Sample records for computer virus problem

  1. Computer Viruses: An Epidemic Real or Imagined?

    ERIC Educational Resources Information Center

    Chaffin, Ellen

    1989-01-01

    Discusses the current problems associated with computer viruses that affect system and software users and the frequency with which they occur. System security is discussed, steps to take to safeguard against damage by computer viruses are suggested, and anti-viral programs, or vaccines, are described. (LRW)

  2. A tradeoff between the losses caused by computer viruses and the risk of the manpower shortage

    PubMed Central

    Bi, Jichao; Yang, Lu-Xing; Wu, Yingbo; Tang, Yuan Yan

    2018-01-01

    This article addresses the tradeoff between the losses caused by a new virus and the size of the team for developing an antivirus against the virus. First, an individual-level virus spreading model is proposed to capture the spreading process of the virus before the appearance of its natural enemy. On this basis, the tradeoff problem is modeled as a discrete optimization problem. Next, the influences of different factors, including the infection force, the infection function, the available manpower, the alarm threshold, the antivirus development effort and the network topology, on the optimal team size are examined through computer simulations. This work takes the first step toward the tradeoff problem, and the findings are instructive to the decision makers of network security companies. PMID:29370222

  3. A tradeoff between the losses caused by computer viruses and the risk of the manpower shortage.

    PubMed

    Bi, Jichao; Yang, Lu-Xing; Yang, Xiaofan; Wu, Yingbo; Tang, Yuan Yan

    2018-01-01

    This article addresses the tradeoff between the losses caused by a new virus and the size of the team for developing an antivirus against the virus. First, an individual-level virus spreading model is proposed to capture the spreading process of the virus before the appearance of its natural enemy. On this basis, the tradeoff problem is modeled as a discrete optimization problem. Next, the influences of different factors, including the infection force, the infection function, the available manpower, the alarm threshold, the antivirus development effort and the network topology, on the optimal team size are examined through computer simulations. This work takes the first step toward the tradeoff problem, and the findings are instructive to the decision makers of network security companies.

  4. Computational 3D structures of drug-targeting proteins in the 2009-H1N1 influenza A virus

    NASA Astrophysics Data System (ADS)

    Du, Qi-Shi; Wang, Shu-Qing; Huang, Ri-Bo; Chou, Kuo-Chen

    2010-01-01

    The neuraminidase (NA) and M2 proton channel of influenza virus are the drug-targeting proteins, based on which several drugs were developed. However these once powerful drugs encountered drug-resistant problem to the H5N1 and H1N1 flu. To address this problem, the computational 3D structures of NA and M2 proteins of 2009-H1N1 influenza virus were built using the molecular modeling technique and computational chemistry method. Based on the models the structure features of NA and M2 proteins were analyzed, the docking structures of drug-protein complexes were computed, and the residue mutations were annotated. The results may help to solve the drug-resistant problem and stimulate designing more effective drugs against 2009-H1N1 influenza pandemic.

  5. Stopping computer crimes

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1989-01-01

    Two new books about intrusions and computer viruses remind us that attacks against our computers on networks are the actions of human beings. Cliff Stoll's book about the hacker who spent a year, beginning in Aug. 1986, attempting to use the Lawrence Berkeley Computer as a stepping-stone for access to military secrets is a spy thriller that illustrates the weaknesses of our password systems and the difficulties in compiling evidence against a hacker engaged in espionage. Pamela Kane's book about viruses that attack IBM PC's shows that viruses are the modern version of the old problem of a Trojan horse attack. It discusses the most famous viruses and their countermeasures, and it comes with a floppy disk of utility programs that will disinfect your PC and thwart future attack.

  6. The impact of countermeasure propagation on the prevalence of computer viruses.

    PubMed

    Chen, Li-Chiou; Carley, Kathleen M

    2004-04-01

    Countermeasures such as software patches or warnings can be effective in helping organizations avert virus infection problems. However, current strategies for disseminating such countermeasures have limited their effectiveness. We propose a new approach, called the Countermeasure Competing (CMC) strategy, and use computer simulation to formally compare its relative effectiveness with three antivirus strategies currently under consideration. CMC is based on the idea that computer viruses and countermeasures spread through two separate but interlinked complex networks-the virus-spreading network and the countermeasure-propagation network, in which a countermeasure acts as a competing species against the computer virus. Our results show that CMC is more effective than other strategies based on the empirical virus data. The proposed CMC reduces the size of virus infection significantly when the countermeasure-propagation network has properties that favor countermeasures over viruses, or when the countermeasure-propagation rate is higher than the virus-spreading rate. In addition, our work reveals that CMC can be flexibly adapted to different uncertainties in the real world, enabling it to be tuned to a greater variety of situations than other strategies.

  7. National Computer Security Conference (15th) held in Baltimore, Maryland on October 13-16, 1992. Volume 1: Proceedings

    DTIC Science & Technology

    1992-10-16

    The Spread of Viruses Programs have been developed to attack some of these problems , primarily in the virus arena. Pick up any PC magazine and you...a particular DBMS-specific research area. These documents discuss the research problem , present an overview of relevant research and development ...MITRE has developed to date and a brief discussion those documents currently under development . For each companion document, the problem being

  8. Optimal control strategy for a novel computer virus propagation model on scale-free networks

    NASA Astrophysics Data System (ADS)

    Zhang, Chunming; Huang, Haitao

    2016-06-01

    This paper aims to study the combined impact of reinstalling system and network topology on the spread of computer viruses over the Internet. Based on scale-free network, this paper proposes a novel computer viruses propagation model-SLBOSmodel. A systematic analysis of this new model shows that the virus-free equilibrium is globally asymptotically stable when its spreading threshold is less than one; nevertheless, it is proved that the viral equilibrium is permanent if the spreading threshold is greater than one. Then, the impacts of different model parameters on spreading threshold are analyzed. Next, an optimally controlled SLBOS epidemic model on complex networks is also studied. We prove that there is an optimal control existing for the control problem. Some numerical simulations are finally given to illustrate the main results.

  9. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  10. Online social networks—Paradise of computer viruses

    NASA Astrophysics Data System (ADS)

    Fan, W.; Yeung, K. H.

    2011-01-01

    Online social network services have attracted more and more users in recent years. So the security of social networks becomes a critical problem. In this paper, we propose a virus propagation model based on the application network of Facebook, which is the most popular among these social network service providers. We also study the virus propagation with an email virus model and compare the behaviors of a virus spreading on Facebook with the original email network. It is found that Facebook provides the same chance for a virus spreading while it gives a platform for application developers. And a virus will spread faster in the Facebook network if users of Facebook spend more time on it.

  11. The mathematics of virus shell assembly. Progress report 1995--1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berger, B.

    1996-08-01

    This research focuses on applying computational and mathematical techniques to problems in biology, and more specifically to problems in protein folding. Significant progress has been made in the following areas relating to virus shell assembly: the local rules theory has been further developed; development has begun on a second-generation simulator which provides a more physically realistic model of assembly, collaborative efforts have continued with an experimental biologist to verify and inspire the local rules theory; an investigation has been initiated into the mechanics of virus shell assembly; laboratory experiments have been conducted on bacteriophage T4 which verify that the previouslymore » believed structure for the core may be incorrect.« less

  12. Problems in understanding the structure and assembly of viruses

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    King, J.

    1997-12-01

    Though viruses infect the cells of all groups of animals, plants, and microorganisms, their structures follow a limited number of general themes; spherical or cylindrical shells built of hundreds of repeated protein subunits enclosing a nucleic acid - DNA or RNA - genome. Since the 1960s it has been known that the protein shells of spherical viruses in fact conform to icosahedral symmetry or to subtle deviations from icosahedral symmetry. The construction of the shell lattices and the transformations they go through in the different stages of the viral life cycle are not fully understood. The shells contain the nucleicmore » in a highly condensed state, of unknown coiling/organization. Features of the well studied bacterial viruses will be reviewed, with examples from adenoviruses, herpesviruses, poliovirus, and HIV. The emergence of new viral disease has led to increased interest in the development of agents which interfere with virus reproduction at the level of the assembly or function of the organized particle. Recently computational approaches to the problem of virus assembly have made important contributions to clarifying shell assembly processes. 1 ref.« less

  13. Guidelines for Network Security in the Learning Environment.

    ERIC Educational Resources Information Center

    Littman, Marlyn Kemper

    1996-01-01

    Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)

  14. Finding and identifying the viral needle in the metagenomic haystack: trends and challenges

    PubMed Central

    Soueidan, Hayssam; Schmitt, Louise-Amélie; Candresse, Thierry; Nikolski, Macha

    2015-01-01

    Collectively, viruses have the greatest genetic diversity on Earth, occupy extremely varied niches and are likely able to infect all living organisms. Viral infections are an important issue for human health and cause considerable economic losses when agriculturally important crops or husbandry animals are infected. The advent of metagenomics has provided a precious tool to study viruses by sampling them in natural environments and identifying the genomic composition of a sample. However, reaching a clear recognition and taxonomic assignment of the identified viruses has been hampered by the computational difficulty of these problems. In this perspective paper we examine the trends in current research for the identification of viral sequences in a metagenomic sample, pinpoint the intrinsic computational difficulties for the identification of novel viral sequences within metagenomic samples, and suggest possible avenues to overcome them. PMID:25610431

  15. Computer Viruses. Technology Update.

    ERIC Educational Resources Information Center

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  16. Spyware.

    PubMed

    Bergren, Martha Dewey

    2004-10-01

    School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it is a problem, how it is transmitted to a personal or business computer, how to prevent spyware infestation, and how to delete it.

  17. Computer Viruses: Pathology and Detection.

    ERIC Educational Resources Information Center

    Maxwell, John R.; Lamon, William E.

