Identification of rogue datasets in serial crystallography1
نویسندگان
چکیده
Advances in beamline optics, detectors and X-ray sources allow new techniques of crystallographic data collection. In serial crystallography, a large number of partial datasets from crystals of small volume are measured. Merging of datasets from different crystals in order to enhance data completeness and accuracy is only valid if the crystals are isomorphous, i.e. sufficiently similar in cell parameters, unit-cell contents and molecular structure. Identification and exclusion of non-isomorphous datasets is therefore indispensable and must be done by means of suitable indicators. To identify rogue datasets, the influence of each dataset on CC1/2 [Karplus & Diederichs (2012 ▸). Science, 336, 1030-1033], the correlation coefficient between pairs of intensities averaged in two randomly assigned subsets of observations, is evaluated. The presented method employs a precise calculation of CC1/2 that avoids the random assignment, and instead of using an overall CC1/2, an average over resolution shells is employed to obtain sensible results. The selection procedure was verified by measuring the correlation of observed (merged) intensities and intensities calculated from a model. It is found that inclusion and merging of non-isomorphous datasets may bias the refined model towards those datasets, and measures to reduce this effect are suggested.
منابع مشابه
Controlling the Occurrence of Rogue Waves in an Optically Injected Semiconductor Laser via Changing The Injection Strength
The rouge waves in an optically injected semiconductor lasers are receiving a lot of interest. In this work, the generating and controlling of the rogue waves in semiconductor lasers have been investigated. For this purpose, the laser’s rate equations are solved numerically in a specified time interval, then the field amplitude and the intensity versus time are calculated and analyzed. To solve...
متن کاملRogue Cell Detection Using Serial Time- Encoded Amplified Microscopy of Inertially Ordered Cells in High Throughput Flow Principal Investigator: Bahram Jalali Contracting Organization: the University of California, Los Angeles
متن کامل
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC
Attacks on wireless networks can be classified into two categories: external wireless and internal wired. In external wireless attacks, an attacker uses a wireless device to target the access point (AP), other wireless nodes or the communications on the network. In internal wired attacks, an attacker or authorized insider inserts an unauthorized (or rogue) AP into the wired backbone for malicio...
متن کاملUncovering Hidden Phylogenetic Consensus
Many of the steps in phylogenetic reconstruction can be confounded by “rogue” taxa, taxa that cannot be placed with assurance anywhere within the tree—whose location within the tree, in fact, varies with almost any choice of algorithm or parameters. Phylogenetic consensus methods, in particular, are known to suffer from this problem. In this paper we provide a novel framework in which to define...
متن کاملPruning Rogue Taxa Improves Phylogenetic Accuracy: An Efficient Algorithm and Webservice
The presence of rogue taxa (rogues) in a set of trees can frequently have a negative impact on the results of a bootstrap analysis (e.g., the overall support in consensus trees). We introduce an efficient graph-based algorithm for rogue taxon identification as well as an interactive webservice implementing this algorithm. Compared with our previous method, the new algorithm is up to 4 orders of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 49 شماره
صفحات -
تاریخ انتشار 2016