so much so that all MPs can make maximum use of it.The system set up by the House meets with an ever increasing demand from other possible users. In this context, attention should be drawn to the interconnection of this system with other parliamentary assemblies, the extension of the system to other users in the House ofthe MPs and the external access to the system via the telephone network: direct access for the universities, and for certain public and private institutions and individual MPs, and the BISTEL and/ or VIDEOTEX access.The majority of the public data bases linked to the telephone network can be interrogated via the BISTEL system, hut many interesting applications are not accessible via the telephone network as they function in closed circuits.Opening up data bases by linking them to the telephone network, implies that the problem of cost and privacy be carefully examined. As to privacy, we should reflect on the public or confidential character of the data and its consequences, on safeguarding the information stored in the system and on the evolution ofcommunications technology from the perspective of a continental European communications network.


2018 ◽  
Vol 10 (1) ◽  
pp. 19-26 ◽  
Author(s):  
Muhammad Iqbal Perkasa ◽  
Eko Budi Setiawan

Data is one of the most important things in this information and information technology era that evolving now. Currently, the government still has not used the public data maximally for administrative purposes. Utilization of this big population data is the creation of a web service application system with REST API where this data will be open and accessible to those who have access. One of the institutions that use this service is the Manpower and Transmigration Service where this system can make the Dinas staff more efficient to create and register job search cards using available community data. This application is able to provide and facilitate many parties, such as data administrators to monitor data usage, registration employee in input data, and people able to register independently. Index Terms—Web service, API, Rest api, People data


Author(s):  
Andrea Kropp ◽  
Gaurang Mitu Gulati ◽  
Mark C. Weidemaier

2021 ◽  
Vol 62 (1) ◽  
Author(s):  
Yu-Lan Lin ◽  
Dong-Hong Wu ◽  
Cheng-Chieh Wu ◽  
Yung-Fen Huang

Abstract Background Weedy rice, a conspecific weedy counterpart of the cultivated rice (Oryza sativa L.), has been problematic in rice-production area worldwide. Although we started to know about the origin of some weedy traits for some rice-growing regions, an overall assessment of weedy trait-related loci was not yet available. On the other hand, the advances in sequencing technologies, together with community efforts, have made publicly available a large amount of genomic data. Given the availability of public data and the need of “weedy” allele mining for a better management of weedy rice, the objective of the present study was to explore the genetic architecture of weedy traits based on publicly available data, mainly from the 3000 Rice Genome Project (3K-RGP). Results Based on the results of population structure analysis, we have selected 1378 individuals from four sub-populations (aus, indica, temperate japonica, tropical japonica) without admixed genomic composition for genome-wide association analysis (GWAS). Five traits were investigated: awn color, seed shattering, seed threshability, seed coat color, and seedling height. GWAS was conducted for each sub-population × trait combination and we have identified 66 population-specific trait-associated SNPs. Eleven significant SNPs fell into an annotated gene and four other SNPs were close to a putative candidate gene (± 25 kb). SNPs located in or close to Rc were particularly predictive of the occurrence of seed coat color and our results showed that different sub-populations required different SNPs for a better seed coat color prediction. We compared the data of 3K-RGP to a publicly available weedy rice dataset. The profile of allele frequency, phenotype-genotype segregation of target SNP, as well as GWAS results for the presence and absence of awns diverged between the two sets of data. Conclusions The genotype of trait-associated SNPs identified in this study, especially those located in or close to Rc, can be developed to diagnostic SNPs to trace the origin of weedy trait occurred in the field. The difference of results from the two publicly available datasets used in this study emphasized the importance of laboratory experiments to confirm the allele mining results based on publicly available data.