    1992-01-01

    Explains how computer viruses were originally created, how a computer can become infected by a virus, how viruses operate, symptoms that indicate a computer is infected, how to detect and remove viruses, and how to prevent a reinfection. A sidebar lists eight antivirus resources. (four references) (LRW)

  18. Investigation of a computer virus outbreak in the pharmacy of a tertiary care teaching hospital.

    PubMed

    Bailey, T C; Reichley, R M

    1992-10-01

    A computer virus outbreak was recognized, verified, defined, investigated, and controlled using an infection control approach. The pathogenesis and epidemiology of computer virus infection are reviewed. Case-control study. Pharmacy of a tertiary care teaching institution. On October 28, 1991, 2 personal computers in the drug information center manifested symptoms consistent with the "Jerusalem" virus infection. The same day, a departmental personal computer began playing "Yankee Doodle," a sign of "Doodle" virus infection. An investigation of all departmental personal computers identified the "Stoned" virus in an additional personal computer. Controls were functioning virus-free personal computers within the department. Cases were associated with users who brought diskettes from outside the department (5/5 cases versus 5/13 controls, p = .04) and with College of Pharmacy student users (3/5 cases versus 0/13 controls, p = .012). The detection of a virus-infected diskette or personal computer was associated with the number of 5 1/4-inch diskettes in the files of personal computers, a surrogate for rate of media exchange (mean = 17.4 versus 152.5, p = .018, Wilcoxon rank sum test). After education of departmental personal computer users regarding appropriate computer hygiene and installation of virus protection software, no further spread of personal computer viruses occurred, although 2 additional Stoned-infected and 1 Jerusalem-infected diskettes were detected. We recommend that virus detection software be installed on personal computers where the interchange of diskettes among computers is necessary, that write-protect tabs be placed on all program master diskettes and data diskettes where data are being read and not written, that in the event of a computer virus outbreak, all available diskettes be quarantined and scanned by virus detection software, and to facilitate quarantine and scanning in an outbreak, that diskettes be stored in organized files.

  19. Computer virus information update CIAC-2301

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W.J.

    1994-01-15

    While CIAC periodically issues bulletins about specific computer viruses, these bulletins do not cover all the computer viruses that affect desktop computers. The purpose of this document is to identify most of the known viruses for the MS-DOS and Macintosh platforms and give an overview of the effects of each virus. The authors also include information on some windows, Atari, and Amiga viruses. This document is revised periodically as new virus information becomes available. This document replaces all earlier versions of the CIAC Computer virus Information Update. The date on the front cover indicates date on which the information inmore » this document was extracted from CIAC`s Virus database.« less

  20. An overview of computer viruses in a research environment

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1991-01-01

    The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically threats aimed at subverting computer security. Here, computer viruses are examined as a malicious logic in a research and development environment. A relation is drawn between the viruses and various models of security and integrity. Current research techniques aimed at controlling the threats posed to computer systems by threatening viruses in particular and malicious logic in general are examined. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken.

  1. Safe Computing: An Overview of Viruses.

    ERIC Educational Resources Information Center

    Wodarz, Nan

    2001-01-01

    A computer virus is a program that replicates itself, in conjunction with an additional program that can harm a computer system. Common viruses include boot-sector, macro, companion, overwriting, and multipartite. Viruses can be fast, slow, stealthy, and polymorphic. Anti-virus products are described. (MLH)

  2. Protecting Your Computer from Viruses

    ERIC Educational Resources Information Center

    Descy, Don E.

    2006-01-01

    A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…

  3. Solutions of the epidemic of EIAV infection by HPM

    NASA Astrophysics Data System (ADS)

    Balamuralitharan, S.; Geethamalini, S.

    2018-04-01

    In this article, Homotopy Perturbation Method (HPM) is to process of estimate to the arrangements to a model for Equine Infectious Anemia Virus (EIAV) disease. This technique allows a direct scheme for solving the problem. MATLAB is operated to complete the computations. Graphical results are displayed and discussed quantitatively and simplicity of the method.

  4. Computer Bytes, Viruses and Vaccines.

    ERIC Educational Resources Information Center

    Palmore, Teddy B.

    1989-01-01

    Presents a history of computer viruses, explains various types of viruses and how they affect software or computer operating systems, and describes examples of specific viruses. Available vaccines are explained, and precautions for protecting programs and disks are given. (nine references) (LRW)

  5. Research on computer virus database management system

    NASA Astrophysics Data System (ADS)

    Qi, Guoquan

    2011-12-01

    The growing proliferation of computer viruses becomes the lethal threat and research focus of the security of network information. While new virus is emerging, the number of viruses is growing, virus classification increasing complex. Virus naming because of agencies' capture time differences can not be unified. Although each agency has its own virus database, the communication between each other lacks, or virus information is incomplete, or a small number of sample information. This paper introduces the current construction status of the virus database at home and abroad, analyzes how to standardize and complete description of virus characteristics, and then gives the information integrity, storage security and manageable computer virus database design scheme.

  6. Improving Remote Voting Security with CodeVoting

    NASA Astrophysics Data System (ADS)

    Joaquim, Rui; Ribeiro, Carlos; Ferreira, Paulo

    One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors.

  7. Virus evolution and transmission in an ever more connected world

    PubMed Central

    Pybus, Oliver G.; Tatem, Andrew J.; Lemey, Philippe

    2015-01-01

    The frequency and global impact of infectious disease outbreaks, particularly those caused by emerging viruses, demonstrate the need for a better understanding of how spatial ecology and pathogen evolution jointly shape epidemic dynamics. Advances in computational techniques and the increasing availability of genetic and geospatial data are helping to address this problem, particularly when both information sources are combined. Here, we review research at the intersection of evolutionary biology, human geography and epidemiology that is working towards an integrated view of spatial incidence, host mobility and viral genetic diversity. We first discuss how empirical studies have combined viral spatial and genetic data, focusing particularly on the contribution of evolutionary analyses to epidemiology and disease control. Second, we explore the interplay between virus evolution and global dispersal in more depth for two pathogens: human influenza A virus and chikungunya virus. We discuss the opportunities for future research arising from new analyses of human transportation and trade networks, as well as the associated challenges in accessing and sharing relevant spatial and genetic data. PMID:26702033

  8. Email networks and the spread of computer viruses

    NASA Astrophysics Data System (ADS)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  9. METHODOLOGICAL NOTES: Computer viruses and methods of combatting them

    NASA Astrophysics Data System (ADS)

    Landsberg, G. L.

    1991-02-01

    This article examines the current virus situation for personal computers and time-sharing computers. Basic methods of combatting viruses are presented. Specific recommendations are given to eliminate the most widespread viruses. A short description is given of a universal antiviral system, PHENIX, which has been developed.

  10. [Birth and death process of computer viruses].

    PubMed

    Segawa, Katsunori; Nakano, Tatsuya; Nakata, Kotoko; Hayashi, Yuzuru

    2006-01-01

    The daily variations in the number of computer viruses found attaching to e-mails and the number of accesses to the home page of a national institute in Japan are examined. The power spectral densities (PSD) of the variation in the computer viruses show a time-correlation characteristic of Markov process, but the daily access number does not (identified as white noise). Like biological viruses, the variation in the computer viruses can be described by the birth-and-death model known as a Markov process.

  11. The Computer Virus Threat and What You Can Do about It.

    ERIC Educational Resources Information Center

    Lateulere, John

    1992-01-01

    Discussion of computer viruses describes two types of viruses and how they work; suggests ways to prevent or minimize virus risk; and explains how to recognize a virus and limit damage once a virus attacks. A sidebar lists several antivirus software products. (two references) (NRP)

  12. Computer Virus Protection

    ERIC Educational Resources Information Center

    Rajala, Judith B.

    2004-01-01

    A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…

  13. Stochastic Process Creation

    NASA Astrophysics Data System (ADS)

    Esparza, Javier

    In many areas of computer science entities can “reproduce”, “replicate”, or “create new instances”. Paramount examples are threads in multithreaded programs, processes in operating systems, and computer viruses, but many others exist: procedure calls create new incarnations of the callees, web crawlers discover new pages to be explored (and so “create” new tasks), divide-and-conquer procedures split a problem into subproblems, and leaves of tree-based data structures become internal nodes with children. For lack of a better name, I use the generic term systems with process creation to refer to all these entities.

  14. Computer Virus Bibliography, 1988-1989.

    ERIC Educational Resources Information Center

    Bologna, Jack, Comp.

    This bibliography lists 14 books, 154 journal articles, 34 newspaper articles, and 3 research papers published during 1988-1989 on the subject of computer viruses, software protection and 'cures', virus hackers, and other related issues. Some of the sources listed include Computers and Security, Computer Security Digest, PC Week, Time, the New…

  15. Coping with Computer Viruses: General Discussion and Review of Symantec Anti-Virus for the Macintosh.

    ERIC Educational Resources Information Center

    Primich, Tracy

    1992-01-01

    Discusses computer viruses that attack the Macintosh and describes Symantec AntiVirus for Macintosh (SAM), a commercial program designed to detect and eliminate viruses; sample screen displays are included. SAM is recommended for use in library settings as well as two public domain virus protection programs. (four references) (MES)

  16. Cyberethics: Identifying the Moral, Legal and Social Issues of Cybertechnology in K-12 Classrooms

    ERIC Educational Resources Information Center

    Brown, David S.; Wang, Tao

    2008-01-01

    Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…

  17. Virus Alert: Ten Steps to Safe Computing.

    ERIC Educational Resources Information Center

    Gunter, Glenda A.

    1997-01-01

    Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)

  18. Survey data collection using Audio Computer Assisted Self-Interview.

    PubMed

    Jones, Rachel

    2003-04-01

    The Audio Computer Assisted Self-Interview (ACASI) is a computer application that allows a research participant to hear survey interview items over a computer headset and read the corresponding items on a computer monitor. The ACASI automates progression from one item to the next, skipping irrelevant items. The research participant responds by pressing a number keypad, sending the data directly into a database. The ACASI was used to enhance participants' sense of privacy. A convenience sample of 257 young urban women, ages 18 to 29 years, were interviewed in neighborhood settings concerning human immune deficiency virus (HIV) sexual risk behaviors. Notebook computers were used to facilitate mobility. The overwhelming majority rated their experience with ACASI as easy to use. This article will focus on the use of ACASI in HIV behavioral research, its benefits, and approaches to resolve some identified problems with this method of data collection.

  19. Overreaction to External Attacks on Computer Systems Could Be More Harmful than the Viruses Themselves.

    ERIC Educational Resources Information Center

    King, Kenneth M.

