Cardiac troponin I (cTnI) is a cardiac biomarker for diagnosing ischemic heart disease and acute myocardial infarction. Current biochemical assays use antibodies (Abs) due to their high specificity ...and sensitivity. However, there are some limitations, such as the high-cost production of Abs due to complex instruments, reagents, and steps; the variability of Abs quality from batch to batch; the low stability at high temperatures; and the difficulty of chemical modification. Aptamer overcomes the limitations of antibodies, such as relatively lower cost, high reproducibility, high stability, and ease of being chemically modified. Aptamers are three-dimensional architectures of single-stranded RNA or DNA that bind to targets such as proteins. Six aptamers (Tro1-Tro6) with higher binding affinity than an antibody have been identified, but the molecular interaction has not been studied. In this study, six DNA aptamers were modeled and docked to cTnI protein. Molecular docking revealed that the interaction between all aptamer and cTnI happened in the similar cTnI region. The interaction between aptamer and cTnI involved hydrophobic interaction, hydrogen bonds, π-cation interactions, π-stack interactions, and salt-bridge formation. The calculated binding energy of all complexes was negative, which means that the complex formation was thermodynamically favorable. The electrostatic energy term was the main driving force of the interaction between all aptamer and cTnI. This study could be used to predict the behavior of further modified aptamer to improve aptamer performance.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE). Its ability ...to efficiently calculate polynomial multiplication using the convolution theorem with a quasi-linear complexity O ( n log n ) has made it a key component in modern cryptography. NTT is particularly useful in lattice-based cryptography, which relies on the hardness of certain mathematical problems to ensure security. Its importance in these fields continues to grow as quantum computing technology advances and traditional encryption methods become vulnerable. In this report, we discuss the mathematical concepts of polynomial multiplications using NTT and provide a comprehensive review of the latest implementation and state-of-the-art of NTT in both PQC and HE schemes.
In recent years, measuring and monitoring analyte concentrations continuously, frequently, and periodically has been a vital necessity for certain individuals. We developed a cotton-based ...millifluidic fabric-based electrochemical device (mFED) to monitor glucose continuously and evaluate the effects of mechanical deformation on the device's electrochemical performance. The mFED was fabricated using stencil printing (thick film method) for patterning the electrodes and wax-patterning to make the reaction zone. The analytical performance of the device was carried out using the chronoamperometry method at a detection potential of -0.2 V. The mFED has a linear working range of 0-20 mM of glucose, with LOD and LOQ of 0.98 mM and 3.26 mM. The 3D mFED shows the potential to be integrated as a wearable sensor that can continuously measure glucose under mechanical deformation.
The battery monitoring system (BMoS) is crucial to monitor the condition of the battery in supplying and absorbing the energy when operating and simultaneously determine the optimal limits for ...achieving long battery life. All of this can be done by measuring the battery parameters and increasing the state of charge (SoC) and the state of health (SoH) of the battery. The battery dataset from NASA is used for evaluation. In this work, the gradient vector is employed to obtain the trend of the energy supply pattern from the battery. In addition, a support vector machine (SVM) is adopted for an accurate battery accuracy index. This is in line with the use of polynomial regression; hence, points V1 and V2 are obtained as the boundaries of the normal-usage phase. Furthermore, testing of the time length distribution is also carried out on the length of time the battery was successfully extracted from the classification. All these stages can be used to calculate the rate of battery degradation during use so that this strategy can be applied in real situations by continuously comparing values. In this case, using the voltage gradient, SVM method, and the suggested polynomial regression, MAPE (%), MAE, and RMSE can be obtained against the battery value graph with values of 0.3%, 0.0106, and 0.0136, respectively. With this error value, the dynamics of the SoC value of the battery can be obtained, and the SoH problem can be resolved with a shorter usage time by avoiding the voltage-drop phase.
The embracing of digital technology has enhanced different approaches for authorities worldwide to deliver services to their citizens in a smart way. Smart government services contribute to ...increasing citizens' trust in government performance providing public services, as it allows interactions anytime, anyplace, through any device that merge digital technology and government public services. Furthermore, it is essential to consider citizens' trust in smart public services since citizens are consumers of the services. Existing studies measure citizens' trust in smart government services focusing on technological and government aspects. Therefore, this study proposes a framework to measure trust in smart government services and its impact on service adoption and satisfaction. This framework uses Information System (IS) Success Model and expands the dimension with government aspects, citizen aspects, citizens engagement, and social influence. This study surveyed the citizens of West Java Province Indonesia who have used government digital services for checking and paying vehicle taxes. The findings revealed significant factors, which are technological aspects, government aspects, and citizens engagement to measure citizens' trust in smart government services. The more citizens trust the services, the more they will use these services. Trusted smart government services also deliver value and satisfaction to the service users. However, we found social influence and the citizen aspects are not supported the citizens' trust in smart government services. We believe this paper will be a significant contribution for the academicians, governments, and service providers to build or increase citizens' trust in smart government services.