2021 ◽  
Vol 66 (Special edition 2021/1) ◽  
pp. 52-67
Author(s):  
Gergely Pálmai ◽  
Szabolcs Csernyák ◽  
Zoltán Erdélyi

The analysis focused on how efficient management of the national data asset is supported by the Hungarian regulatory framework concerning the use of public information, and whether public data constituting part of the national data asset can be deemed authentic and reliable to support the efforts for the digitalisation and artificial intelligence-based developments of the public sector. The analysis shows why the availability of authentic and reliable data in terms of the national data asset has outstanding significance. In support of this assertion, it presents the different levels of data asset use, the role of using artificial intelligence in the public sector, and the significance, risks and challenges of the authenticity and reliability of public data, from both a data protection and a public finance aspect. Inaccuracy, unreliability of input data predestines the generation of incorrect result products (conclusion, decision), even if the appropriate algorithm is used, which could lead to direct financial loss, for both the citizens and the state. The authors of the analysis therefore suggest that a paradigm shift is necessary in the strategies targeting the efficient use of the public sector’s data, with the necessity to record the fundamental precondition that the national data asset must be based on reliable and authentic data.


2020 ◽  
Vol 15 (1) ◽  
pp. 25-36
Author(s):  
Rosyidatuzzahro Anisykurlillah

Illiteracy is a global issue that must be addressed immediately. In Malang Regency, there were 18,535 people who were illiterate. The effort of the Malang Regency Education Office to improve AMH is through Non-Formal Education Program (PNF). The assessment of the literacy development program through the PNF Program can use Context, Input, Process, and Product (CIPP) evaluation assessments. This research uses descriptive research with a qualitative approach. The purpose of this research is to describe and analyze the evaluation of literacy education through the PNF Program in Malang Regency using the CIPP methods. Data analysis techniques used in this study are interactive model analysis of Miles, Huberman, and Saldana. Based on the evaluation results using the CIPP (Context, Input, Process, and Product) method, there are still obstacles that must be resolved for the success of the PNF program. These obstacles include learning time that is not on schedule, lack of awareness of citizens in following the program, incapability of citizens, the difficulty of convincing the public, data collection of prospective citizens who fail to meet expectations. Abstrak Isu permasalahan buta huruf merupakan isu global yang harus segera ditangani. Pendidikan keaksaraan (belajar membaca dan menulis) diukur dengan Angka Melek Huruf (AMH) dapat menggambarkan jumlah orang yang memperoleh akses pendidikan sebagai hasil pembangunan. Di Kabupaten Malang terdapat 18.535 orang yang buta huruf. Upaya Dinas Pendidikan Kabupaten Malang untuk meningkatkan AMH adalah dengan Program Pendidikan Non Formal (PNF). Untuk menilai pembangunan pendidikan keaksaraan melalui Program PNF dapat menggunakan penilaian evaluasi Context, Input, Process, and Product (CIPP). Penelitian ini menggunakan jenis penelitian deskriptif dengan pendekatan kualitatif. Teknik analisis data yang digunakan dalam penelitian ini adalah interactive model analysis Miles, Hubermana, dan Saldana. Jika dilihat dari hasil Evaluasi menggunakan metode CIPP (Context, Input, Process, dan Product), masih ada hambatan-hambatan yang harus diselesaikan demi keberhasilan program PNF. Hambatan tersebut diantaranya waktu pembelajaran yang tidak sesuai jadwal, kurang kesadaran warga Belajar (WB) dalam mengikuti program, ketidakmampuan Warga Belajar (WB), sulitnya meyakinkan masyarakat, pendataan calon warga belajar yang tidak sesuai harapan.