    1988-01-01

    Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)

  20. GPU acceleration of Dock6's Amber scoring computation.

    PubMed

    Yang, Hailong; Zhou, Qiongqiong; Li, Bo; Wang, Yongjian; Luan, Zhongzhi; Qian, Depei; Li, Hanlu

    2010-01-01

    Dressing the problem of virtual screening is a long-term goal in the drug discovery field, which if properly solved, can significantly shorten new drugs' R&D cycle. The scoring functionality that evaluates the fitness of the docking result is one of the major challenges in virtual screening. In general, scoring functionality in docking requires a large amount of floating-point calculations, which usually takes several weeks or even months to be finished. This time-consuming procedure is unacceptable, especially when highly fatal and infectious virus arises such as SARS and H1N1, which forces the scoring task to be done in a limited time. This paper presents how to leverage the computational power of GPU to accelerate Dock6's (http://dock.compbio.ucsf.edu/DOCK_6/) Amber (J. Comput. Chem. 25: 1157-1174, 2004) scoring with NVIDIA CUDA (NVIDIA Corporation Technical Staff, Compute Unified Device Architecture - Programming Guide, NVIDIA Corporation, 2008) (Compute Unified Device Architecture) platform. We also discuss many factors that will greatly influence the performance after porting the Amber scoring to GPU, including thread management, data transfer, and divergence hidden. Our experiments show that the GPU-accelerated Amber scoring achieves a 6.5× speedup with respect to the original version running on AMD dual-core CPU for the same problem size. This acceleration makes the Amber scoring more competitive and efficient for large-scale virtual screening problems.

  1. Predicting Zoonotic Risk of Influenza A Viruses from Host Tropism Protein Signature Using Random Forest

    PubMed Central

    Eng, Christine L. P.; Tong, Joo Chuan; Tan, Tin Wee

    2017-01-01

    Influenza A viruses remain a significant health problem, especially when a novel subtype emerges from the avian population to cause severe outbreaks in humans. Zoonotic viruses arise from the animal population as a result of mutations and reassortments, giving rise to novel strains with the capability to evade the host species barrier and cause human infections. Despite progress in understanding interspecies transmission of influenza viruses, we are no closer to predicting zoonotic strains that can lead to an outbreak. We have previously discovered distinct host tropism protein signatures of avian, human and zoonotic influenza strains obtained from host tropism predictions on individual protein sequences. Here, we apply machine learning approaches on the signatures to build a computational model capable of predicting zoonotic strains. The zoonotic strain prediction model can classify avian, human or zoonotic strains with high accuracy, as well as providing an estimated zoonotic risk. This would therefore allow us to quickly determine if an influenza virus strain has the potential to be zoonotic using only protein sequences. The swift identification of potential zoonotic strains in the animal population using the zoonotic strain prediction model could provide us with an early indication of an imminent influenza outbreak. PMID:28587080

  2. Predicting Zoonotic Risk of Influenza A Viruses from Host Tropism Protein Signature Using Random Forest.

    PubMed

    Eng, Christine L P; Tong, Joo Chuan; Tan, Tin Wee

    2017-05-25

    Influenza A viruses remain a significant health problem, especially when a novel subtype emerges from the avian population to cause severe outbreaks in humans. Zoonotic viruses arise from the animal population as a result of mutations and reassortments, giving rise to novel strains with the capability to evade the host species barrier and cause human infections. Despite progress in understanding interspecies transmission of influenza viruses, we are no closer to predicting zoonotic strains that can lead to an outbreak. We have previously discovered distinct host tropism protein signatures of avian, human and zoonotic influenza strains obtained from host tropism predictions on individual protein sequences. Here, we apply machine learning approaches on the signatures to build a computational model capable of predicting zoonotic strains. The zoonotic strain prediction model can classify avian, human or zoonotic strains with high accuracy, as well as providing an estimated zoonotic risk. This would therefore allow us to quickly determine if an influenza virus strain has the potential to be zoonotic using only protein sequences. The swift identification of potential zoonotic strains in the animal population using the zoonotic strain prediction model could provide us with an early indication of an imminent influenza outbreak.

  3. Comparative study viruses with computer-aided phase microscope AIRYSCAN

    NASA Astrophysics Data System (ADS)

    Tychinsky, Vladimir P.; Koufal, Georgy E.; Perevedentseva, Elena V.; Vyshenskaia, Tatiana V.

    1996-12-01

    Traditionally viruses are studied with scanning electron microscopy (SEM) after complicated procedure of sample preparation without the possibility to study it under natural conditions. We obtained images of viruses (Vaccinia virus, Rotavirus) and rickettsias (Rickettsia provazekii, Coxiella burnetti) in native state with computer-aided phase microscope airyscan -- the interference microscope of Linnik layout with phase modulation of the reference wave with dissector image tube as coordinate-sensitive photodetector and computer processing of phase image. A light source was the He-Ne laser. The main result is coincidence of dimensions and shape of phase images with available information concerning their morphology obtained with SEM and other methods. The fine structure of surface and nuclei is observed. This method may be applied for virus recognition and express identification, investigation of virus structure and the analysis of cell-virus interaction.

  4. Can genetic algorithms help virus writers reshape their creations and avoid detection?

    NASA Astrophysics Data System (ADS)

    Abu Doush, Iyad; Al-Saleh, Mohammed I.

    2017-11-01

    Different attack and defence techniques have been evolved over time as actions and reactions between black-hat and white-hat communities. Encryption, polymorphism, metamorphism and obfuscation are among the techniques used by the attackers to bypass security controls. On the other hand, pattern matching, algorithmic scanning, emulation and heuristic are used by the defence team. The Antivirus (AV) is a vital security control that is used against a variety of threats. The AV mainly scans data against its database of virus signatures. Basically, it claims a virus if a match is found. This paper seeks to find the minimal possible changes that can be made on the virus so that it will appear normal when scanned by the AV. Brute-force search through all possible changes can be a computationally expensive task. Alternatively, this paper tries to apply a Genetic Algorithm in solving such a problem. Our proposed algorithm is tested on seven different malware instances. The results show that in all the tested malware instances only a small change in each instance was good enough to bypass the AV.

  5. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  6. Advanced information society(7)

    NASA Astrophysics Data System (ADS)

    Chiba, Toshihiro

    Various threats are hiding in advanced informationalized society. As we see car accident problems in motorization society light aspects necessarily accompy shady ones. Under the changing circumstances of advanced informationalization added values of information has become much higher. It causes computer crime, hacker, computer virus to come to the surface. In addition it can be said that infringement of intellectual property and privacy are threats brought by advanced information. Against these threats legal, institutional and insurance measures have been progressed, and newly security industry has been established. However, they are not adequate individually or totally. The future vision should be clarified, and countermeasures according to the visions have to be considered.

  7. Computer viruses

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1988-01-01

    The worm, Trojan horse, bacterium, and virus are destructive programs that attack information stored in a computer's memory. Virus programs, which propagate by incorporating copies of themselves into other programs, are a growing menace in the late-1980s world of unprotected, networked workstations and personal computers. Limited immunity is offered by memory protection hardware, digitally authenticated object programs,and antibody programs that kill specific viruses. Additional immunity can be gained from the practice of digital hygiene, primarily the refusal to use software from untrusted sources. Full immunity requires attention in a social dimension, the accountability of programmers.

  8. pLoc-mVirus: Predict subcellular localization of multi-location virus proteins via incorporating the optimal GO information into general PseAAC.

    PubMed

    Cheng, Xiang; Xiao, Xuan; Chou, Kuo-Chen

    2017-09-10

    Knowledge of subcellular locations of proteins is crucially important for in-depth understanding their functions in a cell. With the explosive growth of protein sequences generated in the postgenomic age, it is highly demanded to develop computational tools for timely annotating their subcellular locations based on the sequence information alone. The current study is focused on virus proteins. Although considerable efforts have been made in this regard, the problem is far from being solved yet. Most existing methods can be used to deal with single-location proteins only. Actually, proteins with multi-locations may have some special biological functions. This kind of multiplex proteins is particularly important for both basic research and drug design. Using the multi-label theory, we present a new predictor called "pLoc-mVirus" by extracting the optimal GO (Gene Ontology) information into the general PseAAC (Pseudo Amino Acid Composition). Rigorous cross-validation on a same stringent benchmark dataset indicated that the proposed pLoc-mVirus predictor is remarkably superior to iLoc-Virus, the state-of-the-art method in predicting virus protein subcellular localization. To maximize the convenience of most experimental scientists, a user-friendly web-server for the new predictor has been established at http://www.jci-bioinfo.cn/pLoc-mVirus/, by which users can easily get their desired results without the need to go through the complicated mathematics involved. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Computer Viruses. Legal and Policy Issues Facing Colleges and Universities.

    ERIC Educational Resources Information Center

    Johnson, David R.; And Others

    Compiled by various members of the higher educational community together with risk managers, computer center managers, and computer industry experts, this report recommends establishing policies on an institutional level to protect colleges and universities from computer viruses and the accompanying liability. Various aspects of the topic are…

  10. Flavonoid from Carica papaya inhibits NS2B-NS3 protease and prevents Dengue 2 viral assembly.

    PubMed

    Senthilvel, Padmanaban; Lavanya, Pandian; Kumar, Kalavathi Murugan; Swetha, Rayapadi; Anitha, Parimelzaghan; Bag, Susmita; Sarveswari, Sundaramoorthy; Vijayakumar, Vijayaparthasarathi; Ramaiah, Sudha; Anbarasu, Anand

    2013-01-01

    Dengue virus belongs to the virus family Flaviviridae. Dengue hemorrhagic disease caused by dengue virus is a public health problem worldwide. The viral non structural 2B and 3 (NS2B-NS3) protease complex is crucial for virus replication and hence, it is considered to be a good anti-viral target. Leaf extracts from Carica papaya is generally prescribed for patients with dengue fever, but there are no scientific evidences for its anti-dengue activity; hence we intended to investigate the anti-viral activity of compounds present in the leaves of Carica papaya against dengue 2 virus (DENV-2). We analysed the anti-dengue activities of the extracts from Carica papaya by using bioinformatics tools. Interestingly, we find the flavonoid quercetin with highest binding energy against NS2B-NS3 protease which is evident by the formation of six hydrogen bonds with the amino acid residues at the binding site of the receptor. Our results suggest that the flavonoids from Carica papaya have significant anti-dengue activities. ADME - Absorption, distribution, metabolism and excretion, BBB - Blood brain barrier, CYP - Cytochrome P450, DENV - - Dengue virus, DHF - Dengue hemorrhagic fever, DSS - Dengue shock syndrome, GCMS - - Gas chromatography- Mass spectrometry, MOLCAD - Molecular Computer Aided Design, NS - Non structural, PDB - Protein data bank, PMF - Potential Mean Force.

