skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Single-particle chemical force microscopy to characterize virus surface chemistry
METHOD SUMMARY We developed a chemical force microscopy technique with a simple probe functionalization method using thiol attachment and an optimized covalent virus immobilization method. The novel method was used to detect the surface charge and hydrophobicity of viral capsids at a single-particle level.  more » « less
Award ID(s):
1451959
PAR ID:
10222318
Author(s) / Creator(s):
;
Date Published:
Journal Name:
BioTechniques
Volume:
69
Issue:
5
ISSN:
0736-6205
Page Range / eLocation ID:
363 to 370
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Networks are pervasive in society: infrastructures (e.g., telephone), commercial sectors (e.g., banking), and biological and genomic systems can be represented as networks. Consequently, there are software libraries that analyze networks. Containers (e.g., Docker, Singularity), which hold both runnable codes and their execution environments, are increasingly utilized by analysts to run codes in a platform-independent fashion. Portability is further enhanced by not only providing software library methods, but also the driver code (i.e., main() method) for each library method. In this way, a user only has to know the invocation for the main() method that is in the container. In this work, we describe an automated approach for generating a main() method for each software library method. A single intermediate representation (IR) format is used for all library methods, and one IR instance is populated for one library method by parsing its comments and method signature. An IR for the main() method is generated from that for the library method. A source code generator uses the main() method IR and a set of small, hand-generated source code templates|with variables in the templates that are automatically customized for a particular library method|to produce the source code main() method. We apply our approach to two widely used software libraries, SNAP and NetworkX, as exemplars, which combined have over 400 library methods. 
    more » « less
  2. Harris, F.; Wu, R.; Redei, A. (Ed.)
    Networks are pervasive in society: infrastructures (e.g., telephone), commercial sectors (e.g., banking), and biological and genomic systems can be represented as networks. Con- sequently, there are software libraries that analyze networks. Containers (e.g., Docker, Singularity), which hold both runnable codes and their execution environments, are in- creasingly utilized by analysts to run codes in a platform-independent fashion. Portability is further enhanced by not only providing software library methods, but also the driver code (i.e., main() method) for each library method. In this way, a user only has to know the invocation for the main() method that is in the container. In this work, we describe an automated approach for generating a main() method for each software library method. A single intermediate representation (IR) format is used for all library methods, and one IR instance is populated for one library method by parsing its comments and method signature. An IR for the main() method is generated from that for the library method. A source code generator uses the main() method IR and a set of small, hand-generated source code templates|with variables in the templates that are automatically customized for a particular library method|to produce the source code main() method. We apply our approach to two widely used software libraries, SNAP and NetworkX, as examplars, which combined have over 400 library methods. 
    more » « less
  3. The paper extends the recent star reachability method to verify the robustness of recurrent neural networks (RNNs) for use in safety-critical applications. RNNs are a popular machine learning method for various applications, but they are vulnerable to adversarial attacks, where slightly perturbing the input sequence can lead to an unexpected result. Recent notable techniques for verifying RNNs include unrolling, and invariant inference approaches. The first method has scaling issues since unrolling an RNN creates a large feedforward neural network. The second method, using invariant sets, has better scalability but can produce unknown results due to the accumulation of overapproximation errors over time. This paper introduces a complementary verification method for RNNs that is both sound and complete. A relaxation parameter can be used to convert the method into a fast overapproximation method that still provides soundness guarantees. The method is designed to be used with NNV, a tool for verifying deep neural networks and learning-enabled cyber-physical systems. Compared to state-of-the-art methods, the extended exact reachability method is 10 × faster, and the overapproximation method is 100 × to 5000 × faster. 
    more » « less
  4. null (Ed.)
    In this paper, we propose a new clustering method inspired by mode-clustering that not only finds clusters, but also assigns each cluster with an attribute label. Clusters obtained from our method show connectivity of the underlying distribution. We also design a local two-sample test based on the clustering result that has more power than a conventional method. We apply our method to the Astronomy and GvHD data and show that our method finds meaningful clusters. We also derive the statistical and computational theory of our method. 
    more » « less
  5. Abstract A modified incremental harmonic balance (IHB) method is used to determine periodic solutions of wave propagation in discrete, strongly nonlinear, periodic structures, and solutions are found to be in a two-dimensional hyperplane. A novel method based on the Hill’s method is developed to analyze stability and bifurcations of periodic solutions. A simplified model of wave propagation in a strongly nonlinear monatomic chain is examined in detail. The study reveals the amplitude-dependent property of nonlinear wave propagation in the structure and relationships among the frequency, the amplitude, the propagation constant, and the nonlinear stiffness. Numerous bifurcations are identified for the strongly nonlinear chain. Attenuation zones for wave propagation that are determined using an analysis of results from the modified IHB method and directly using the modified IHB method are in excellent agreement. Two frequency formulae for weakly and strongly nonlinear monatomic chains are obtained by a fitting method for results from the modified IHB method, and the one for a weakly nonlinear monatomic chain is consistent with the result from a perturbation method in the literature. 
    more » « less