This paper proposed a simple but highly accurate feature extraction method for epilepsy detection from electroencephalogram (EEG) signals. Based on the combination of Discrete Wavelet Transform (DWT) ...and the newly proposed features Local Binary Pattern Transition Histogram (LBPTH) and Local Binary Pattern Mean Absolute Deviation (LBPMAD), our proposed feature extraction method can efficiently extract features from EEG signals for machine learning classification of epilepsy, achieving high classification accuracy with a feature size of only 18 for each signal. Tested on the publicly available University of Bonn Epilepsy EEG Dataset using a signal length of 4097 data points (23.61 seconds), the proposed method achieved larger than 99.6% accuracy results for Support Vector Machine (SVM) and k-Nearest Neighbor (KNN) classification of ictal (set E) against any non-ictal (set A, B, C, or D) or combinations of non-ictal (set <inline-formula> <tex-math notation="LaTeX">\text{A}+\text{B} </tex-math></inline-formula>, set <inline-formula> <tex-math notation="LaTeX">\text{C}+\text{D} </tex-math></inline-formula>, or set <inline-formula> <tex-math notation="LaTeX">\text{A}+\text{B}+\text{C}+\text{D} </tex-math></inline-formula>) EEG signals, which is among the best of currently published works. Our method can maintain high classification accuracy even with short input signals, achieving more than 99.1% SVM classification accuracy when input signal length is reduced to 512 data points (2.95 seconds). The high accuracy, small feature size, ability to work with short input signals and low computing requirements made the proposed method suitable for mobile, low power, and low-cost wearable medical devices.
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially ...for IoT devices containing confidential data or other potential security risks. This research focused on many-to-many ACS, a type of ACS in which many resource-owners and resource-users are involved in the same system. This type of system is advantageous in that the user can conveniently access resources from different resource-owners using the same system. However, such a system may create a situation where parties involved in the system have their data leaked because of the large number of parties involved in the system. Therefore, ‘isolation’ of the parties involved is needed. This research simulated the use of smart cards to access electric vehicle (EV) charging stations that implement an isolated many-to-many authentication scheme. Two ESP8266 MCUs, one RC522 RFID reader, and an LED represented an EV charging station. Each institute used a Raspberry Pi Zero W as the web and database server. This research also used VPN and HTTPS protocols to isolate each institute’s assets. Every component of the system was successfully implemented and tested functionally.
Breast cancer is the most commonly diagnosed cancer globally, with the highest incidence of breast cancer occurring in Asian countries including Indonesia. Among the types of breast cancer, the ...estrogen receptor (ER)-positive subtype which is prominent with estrogen receptor alpha (
) and heat shock protein 90 (
) overexpression genes becomes the most prevalent than the others, approximately 75% of all breast cancer cases. ERα and HSP90 play a role in breast cancer activities including breast tumor growth, invasion, and metastasis mechanism. Propolis, a natural bee product, has been explored for its anticancer activity. However, there is lack of studies that evaluated the potential inhibitor from propolis compounds to the ERα and HSP90 proteins. Therefore, this article focuses on examining the correlation between ERα and HSP90's role in breast cancer and investigating the potential of 93 unique propolis compositions in inhibiting these genes in breast cancer using in silico approaches. This study revealed the positive correlation between
and
genes in breast cancer disease development. Furthermore, we also found novel potential bioactive compounds of propolis against breast cancer through binding with ERα and HSP90; they were 3',4',7-trihydroxyisoflavone and baicalein-7-O-β-D glucopyranoside, respectively. Further research on these compounds is needed to elucidate deeper mechanisms and activity in the real biological system to develop new breast cancer drug treatments.
Research on the application of graphene (G) and graphene quantum dots (GQDs) for biomedical engineering has attracted much attention over the last decade. Graphene and its derivatives have shown ...great biocompatibility, solubility, selectivity, large surface area, high purity, biofunctionalization, high drug loading capacity, and cell membrane penetration capability potential to be applied in biomedical engineering areas. The unique physical and chemical properties of GQDs, including small size, chemical inertness, high photoluminescence stability, low cytotoxicity, and good biocompatibility, made them a promising candidate for biomedical engineering applications. The recent progress related to the development of G and GQDs toward biomedical engineering applications is presented in this work. This study reviews and discusses the development of G and GQDs, both top-down and bottom-up synthesis methods, for biomedical engineering applications, such as biosensing, tissue engineering, drug delivery, bioimaging, antibacterial, and antiviral.
The coronavirus disease 2019 outbreak has become a huge challenge in the human sector for the past two years. The coronavirus is capable of mutating at a higher rate than other viruses. Thus, an ...approach for creating an effective vaccine is still needed to induce antibodies against multiple variants with lower side effects. Currently, there is a lack of research on designing a multiepitope of the COVID-19 spike protein for the Indonesian population with comprehensive immunoinformatic analysis. Therefore, this study aimed to design a multiepitope-based vaccine for the Indonesian population using an immunoinformatic approach. This study was conducted using the SARS-CoV-2 spike glycoprotein sequences from Indonesia that were retrieved from the GISAID database. Three SARS-CoV-2 sequences, with IDs of EIJK-61453, UGM0002, and B.1.1.7 were selected. The CD8+ cytotoxic T-cell lymphocyte (CTL) epitope, CD4+ helper T lymphocyte (HTL) epitope, B-cell epitope, and IFN-γ production were predicted. After modeling the vaccines, molecular docking, molecular dynamics, in silico immune simulations, and plasmid vector design were performed. The designed vaccine is antigenic, non-allergenic, non-toxic, capable of inducing IFN-γ with a population reach of 86.29% in Indonesia, and has good stability during molecular dynamics and immune simulation. Hence, this vaccine model is recommended to be investigated for further study.