  11. Local rules simulation of the kinetics of virus capsid self-assembly.

    PubMed

    Schwartz, R; Shor, P W; Prevelige, P E; Berger, B

    1998-12-01

    A computer model is described for studying the kinetics of the self-assembly of icosahedral viral capsids. Solution of this problem is crucial to an understanding of the viral life cycle, which currently cannot be adequately addressed through laboratory techniques. The abstract simulation model employed to address this is based on the local rules theory of. Proc. Natl. Acad. Sci. USA. 91:7732-7736). It is shown that the principle of local rules, generalized with a model of kinetics and other extensions, can be used to simulate complicated problems in self-assembly. This approach allows for a computationally tractable molecular dynamics-like simulation of coat protein interactions while retaining many relevant features of capsid self-assembly. Three simple simulation experiments are presented to illustrate the use of this model. These show the dependence of growth and malformation rates on the energetics of binding interactions, the tolerance of errors in binding positions, and the concentration of subunits in the examples. These experiments demonstrate a tradeoff within the model between growth rate and fidelity of assembly for the three parameters. A detailed discussion of the computational model is also provided.

  12. Viruses in Water: The Problem, Some Solutions

    ERIC Educational Resources Information Center

    Gerba, Charles P.; And Others

    1975-01-01

    Increasing population and industrialization places heavy demands on water resources making recycling of wastewaters for domestic consumption inevitable. Eliminating human pathogenic viruses is a major problem of reclaiming wastewater. Present water treatment methods may not be sufficient to remove viruses. (MR)

  13. Homology geoinformation modeling of the threat of avian influenza occuring in a region

    NASA Astrophysics Data System (ADS)

    Myasnikova, S. I.

    2008-03-01

    This paper addresses the problem of modeling the likely foci of Avian Influenza emergence and spread. The factors contributing to the emergence and spread of the virus are identified. The connection of the factors with invariant structure (landscape map) is determined, and the complex (homotopic) coefficient is calculated, which takes into account the geographical inhomogeneity of the factors, and of the model conditions. The computer-aided mapping and geoinformation modeling procedures are used to assess the situation.

  14. Stability and Hopf bifurcation for a delayed SLBRS computer virus model.

    PubMed

    Zhang, Zizhen; Yang, Huizhong

    2014-01-01

    By incorporating the time delay due to the period that computers use antivirus software to clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed in this paper. The dynamical behaviors which include local stability and Hopf bifurcation are investigated by regarding the delay as bifurcating parameter. Specially, direction and stability of the Hopf bifurcation are derived by applying the normal form method and center manifold theory. Finally, an illustrative example is also presented to testify our analytical results.

  15. Ebola virus: A gap in drug design and discovery - experimental and computational perspective.

    PubMed

    Balmith, Marissa; Faya, Mbuso; Soliman, Mahmoud E S

    2017-03-01

    The Ebola virus, formally known as the Ebola hemorrhagic fever, is an acute viral syndrome causing sporadic outbreaks that have ravaged West Africa. Due to its extreme virulence and highly transmissible nature, Ebola has been classified as a category A bioweapon organism. Only recently have vaccine or drug regimens for the Ebola virus been developed, including Zmapp and peptides. In addition, existing drugs which have been repurposed toward anti-Ebola virus activity have been re-examined and are seen to be promising candidates toward combating Ebola. Drug development involving computational tools has been widely employed toward target-based drug design. Screening large libraries have greatly stimulated research toward effective anti-Ebola virus drug regimens. Current emphasis has been placed on the investigation of host proteins and druggable viral targets. There is a huge gap in the literature regarding guidelines in the discovery of Ebola virus inhibitors, which may be due to the lack of information on the Ebola drug targets, binding sites, and mechanism of action of the virus. This review focuses on Ebola virus inhibitors, drugs which could be repurposed to combat the Ebola virus, computational methods which study drug-target interactions as well as providing further insight into the mode of action of the Ebola virus. © 2016 John Wiley & Sons A/S.

  16. Computer Viruses and Related Threats: A Management Guide.

    ERIC Educational Resources Information Center

    Wack, John P.; Carnahan, Lisa J.

    This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…

  17. Modeling the state dependent impulse control for computer virus propagation under media coverage

    NASA Astrophysics Data System (ADS)

    Liang, Xiyin; Pei, Yongzhen; Lv, Yunfei

    2018-02-01

    A state dependent impulsive control model is proposed to model the spread of computer virus incorporating media coverage. By the successor function, the sufficient conditions for the existence and uniqueness of order-1 periodic solution are presented first. Secondly, for two classes of periodic solutions, the geometric property of successor function and the analogue of the Poincaré criterion are employed to obtain the stability results. These results show that the number of the infective computers is under the threshold all the time. Finally, the theoretic and numerical analysis show that media coverage can delay the spread of computer virus.

  18. Adjoint equations and analysis of complex systems: Application to virus infection modelling

    NASA Astrophysics Data System (ADS)

    Marchuk, G. I.; Shutyaev, V.; Bocharov, G.

    2005-12-01

    Recent development of applied mathematics is characterized by ever increasing attempts to apply the modelling and computational approaches across various areas of the life sciences. The need for a rigorous analysis of the complex system dynamics in immunology has been recognized since more than three decades ago. The aim of the present paper is to draw attention to the method of adjoint equations. The methodology enables to obtain information about physical processes and examine the sensitivity of complex dynamical systems. This provides a basis for a better understanding of the causal relationships between the immune system's performance and its parameters and helps to improve the experimental design in the solution of applied problems. We show how the adjoint equations can be used to explain the changes in hepatitis B virus infection dynamics between individual patients.

  19. Computational clustering for viral reference proteomes

    PubMed Central

    Chen, Chuming; Huang, Hongzhan; Mazumder, Raja; Natale, Darren A.; McGarvey, Peter B.; Zhang, Jian; Polson, Shawn W.; Wang, Yuqi; Wu, Cathy H.

    2016-01-01

    Motivation: The enormous number of redundant sequenced genomes has hindered efforts to analyze and functionally annotate proteins. As the taxonomy of viruses is not uniformly defined, viral proteomes pose special challenges in this regard. Grouping viruses based on the similarity of their proteins at proteome scale can normalize against potential taxonomic nomenclature anomalies. Results: We present Viral Reference Proteomes (Viral RPs), which are computed from complete virus proteomes within UniProtKB. Viral RPs based on 95, 75, 55, 35 and 15% co-membership in proteome similarity based clusters are provided. Comparison of our computational Viral RPs with UniProt’s curator-selected Reference Proteomes indicates that the two sets are consistent and complementary. Furthermore, each Viral RP represents a cluster of virus proteomes that was consistent with virus or host taxonomy. We provide BLASTP search and FTP download of Viral RP protein sequences, and a browser to facilitate the visualization of Viral RPs. Availability and implementation: http://proteininformationresource.org/rps/viruses/ Contact: chenc@udel.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:27153712

  20. Stability and Hopf Bifurcation for a Delayed SLBRS Computer Virus Model

    PubMed Central

    Yang, Huizhong

    2014-01-01

    By incorporating the time delay due to the period that computers use antivirus software to clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed in this paper. The dynamical behaviors which include local stability and Hopf bifurcation are investigated by regarding the delay as bifurcating parameter. Specially, direction and stability of the Hopf bifurcation are derived by applying the normal form method and center manifold theory. Finally, an illustrative example is also presented to testify our analytical results. PMID:25202722

  1. The FELICIA bulletin board system and the IRBIS anonymous FTP server: Computer security information sources for the DOE community. CIAC-2302

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W.J.

    1993-11-03

    The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systemsmore » and obtain files from them.« less

  2. Unraveling the Web of Viroinformatics: Computational Tools and Databases in Virus Research

    PubMed Central

    Priyadarshini, Pragya; Vrati, Sudhanshu

    2014-01-01

    The beginning of the second century of research in the field of virology (the first virus was discovered in 1898) was marked by its amalgamation with bioinformatics, resulting in the birth of a new domain—viroinformatics. The availability of more than 100 Web servers and databases embracing all or specific viruses (for example, dengue virus, influenza virus, hepatitis virus, human immunodeficiency virus [HIV], hemorrhagic fever virus [HFV], human papillomavirus [HPV], West Nile virus, etc.) as well as distinct applications (comparative/diversity analysis, viral recombination, small interfering RNA [siRNA]/short hairpin RNA [shRNA]/microRNA [miRNA] studies, RNA folding, protein-protein interaction, structural analysis, and phylotyping and genotyping) will definitely aid the development of effective drugs and vaccines. However, information about their access and utility is not available at any single source or on any single platform. Therefore, a compendium of various computational tools and resources dedicated specifically to virology is presented in this article. PMID:25428870

  3. Unraveling the web of viroinformatics: computational tools and databases in virus research.

    PubMed

    Sharma, Deepak; Priyadarshini, Pragya; Vrati, Sudhanshu

    2015-02-01

    The beginning of the second century of research in the field of virology (the first virus was discovered in 1898) was marked by its amalgamation with bioinformatics, resulting in the birth of a new domain--viroinformatics. The availability of more than 100 Web servers and databases embracing all or specific viruses (for example, dengue virus, influenza virus, hepatitis virus, human immunodeficiency virus [HIV], hemorrhagic fever virus [HFV], human papillomavirus [HPV], West Nile virus, etc.) as well as distinct applications (comparative/diversity analysis, viral recombination, small interfering RNA [siRNA]/short hairpin RNA [shRNA]/microRNA [miRNA] studies, RNA folding, protein-protein interaction, structural analysis, and phylotyping and genotyping) will definitely aid the development of effective drugs and vaccines. However, information about their access and utility is not available at any single source or on any single platform. Therefore, a compendium of various computational tools and resources dedicated specifically to virology is presented in this article. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  4. ISCB Ebola Award for Important Future Research on the Computational Biology of Ebola Virus

    PubMed Central

    Karp, Peter D.; Berger, Bonnie; Kovats, Diane; Lengauer, Thomas; Linial, Michal; Sabeti, Pardis; Hide, Winston; Rost, Burkhard

    2015-01-01

    Speed is of the essence in combating Ebola; thus, computational approaches should form a significant component of Ebola research. As for the development of any modern drug, computational biology is uniquely positioned to contribute through comparative analysis of the genome sequences of Ebola strains as well as 3-D protein modeling. Other computational approaches to Ebola may include large-scale docking studies of Ebola proteins with human proteins and with small-molecule libraries, computational modeling of the spread of the virus, computational mining of the Ebola literature, and creation of a curated Ebola database. Taken together, such computational efforts could significantly accelerate traditional scientific approaches. In recognition of the need for important and immediate solutions from the field of computational biology against Ebola, the International Society for Computational Biology (ISCB) announces a prize for an important computational advance in fighting the Ebola virus. ISCB will confer the ISCB Fight against Ebola Award, along with a prize of US$2,000, at its July 2016 annual meeting (ISCB Intelligent Systems for Molecular Biology (ISMB) 2016, Orlando, Florida). PMID:26097686

  5. ISCB Ebola Award for Important Future Research on the Computational Biology of Ebola Virus.

    PubMed

    Karp, Peter D; Berger, Bonnie; Kovats, Diane; Lengauer, Thomas; Linial, Michal; Sabeti, Pardis; Hide, Winston; Rost, Burkhard

    2015-01-01

    Speed is of the essence in combating Ebola; thus, computational approaches should form a significant component of Ebola research. As for the development of any modern drug, computational biology is uniquely positioned to contribute through comparative analysis of the genome sequences of Ebola strains as well as 3-D protein modeling. Other computational approaches to Ebola may include large-scale docking studies of Ebola proteins with human proteins and with small-molecule libraries, computational modeling of the spread of the virus, computational mining of the Ebola literature, and creation of a curated Ebola database. Taken together, such computational efforts could significantly accelerate traditional scientific approaches. In recognition of the need for important and immediate solutions from the field of computational biology against Ebola, the International Society for Computational Biology (ISCB) announces a prize for an important computational advance in fighting the Ebola virus. ISCB will confer the ISCB Fight against Ebola Award, along with a prize of US$2,000, at its July 2016 annual meeting (ISCB Intelligent Systems for Molecular Biology (ISMB) 2016, Orlando, Florida).