Author(s):  
Joel Stafford

Background with rationaleIt is commonplace in policy discussions concerning administrative data linkage to presuppose that the data referred to is government services data. But this is not always the case. Much of the data public services hold is now collected via intermediaries, such as Non-Government Organisations, operating under service contracts with one or multiple government departments. Nor are these the only administrative data holdings applicable to clients of government services. There are also vast private administrative data holdings – including utility data, and consumer behaviour data. Creating and amending legislation that governs public service practices in this domain is increasingly made complex when private companies partner with governments agencies on policy development and evaluation work. Understanding the concept of public data for public good in light of this expanded sense of administrative data opens the door to deeper questions about the role linked data can play in government decision making. Main aimThe paper problematizes how legislation governing the linking of government administrative data is scoped and discusses how public service work can be affected by the opaque communication networks that increasingly span the public-private sector divide. Methods/ApproachAfter contextualising the challenge of legislating for administrative data linkage in the current work of the Office of the National Data Commissioner (ONDC) in Australia, this paper tests aspects of the proposed legislation against the extent to which it permits the possibility of ‘data laundering’. ResultsThe presentation demonstrates the need for greater sophistication in the specification of data linkage and sharing legislation in service of the public good. Conclusions This paper indicates that contemporary practices governing the linkage of government administrative data holdings is porous to the aims of extra-governmental organisations and may benefit by better incorporating legislative structures that govern private analytical services entities.


2021 ◽  
Vol 22 (3) ◽  
pp. 445-452
Author(s):  
Dongjun Kim ◽  
Hyeonji Kim ◽  
Chaeeun Song ◽  
Jiwoo Yang ◽  
Haklae Kim
Keyword(s):  

2011 ◽  
pp. 1977-1990
Author(s):  
Philip Leith

Public information presumes that the information is somehow public and, presumably, that this can be utilized by members of the public. Unfortunately, things are more complex than this simple definition suggests, and we therefore need to look at various issues relating to public information which limit access and usage, for example, the nature of privacy, sharing information within government, court records, ownership of public information, and freedom of information. The exemplars dealt with later in the article will demonstrate the legal constraints upon the usage of public information in a digital environment and help raise awareness of such limitations. Public information cannot be formally defined (as a list of items, say) except to indicate it is that information which has historically been available to the public in print form and/or through some generally open process. No formal definition is possible because this depends to a very large extent upon cultural differences. For example, tax returns are viewed as private documents in the United Kingdom open only to the tax authorities (unless otherwise authorized, e.g., in criminal proceedings) whereas in Sweden they can be accessed by any member of the public. Furthermore, the source of public information may also vary: what information is produced by a public authority in one country may not be so carried out in another. The legal constraints upon access and use of public information include the following: • Privacy/confidentiality of public data • Sharing and processing of public data collected for divergent purposes • Freedom of information rights to public data • Copyright and database rights in public data Access to public information may be enabled through a formal public register, through statutory mechanism, or other less formal means. Note that being accessible does not necessarily mean that users are free to use this information in any way they wish: copyright licenses in particular are not always passed along with access rights, so that the public may inspect a document but may not use it in other ways (such as republishing). Reasons for this are obvious: the collection of data by government can be expensive and there can be opposition to subsidising commercial activity from the public purse. In the United States, federal materials are explicitly excluded from copyright protection, but this is rarely the case in Europe (see www.hmso.gov.uk for the UK situation). Another example is that it is possible in most countries to attend local criminal courts or peruse local newspapers and draw up a database of prosecutions in the local area. The database could include information on drunk drivers, sexual offenders, and burglars, and it would be possible to include a wide variety of information—all of it, clearly, of a public nature. Indeed, such activities have been common for many years where credit agencies have collected information from courts on debtors and made this available on a commercial basis. But there are questions: Is all court-based information public? What limitations might be found in some countries and not in others to the dissemination of this information? See Elkin-Koren and Weinstock Netanel (2002) for the general tendency toward commodification of information and Pattenden (2003) for professional confidentiality where it impinges upon public service. On a more mundane level, judgments from most European courts are copyright of the relevant government or agency. In the United Kingdom, differing again, there is some dispute over whether the judge or Court Service owns the judgment, and frequently the only text version of a judgment is copyright of the privately employed court stenographer. Thus the publicly available information which is being discussed here is that which emanates from a public authority and can be accessed by members of the public, but will usually have some constraint and limitation on how it can be reused by the public. We are interested in outlining these constraints.


Sign in / Sign up

Export Citation Format

Share Document