  6. Computational approaches to predict bacteriophage–host relationships

    PubMed Central

    Edwards, Robert A.; McNair, Katelyn; Faust, Karoline; Raes, Jeroen; Dutilh, Bas E.

    2015-01-01

    Metagenomics has changed the face of virus discovery by enabling the accurate identification of viral genome sequences without requiring isolation of the viruses. As a result, metagenomic virus discovery leaves the first and most fundamental question about any novel virus unanswered: What host does the virus infect? The diversity of the global virosphere and the volumes of data obtained in metagenomic sequencing projects demand computational tools for virus–host prediction. We focus on bacteriophages (phages, viruses that infect bacteria), the most abundant and diverse group of viruses found in environmental metagenomes. By analyzing 820 phages with annotated hosts, we review and assess the predictive power of in silico phage–host signals. Sequence homology approaches are the most effective at identifying known phage–host pairs. Compositional and abundance-based methods contain significant signal for phage–host classification, providing opportunities for analyzing the unknowns in viral metagenomes. Together, these computational approaches further our knowledge of the interactions between phages and their hosts. Importantly, we find that all reviewed signals significantly link phages to their hosts, illustrating how current knowledge and insights about the interaction mechanisms and ecology of coevolving phages and bacteria can be exploited to predict phage–host relationships, with potential relevance for medical and industrial applications. PMID:26657537

  7. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    NASA Astrophysics Data System (ADS)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  8. In Silico Analysis of Epitope-Based Vaccine Candidates against Hepatitis B Virus Polymerase Protein

    PubMed Central

    Zheng, Juzeng; Lin, Xianfan; Wang, Xiuyan; Zheng, Liyu; Lan, Songsong; Jin, Sisi; Ou, Zhanfan; Wu, Jinming

    2017-01-01

    Hepatitis B virus (HBV) infection has persisted as a major public health problem due to the lack of an effective treatment for those chronically infected. Therapeutic vaccination holds promise, and targeting HBV polymerase is pivotal for viral eradication. In this research, a computational approach was employed to predict suitable HBV polymerase targeting multi-peptides for vaccine candidate selection. We then performed in-depth computational analysis to evaluate the predicted epitopes’ immunogenicity, conservation, population coverage, and toxicity. Lastly, molecular docking and MHC-peptide complex stabilization assay were utilized to determine the binding energy and affinity of epitopes to the HLA-A0201 molecule. Criteria-based analysis provided four predicted epitopes, RVTGGVFLV, VSIPWTHKV, YMDDVVLGA and HLYSHPIIL. Assay results indicated the lowest binding energy and high affinity to the HLA-A0201 molecule for epitopes VSIPWTHKV and YMDDVVLGA and epitopes RVTGGVFLV and VSIPWTHKV, respectively. Regions 307 to 320 and 377 to 387 were considered to have the highest probability to be involved in B cell epitopes. The T cell and B cell epitopes identified in this study are promising targets for an epitope-focused, peptide-based HBV vaccine, and provide insight into HBV-induced immune response. PMID:28509875

  9. Viral expression associated with gastrointestinal adenocarcinomas in TCGA high-throughput sequencing data

    PubMed Central

    2013-01-01

    Background Up to 20% of cancers worldwide are thought to be associated with microbial pathogens, including bacteria and viruses. The widely used methods of viral infection detection are usually limited to a few a priori suspected viruses in one cancer type. To our knowledge, there have not been many broad screening approaches to address this problem more comprehensively. Methods In this study, we performed a comprehensive screening for viruses in nine common cancers using a multistep computational approach. Tumor transcriptome and genome sequencing data were available from The Cancer Genome Atlas (TCGA). Nine hundred fifty eight primary tumors in nine common cancers with poor prognosis were screened against a non-redundant database of virus sequences. DNA sequences from normal matched tissue specimens were used as controls to test whether each virus is associated with tumors. Results We identified human papilloma virus type 18 (HPV-18) and four human herpes viruses (HHV) types 4, 5, 6B, and 8, also known as EBV, CMV, roseola virus, and KSHV, in colon, rectal, and stomach adenocarcinomas. In total, 59% of screened gastrointestinal adenocarcinomas (GIA) were positive for at least one virus: 26% for EBV, 21% for CMV, 7% for HHV-6B, and 20% for HPV-18. Over 20% of tumors were co-infected with multiple viruses. Two viruses (EBV and CMV) were statistically significantly associated with colorectal cancers when compared to the matched healthy tissues from the same individuals (p = 0.02 and 0.03, respectively). HPV-18 was not detected in DNA, and thus, no association testing was possible. Nevertheless, HPV-18 expression patterns suggest viral integration in the host genome, consistent with the potentially oncogenic nature of HPV-18 in colorectal adenocarcinomas. The estimated counts of viral copies were below one per cell for all identified viruses and approached the detection limit. Conclusions Our comprehensive screening for viruses in multiple cancer types using next-generation sequencing data clearly demonstrates the presence of viral sequences in GIA. EBV, CMV, and HPV-18 are potentially causal for GIA, although their oncogenic role is yet to be established. PMID:24279398

  10. World Reference Center for Arboviruses.

    DTIC Science & Technology

    1997-07-01

    reagent bank, to identify emerging viruses by antigenic and genetic methods, and (d) ordering and cataloguing the virus collection into a computer...encephalitis viruses in mosquitoes collected in Rhode Island and Connecticut. Eastern equine encephalitis (EKE) virus was isolated from 93 of 1800...Results of ri state mosquito- virus isolation studies Viruses identified Date of first isolation Number of isolations Date of last isolation Other

  11. VirusDetect: An automated pipeline for efficient virus discovery using deep sequencing of small RNAs

    USDA-ARS?s Scientific Manuscript database

    Accurate detection of viruses in plants and animals is critical for agriculture production and human health. Deep sequencing and assembly of virus-derived siRNAs has proven to be a highly efficient approach for virus discovery. However, to date no computational tools specifically designed for both k...

  12. Effects of maximum node degree on computer virus spreading in scale-free networks

    NASA Astrophysics Data System (ADS)

    Bamaarouf, O.; Ould Baba, A.; Lamzabi, S.; Rachadi, A.; Ez-Zahraouy, H.

    2017-10-01

    The increase of the use of the Internet networks favors the spread of viruses. In this paper, we studied the spread of viruses in the scale-free network with different topologies based on the Susceptible-Infected-External (SIE) model. It is found that the network structure influences the virus spreading. We have shown also that the nodes of high degree are more susceptible to infection than others. Furthermore, we have determined a critical maximum value of node degree (Kc), below which the network is more resistible and the computer virus cannot expand into the whole network. The influence of network size is also studied. We found that the network with low size is more effective to reduce the proportion of infected nodes.

  13. Viral Diagnostics in Plants Using Next Generation Sequencing: Computational Analysis in Practice.

    PubMed

    Jones, Susan; Baizan-Edge, Amanda; MacFarlane, Stuart; Torrance, Lesley

    2017-01-01

    Viruses cause significant yield and quality losses in a wide variety of cultivated crops. Hence, the detection and identification of viruses is a crucial facet of successful crop production and of great significance in terms of world food security. Whilst the adoption of molecular techniques such as RT-PCR has increased the speed and accuracy of viral diagnostics, such techniques only allow the detection of known viruses, i.e., each test is specific to one or a small number of related viruses. Therefore, unknown viruses can be missed and testing can be slow and expensive if molecular tests are unavailable. Methods for simultaneous detection of multiple viruses have been developed, and (NGS) is now a principal focus of this area, as it enables unbiased and hypothesis-free testing of plant samples. The development of NGS protocols capable of detecting multiple known and emergent viruses present in infected material is proving to be a major advance for crops, nuclear stocks or imported plants and germplasm, in which disease symptoms are absent, unspecific or only triggered by multiple viruses. Researchers want to answer the question "how many different viruses are present in this crop plant?" without knowing what they are looking for: RNA-sequencing (RNA-seq) of plant material allows this question to be addressed. As well as needing efficient nucleic acid extraction and enrichment protocols, virus detection using RNA-seq requires fast and robust bioinformatics methods to enable host sequence removal and virus classification. In this review recent studies that use RNA-seq for virus detection in a variety of crop plants are discussed with specific emphasis on the computational methods implemented. The main features of a number of specific bioinformatics workflows developed for virus detection from NGS data are also outlined and possible reasons why these have not yet been widely adopted are discussed. The review concludes by discussing the future directions of this field, including the use of bioinformatics tools for virus detection deployed in analytical environments using cloud computing.

  14. Recent progress in computational approaches to studying the M2 proton channel and its implication to drug design against influenza viruses.

    PubMed

    Du, Qi-Shi; Huang, Ri-Bo

    2012-05-01

    For quite a long period of time in history, many intense efforts have been made to determine the 3D (three-dimensional) structure of the M2 proton channel. The reason why the M2 proton channel has attracted so many attentions is because (1) it is the key for really understanding the life cycle of influenza viruses, and (2) it is indispensable for conducting rational drug design against the flu viruses. Recently, the long-sough 3D structures of the M2 proton channels for both influenza A and B viruses were consecutively successfully determined by the high-resolution NMR spectroscopy (Schnell J.R. and Chou, J.J., Nature, 2008, 451: 591-595; Wang, J., Pielak, R.M., McClintock, M.A., and Chou, J.J., Nature Structural & Molecular Biology, 2009,16: 1267-1271). Such a milestone work has provided a solid structural basis for in-depth understanding the action mechanism of the M2 channel and rationally designing effective drugs against influenza viruses. This review is devoted to, with the focus on the M2 proton channel of influenza A, addressing a series of relevant problems, such as how to correctly understand the novel allosteric inhibition mechanism inferred from the NMR structure that is completely different from the traditional view, what the possible impacts are to the previous functional studies in this area, and what kind of new strategy can be stimulated for drug development against influenza.

  15. PREDICTING ATTENUATION OF VIRUSES DURING PERCOLATION IN SOILS: 2. USER'S GUIDE TO THE VIRULO 1.0 COMPUTER MODEL

    EPA Science Inventory

    In the EPA document Predicting Attenuation of Viruses During Percolation in Soils 1. Probabilistic Model the conceptual, theoretical, and mathematical foundations for a predictive screening model were presented. In this current volume we present a User's Guide for the computer mo...

  16. Evaluation of a Biometric Keystroke Typing Dynamics Computer Security System

    DTIC Science & Technology

    1992-03-01

    intrusions, numerous computer systems have been threatened or destroyed by virus attacks. A recent example was the virus called " Michelangelo ," which...threatened to destroy all data on infected hard disks on the birthday of the artist Michelangelo , 6 March, in 1992. During the 1991 Persian Gulf War

  17. Structure and sequence based functional annotation of Zika virus NS2b protein: Computational insights.

    PubMed

    Aguilera-Pesantes, Daniel; Méndez, Miguel A

    2017-10-28

    While Zika virus (ZIKV) outbreaks are a growing concern for global health, a deep understanding about the virus is lacking. Here we report a contribution to the basic science on the virus- a detailed computational analysis of the non structural protein NS2b. This protein acts as a cofactor for the NS3 protease (NS3Pro) domain that is important on the viral life cycle, and is an interesting target for drug development. We found that ZIKV NS2b cofactor is highly similar to other virus within the Flavivirus genus, especially to West Nile Virus, suggesting that it is completely necessary for the protease complex activity. Furthermore, the ZIKV NS2b has an important role to the function and stability of the ZIKV NS3 protease domain even when presents a low conservation score. In addition, ZIKV NS2b is mostly rigid, which could imply a non dynamic nature in substrate recognition. Finally, by performing a computational alanine scanning mutagenesis, we found that residues Gly 52 and Asp 83 in the NS2b could be important in substrate recognition. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Know Your Enemy: Successful Bioinformatic Approaches to Predict Functional RNA Structures in Viral RNAs.

    PubMed

    Lim, Chun Shen; Brown, Chris M

    2017-01-01

    Structured RNA elements may control virus replication, transcription and translation, and their distinct features are being exploited by novel antiviral strategies. Viral RNA elements continue to be discovered using combinations of experimental and computational analyses. However, the wealth of sequence data, notably from deep viral RNA sequencing, viromes, and metagenomes, necessitates computational approaches being used as an essential discovery tool. In this review, we describe practical approaches being used to discover functional RNA elements in viral genomes. In addition to success stories in new and emerging viruses, these approaches have revealed some surprising new features of well-studied viruses e.g., human immunodeficiency virus, hepatitis C virus, influenza, and dengue viruses. Some notable discoveries were facilitated by new comparative analyses of diverse viral genome alignments. Importantly, comparative approaches for finding RNA elements embedded in coding and non-coding regions differ. With the exponential growth of computer power we have progressed from stem-loop prediction on single sequences to cutting edge 3D prediction, and from command line to user friendly web interfaces. Despite these advances, many powerful, user friendly prediction tools and resources are underutilized by the virology community.

  19. Know Your Enemy: Successful Bioinformatic Approaches to Predict Functional RNA Structures in Viral RNAs

    PubMed Central

    Lim, Chun Shen; Brown, Chris M.

    2018-01-01

    Structured RNA elements may control virus replication, transcription and translation, and their distinct features are being exploited by novel antiviral strategies. Viral RNA elements continue to be discovered using combinations of experimental and computational analyses. However, the wealth of sequence data, notably from deep viral RNA sequencing, viromes, and metagenomes, necessitates computational approaches being used as an essential discovery tool. In this review, we describe practical approaches being used to discover functional RNA elements in viral genomes. In addition to success stories in new and emerging viruses, these approaches have revealed some surprising new features of well-studied viruses e.g., human immunodeficiency virus, hepatitis C virus, influenza, and dengue viruses. Some notable discoveries were facilitated by new comparative analyses of diverse viral genome alignments. Importantly, comparative approaches for finding RNA elements embedded in coding and non-coding regions differ. With the exponential growth of computer power we have progressed from stem-loop prediction on single sequences to cutting edge 3D prediction, and from command line to user friendly web interfaces. Despite these advances, many powerful, user friendly prediction tools and resources are underutilized by the virology community. PMID:29354101

  20. Dynamic properties of epidemic spreading on finite size complex networks

    NASA Astrophysics Data System (ADS)

    Li, Ying; Liu, Yang; Shan, Xiu-Ming; Ren, Yong; Jiao, Jian; Qiu, Ben

    2005-11-01

    The Internet presents a complex topological structure, on which computer viruses can easily spread. By using theoretical analysis and computer simulation methods, the dynamic process of disease spreading on finite size networks with complex topological structure is investigated. On the finite size networks, the spreading process of SIS (susceptible-infected-susceptible) model is a finite Markov chain with an absorbing state. Two parameters, the survival probability and the conditional infecting probability, are introduced to describe the dynamic properties of disease spreading on finite size networks. Our results can help understanding computer virus epidemics and other spreading phenomena on communication and social networks. Also, knowledge about the dynamic character of virus spreading is helpful for adopting immunity policy.

  1. 3D image reconstruction algorithms for cryo-electron-microscopy images of virus particles

    NASA Astrophysics Data System (ADS)

    Doerschuk, Peter C.; Johnson, John E.

    2000-11-01

    A statistical model for the object and the complete image formation process in cryo electron microscopy of viruses is presented. Using this model, maximum likelihood reconstructions of the 3D structure of viruses are computed using the expectation maximization algorithm and an example based on Cowpea mosaic virus is provided.

  2. Zika Virus-Associated Cognitive Impairment in Adolescent, 2016.

    PubMed

    Zucker, Jason; Neu, Natalie; Chiriboga, Claudia A; Hinton, Veronica J; Leonardo, Marc; Sheikh, Arif; Thakur, Kiran

    2017-06-01

    Incidence of neurologic manifestations associated with Zika virus infection has been increasing. In 2016, neuropsychological and cognitive changes developed in an adolescent after travel to a Zika virus-endemic area. Single-photon emission computed tomography and neuropsychological testing raised the possibility that Zika virus infection may lead to neuropsychiatric and cognitive symptoms.

  3. Crispen's Five Antivirus Rules.

    ERIC Educational Resources Information Center

    Crispen, Patrick Douglas

    2000-01-01

    Provides rules for protecting computers from viruses, Trojan horses, or worms. Topics include purchasing commercial antivirus programs and keeping them updated; updating virus definitions weekly; precautions before opening attached files; macro virus protection in Microsoft Word; and precautions with executable files. (LRW)

  4. Computational prediction of virus-human protein-protein interactions using embedding kernelized heterogeneous data.

    PubMed

    Nourani, Esmaeil; Khunjush, Farshad; Durmuş, Saliha

    2016-05-24

    Pathogenic microorganisms exploit host cellular mechanisms and evade host defense mechanisms through molecular pathogen-host interactions (PHIs). Therefore, comprehensive analysis of these PHI networks should be an initial step for developing effective therapeutics against infectious diseases. Computational prediction of PHI data is gaining increasing demand because of scarcity of experimental data. Prediction of protein-protein interactions (PPIs) within PHI systems can be formulated as a classification problem, which requires the knowledge of non-interacting protein pairs. This is a restricting requirement since we lack datasets that report non-interacting protein pairs. In this study, we formulated the "computational prediction of PHI data" problem using kernel embedding of heterogeneous data. This eliminates the abovementioned requirement and enables us to predict new interactions without randomly labeling protein pairs as non-interacting. Domain-domain associations are used to filter the predicted results leading to 175 novel PHIs between 170 human proteins and 105 viral proteins. To compare our results with the state-of-the-art studies that use a binary classification formulation, we modified our settings to consider the same formulation. Detailed evaluations are conducted and our results provide more than 10 percent improvements for accuracy and AUC (area under the receiving operating curve) results in comparison with state-of-the-art methods.

  5. Message from the ISCB: ISCB Ebola award for important future research on the computational biology of Ebola virus.

    PubMed

    Karp, Peter D; Berger, Bonnie; Kovats, Diane; Lengauer, Thomas; Linial, Michal; Sabeti, Pardis; Hide, Winston; Rost, Burkhard

    2015-02-15

    Speed is of the essence in combating Ebola; thus, computational approaches should form a significant component of Ebola research. As for the development of any modern drug, computational biology is uniquely positioned to contribute through comparative analysis of the genome sequences of Ebola strains and three-dimensional protein modeling. Other computational approaches to Ebola may include large-scale docking studies of Ebola proteins with human proteins and with small-molecule libraries, computational modeling of the spread of the virus, computational mining of the Ebola literature and creation of a curated Ebola database. Taken together, such computational efforts could significantly accelerate traditional scientific approaches. In recognition of the need for important and immediate solutions from the field of computational biology against Ebola, the International Society for Computational Biology (ISCB) announces a prize for an important computational advance in fighting the Ebola virus. ISCB will confer the ISCB Fight against Ebola Award, along with a prize of US$2000, at its July 2016 annual meeting (ISCB Intelligent Systems for Molecular Biology 2016, Orlando, FL). dkovats@iscb.org or rost@in.tum.de. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  6. HeLa Nucleic Acid Contamination in The Cancer Genome Atlas Leads to the Misidentification of Human Papillomavirus 18

    PubMed Central

    Cantalupo, Paul G.; Katz, Joshua P.

    2015-01-01

    ABSTRACT We searched The Cancer Genome Atlas (TCGA) database for viruses by comparing non-human reads present in transcriptome sequencing (RNA-Seq) and whole-exome sequencing (WXS) data to viral sequence databases. Human papillomavirus 18 (HPV18) is an etiologic agent of cervical cancer, and as expected, we found robust expression of HPV18 genes in cervical cancer samples. In agreement with previous studies, we also found HPV18 transcripts in non-cervical cancer samples, including those from the colon, rectum, and normal kidney. However, in each of these cases, HPV18 gene expression was low, and single-nucleotide variants and positions of genomic alignments matched the integrated portion of HPV18 present in HeLa cells. Chimeric reads that match a known virus-cell junction of HPV18 integrated in HeLa cells were also present in some samples. We hypothesize that HPV18 sequences in these non-cervical samples are due to nucleic acid contamination from HeLa cells. This finding highlights the problems that contamination presents in computational virus detection pipelines. IMPORTANCE Viruses associated with cancer can be detected by searching tumor sequence databases. Several studies involving searches of the TCGA database have reported the presence of HPV18, a known cause of cervical cancer, in a small number of additional cancers, including those of the rectum, kidney, and colon. We have determined that the sequences related to HPV18 in non-cervical samples are due to nucleic acid contamination from HeLa cells. To our knowledge, this is the first report of the misidentification of viruses in next-generation sequencing data of tumors due to contamination with a cancer cell line. These results raise awareness of the difficulty of accurately identifying viruses in human sequence databases. PMID:25631090

  7. Operation, Maintenance and Performance Evaluation of the Potomac Estuary Experimental Water Treatment Plant. Appendix. Volume 1.

    DTIC Science & Technology

    1983-09-01

    Biochemical Screening A-i-12 Quantitative Determination of Viruses A-1-13 Virus Adsorption A-1-13 Elution A-1-13 Reconcentration A-1-13 Virus Assay A-I... VIRUSES VIRUS ADSORPTION " The virus concentration method was based on an adsorption/elution procedure described in the 14th edition of Standard...the replication process of one virus may be inhibited by another. If the inoculum contains few infective viruses , interference problems are of little

  8. Development of homologous viral internal controls for use in RT-PCR assays of waterborne enteric viruses.

    PubMed

    Parshionikar, Sandhya U; Cashdollar, Jennifer; Fout, G Shay

    2004-10-01

    Enteric viruses often contaminate water sources causing frequent outbreaks of gastroenteritis. Reverse transcription-polymerase chain reaction (RT-PCR) assays are commonly used for detection of human enteric viruses in environmental and drinking water samples. RT-PCR provides a means to rapidly detect low levels of these viruses, but it is sensitive to inhibitors that are present in water samples. Inhibitors of RT-PCR are concentrated along with viruses during sample processing. While procedures have been developed to remove inhibitors, none of them completely remove all inhibitors from all types of water matrices. This problem requires that adequate controls be used to distinguish true from potentially false-negative results. To address this problem, we have developed homologous viral internal controls for hepatitis A virus (HAV), poliovirus, Norwalk virus and rotavirus. These internal controls can be used in RT-PCR assays for the detection of the above viruses by competitive amplification, thereby allowing the detection of false negatives in processed water samples. The internal controls developed in this study were successfully tested with virus-seeded environmental water sample concentrates.

  9. Viral Diagnostics in Plants Using Next Generation Sequencing: Computational Analysis in Practice

    PubMed Central

    Jones, Susan; Baizan-Edge, Amanda; MacFarlane, Stuart; Torrance, Lesley

    2017-01-01

    Viruses cause significant yield and quality losses in a wide variety of cultivated crops. Hence, the detection and identification of viruses is a crucial facet of successful crop production and of great significance in terms of world food security. Whilst the adoption of molecular techniques such as RT-PCR has increased the speed and accuracy of viral diagnostics, such techniques only allow the detection of known viruses, i.e., each test is specific to one or a small number of related viruses. Therefore, unknown viruses can be missed and testing can be slow and expensive if molecular tests are unavailable. Methods for simultaneous detection of multiple viruses have been developed, and (NGS) is now a principal focus of this area, as it enables unbiased and hypothesis-free testing of plant samples. The development of NGS protocols capable of detecting multiple known and emergent viruses present in infected material is proving to be a major advance for crops, nuclear stocks or imported plants and germplasm, in which disease symptoms are absent, unspecific or only triggered by multiple viruses. Researchers want to answer the question “how many different viruses are present in this crop plant?” without knowing what they are looking for: RNA-sequencing (RNA-seq) of plant material allows this question to be addressed. As well as needing efficient nucleic acid extraction and enrichment protocols, virus detection using RNA-seq requires fast and robust bioinformatics methods to enable host sequence removal and virus classification. In this review recent studies that use RNA-seq for virus detection in a variety of crop plants are discussed with specific emphasis on the computational methods implemented. The main features of a number of specific bioinformatics workflows developed for virus detection from NGS data are also outlined and possible reasons why these have not yet been widely adopted are discussed. The review concludes by discussing the future directions of this field, including the use of bioinformatics tools for virus detection deployed in analytical environments using cloud computing. PMID:29123534

  10. Understanding Virtual Epidemics: Children's Folk Conceptions of a Computer Virus

    ERIC Educational Resources Information Center

    Kafai, Yasmin B.

    2008-01-01

    Our work investigates the annual outbreak of Whypox, a virtual epidemic in Whyville.net, a virtual world with over 1.2 million registered players ages 8-16. We examined online and classroom participants' understanding of a computer virus using surveys and design activities. Our analyses reveal that students have a mostly naive understanding of a…

  11. An Historical Analysis of Factors Contributing to the Emergence of the Intrusion Detection Discipline and its Role in Information Assurance

    DTIC Science & Technology

    2005-03-01

    computing equipment, the idea of computer security has also become embedded in our society. Ever since the Michelangelo virus of 1992, when...Bibliography TheWorldwide Michelangelo Virus Scare of 1992. Retrieved February 2, 2004 from http://www.vmyths.com/fas/fas_inc/inc1.cfm Allen, J

  12. Viruses in maize and Johnsongrass in southern Ohio

    USDA-ARS?s Scientific Manuscript database

    Two major maize viruses in the United States, Maize dwarf mosaic virus and Maize chlorotic dwarf virus, were first described in Southern Ohio and surrounding regions in the 1960s when they were major problems in maize (Zea mays L.) production. Planting resistant varieties and changing cultural prac...

  13. Respiratory Syncytial Virus Infections

    MedlinePlus

    Respiratory syncytial virus (RSV) causes mild, cold-like symptoms in adults and older healthy children. It can cause serious problems in ... tests can tell if your child has the virus. There is no specific treatment. You should give ...

  14. Research Advances: DNA Computing Targets West Nile Virus, Other Deadly Diseases, and Tic-Tac-Toe; Marijuana Component May Offer Hope for Alzheimer's Disease Treatment; New Wound Dressing May Lead to Maggot Therapy--Without the Maggots

    ERIC Educational Resources Information Center

    King, Angela G.

    2007-01-01

    This article presents three reports of research advances. The first report describes a deoxyribonucleic acid (DNA)-based computer that could lead to faster, more accurate tests for diagnosing West Nile Virus and bird flu. Representing the first "medium-scale integrated molecular circuit," it is the most powerful computing device of its type to…

  15. Human immunodeficiency virus/acquired immunodeficiency syndrome and infertility: emerging problems in the era of highly active antiretrovirals.

    PubMed

    Kushnir, Vitaly A; Lewis, William

    2011-09-01

    To review the effects of human immunodeficiency virus/acquired immunodeficiency syndrome (HIV/AIDS) in terms of its associated comorbid conditions and the side effects of antiretroviral treatment on fertility. PubMed computer search to identify relevant articles. Research institution. None. None. None. Biological alterations in reproductive physiology may account for subfertility in patients infected with HIV. Psychosocial factors in patients with HIV infection may affect their reproductive desires and outcomes. Antiretroviral medications may have direct toxicity on gametes and embryos. Available evidence indicates that fertility treatments can be a safe option for couples with HIV-discordant infection status, although the potential risk of viral transmission cannot be completely eliminated. Because their potential reproductive desires are increasingly becoming a concern in the health care of young HIV-infected patients, additional data are needed to address the effect of HIV and its treatments on their fertility and reproductive outcomes. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  16. Prediction of common epitopes on hemagglutinin of the influenza A virus (H1 subtype).

    PubMed

    Guo, Chunyan; Xie, Xin; Li, Huijin; Zhao, Penghua; Zhao, Xiangrong; Sun, Jingying; Wang, Haifang; Liu, Yang; Li, Yan; Hu, Qiaoxia; Hu, Jun; Li, Yuan

    2015-02-01

    Influenza A virus infection is a persistent threat to public health worldwide due to hemagglutinin (HA) variation. Current vaccines against influenza A virus provide immunity to viral isolates similar to vaccine strains. Antibodies against common epitopes provide immunity to diverse influenza virus strains and protect against future pandemic influenza. Therefore, it is vital to analyze common HA antigenic epitopes of influenza virus. In this study, 14 strains of monoclonal antibodies with high sensitivity to common epitopes of influenza virus antigens identified in our previous study were selected as the tool to predict common HA epitopes. The common HA antigenic epitopes were divided into four categories by ELISA blocking experiments, and separately, into three categories according to the preliminary results of computer simulation. Comparison between the results of computer simulations and ELISA blocking experiments indicated that at least two classes of common epitopes are present in influenza virus HA. This study provides experimental data for improving the prediction of HA epitopes of influenza virus (H1 subtype) and the development of a potential universal vaccine as well as a novel approach for the prediction of epitopes on other pathogenic microorganisms. Copyright © 2014 Elsevier Inc. All rights reserved.

  17. Arctic-like Rabies Virus, Bangladesh

    PubMed Central

    Jamil, Khondoker Mahbuba; Hossain, Moazzem; Matsumoto, Takashi; Ali, Mohammad Azmat; Hossain, Sohrab; Hossain, Shakhawat; Islam, Aminul; Nasiruddin, Mohammad; Nishizono, Akira

    2012-01-01

    Arctic/Arctic-like rabies virus group 2 spread into Bangladesh ≈32 years ago. Because rabies is endemic to and a major public health problem in this country, we characterized this virus group. Its glycoprotein has 3 potential N-glycosylation sites that affect viral pathogenesis. Diversity of rabies virus might have public health implications in Bangladesh. PMID:23171512

  18. Diffusion archeology for diffusion progression history reconstruction.

    PubMed

    Sefer, Emre; Kingsford, Carl

    2016-11-01

    Diffusion through graphs can be used to model many real-world processes, such as the spread of diseases, social network memes, computer viruses, or water contaminants. Often, a real-world diffusion cannot be directly observed while it is occurring - perhaps it is not noticed until some time has passed, continuous monitoring is too costly, or privacy concerns limit data access. This leads to the need to reconstruct how the present state of the diffusion came to be from partial diffusion data. Here, we tackle the problem of reconstructing a diffusion history from one or more snapshots of the diffusion state. This ability can be invaluable to learn when certain computer nodes are infected or which people are the initial disease spreaders to control future diffusions. We formulate this problem over discrete-time SEIRS-type diffusion models in terms of maximum likelihood. We design methods that are based on submodularity and a novel prize-collecting dominating-set vertex cover (PCDSVC) relaxation that can identify likely diffusion steps with some provable performance guarantees. Our methods are the first to be able to reconstruct complete diffusion histories accurately in real and simulated situations. As a special case, they can also identify the initial spreaders better than the existing methods for that problem. Our results for both meme and contaminant diffusion show that the partial diffusion data problem can be overcome with proper modeling and methods, and that hidden temporal characteristics of diffusion can be predicted from limited data.

  19. Diffusion archeology for diffusion progression history reconstruction

    PubMed Central

    Sefer, Emre; Kingsford, Carl

    2015-01-01

    Diffusion through graphs can be used to model many real-world processes, such as the spread of diseases, social network memes, computer viruses, or water contaminants. Often, a real-world diffusion cannot be directly observed while it is occurring — perhaps it is not noticed until some time has passed, continuous monitoring is too costly, or privacy concerns limit data access. This leads to the need to reconstruct how the present state of the diffusion came to be from partial diffusion data. Here, we tackle the problem of reconstructing a diffusion history from one or more snapshots of the diffusion state. This ability can be invaluable to learn when certain computer nodes are infected or which people are the initial disease spreaders to control future diffusions. We formulate this problem over discrete-time SEIRS-type diffusion models in terms of maximum likelihood. We design methods that are based on submodularity and a novel prize-collecting dominating-set vertex cover (PCDSVC) relaxation that can identify likely diffusion steps with some provable performance guarantees. Our methods are the first to be able to reconstruct complete diffusion histories accurately in real and simulated situations. As a special case, they can also identify the initial spreaders better than the existing methods for that problem. Our results for both meme and contaminant diffusion show that the partial diffusion data problem can be overcome with proper modeling and methods, and that hidden temporal characteristics of diffusion can be predicted from limited data. PMID:27821901

  20. Comparative phyloinformatics of virus genes at micro and macro levels in a distributed computing environment.

    PubMed

    Singh, Dadabhai T; Trehan, Rahul; Schmidt, Bertil; Bretschneider, Timo

    2008-01-01

    Preparedness for a possible global pandemic caused by viruses such as the highly pathogenic influenza A subtype H5N1 has become a global priority. In particular, it is critical to monitor the appearance of any new emerging subtypes. Comparative phyloinformatics can be used to monitor, analyze, and possibly predict the evolution of viruses. However, in order to utilize the full functionality of available analysis packages for large-scale phyloinformatics studies, a team of computer scientists, biostatisticians and virologists is needed--a requirement which cannot be fulfilled in many cases. Furthermore, the time complexities of many algorithms involved leads to prohibitive runtimes on sequential computer platforms. This has so far hindered the use of comparative phyloinformatics as a commonly applied tool in this area. In this paper the graphical-oriented workflow design system called Quascade and its efficient usage for comparative phyloinformatics are presented. In particular, we focus on how this task can be effectively performed in a distributed computing environment. As a proof of concept, the designed workflows are used for the phylogenetic analysis of neuraminidase of H5N1 isolates (micro level) and influenza viruses (macro level). The results of this paper are hence twofold. Firstly, this paper demonstrates the usefulness of a graphical user interface system to design and execute complex distributed workflows for large-scale phyloinformatics studies of virus genes. Secondly, the analysis of neuraminidase on different levels of complexity provides valuable insights of this virus's tendency for geographical based clustering in the phylogenetic tree and also shows the importance of glycan sites in its molecular evolution. The current study demonstrates the efficiency and utility of workflow systems providing a biologist friendly approach to complex biological dataset analysis using high performance computing. In particular, the utility of the platform Quascade for deploying distributed and parallelized versions of a variety of computationally intensive phylogenetic algorithms has been shown. Secondly, the analysis of the utilized H5N1 neuraminidase datasets at macro and micro levels has clearly indicated a pattern of spatial clustering of the H5N1 viral isolates based on geographical distribution rather than temporal or host range based clustering.

  1. The effects of different representations on static structure analysis of computer malware signatures.

    PubMed

    Narayanan, Ajit; Chen, Yi; Pang, Shaoning; Tao, Ban

    2013-01-01

    The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. We show that, if malware signatures are represented as artificial protein sequences, it is possible to apply standard sequence alignment techniques in bioinformatics to improve accuracy of distinguishing between worm and virus signatures. Moreover, aligned signature sequences can be mined through traditional data mining techniques to extract metasignatures that help to distinguish between viral and worm signatures. All bioinformatics and data mining analysis were performed on publicly available tools and Weka.

  2. The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures

    PubMed Central

    Narayanan, Ajit; Chen, Yi; Pang, Shaoning; Tao, Ban

    2013-01-01

    The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. We show that, if malware signatures are represented as artificial protein sequences, it is possible to apply standard sequence alignment techniques in bioinformatics to improve accuracy of distinguishing between worm and virus signatures. Moreover, aligned signature sequences can be mined through traditional data mining techniques to extract metasignatures that help to distinguish between viral and worm signatures. All bioinformatics and data mining analysis were performed on publicly available tools and Weka. PMID:23983644

  3. Computing the Edge-Neighbour-Scattering Number of Graphs

    NASA Astrophysics Data System (ADS)

    Wei, Zongtian; Qi, Nannan; Yue, Xiaokui

    2013-11-01

    A set of edges X is subverted from a graph G by removing the closed neighbourhood N[X] from G. We denote the survival subgraph by G=X. An edge-subversion strategy X is called an edge-cut strategy of G if G=X is disconnected, a single vertex, or empty. The edge-neighbour-scattering number of a graph G is defined as ENS(G) = max{ω(G/X)-|X| : X is an edge-cut strategy of G}, where w(G=X) is the number of components of G=X. This parameter can be used to measure the vulnerability of networks when some edges are failed, especially spy networks and virus-infected networks. In this paper, we prove that the problem of computing the edge-neighbour-scattering number of a graph is NP-complete and give some upper and lower bounds for this parameter.

  4. 75 FR 20326 - Technology Innovation Program (TIP) Notice of Availability of Funds and Announcement of Public...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... efficiency gas turbines; composites make larger, more efficient wind turbine blades and provide improved... the virus to prepare a vaccine in record time, but encountered problems supplying the large volumes of... monitoring and analysis could address these problems and would help to not only respond rapidly to new virus...

  5. Radiomic analysis in prediction of Human Papilloma Virus status.

    PubMed

    Yu, Kaixian; Zhang, Youyi; Yu, Yang; Huang, Chao; Liu, Rongjie; Li, Tengfei; Yang, Liuqing; Morris, Jeffrey S; Baladandayuthapani, Veerabhadran; Zhu, Hongtu

    2017-12-01

    Human Papilloma Virus (HPV) has been associated with oropharyngeal cancer prognosis. Traditionally the HPV status is tested through invasive lab test. Recently, the rapid development of statistical image analysis techniques has enabled precise quantitative analysis of medical images. The quantitative analysis of Computed Tomography (CT) provides a non-invasive way to assess HPV status for oropharynx cancer patients. We designed a statistical radiomics approach analyzing CT images to predict HPV status. Various radiomics features were extracted from CT scans, and analyzed using statistical feature selection and prediction methods. Our approach ranked the highest in the 2016 Medical Image Computing and Computer Assisted Intervention (MICCAI) grand challenge: Oropharynx Cancer (OPC) Radiomics Challenge, Human Papilloma Virus (HPV) Status Prediction. Further analysis on the most relevant radiomic features distinguishing HPV positive and negative subjects suggested that HPV positive patients usually have smaller and simpler tumors.

  6. A novel metaheuristic for continuous optimization problems: Virus optimization algorithm

    NASA Astrophysics Data System (ADS)

    Liang, Yun-Chia; Rodolfo Cuevas Juarez, Josue

    2016-01-01

    A novel metaheuristic for continuous optimization problems, named the virus optimization algorithm (VOA), is introduced and investigated. VOA is an iteratively population-based method that imitates the behaviour of viruses attacking a living cell. The number of viruses grows at each replication and is controlled by an immune system (a so-called 'antivirus') to prevent the explosive growth of the virus population. The viruses are divided into two classes (strong and common) to balance the exploitation and exploration effects. The performance of the VOA is validated through a set of eight benchmark functions, which are also subject to rotation and shifting effects to test its robustness. Extensive comparisons were conducted with over 40 well-known metaheuristic algorithms and their variations, such as artificial bee colony, artificial immune system, differential evolution, evolutionary programming, evolutionary strategy, genetic algorithm, harmony search, invasive weed optimization, memetic algorithm, particle swarm optimization and simulated annealing. The results showed that the VOA is a viable solution for continuous optimization.

  7. An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing

    NASA Astrophysics Data System (ADS)

    Sareen, Sanjay; Gupta, Sunil Kumar; Sood, Sandeep K.

    2017-10-01

    Zika virus is a mosquito-borne disease that spreads very quickly in different parts of the world. In this article, we proposed a system to prevent and control the spread of Zika virus disease using integration of Fog computing, cloud computing, mobile phones and the Internet of things (IoT)-based sensor devices. Fog computing is used as an intermediary layer between the cloud and end users to reduce the latency time and extra communication cost that is usually found high in cloud-based systems. A fuzzy k-nearest neighbour is used to diagnose the possibly infected users, and Google map web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each Zika virus (ZikaV)-infected user, mosquito-dense sites and breeding sites on the Google map that help the government healthcare authorities to control such risk-prone areas effectively and efficiently. The proposed system is deployed on Amazon EC2 cloud to evaluate its performance and accuracy using data set for 2 million users. Our system provides high accuracy of 94.5% for initial diagnosis of different users according to their symptoms and appropriate GPS-based risk assessment.

  8. 75 FR 25185 - Broadband Initiatives Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ..., excluding desktop or laptop computers, computer hardware and software (including anti-virus, anti-spyware, and other security software), audio or video equipment, computer network components... 10 desktop or laptop computers and individual workstations to be located within the rural library...

  9. Women's awareness of the human papilloma virus and related health problems.

    PubMed

    Akyuz, Aygul; Yılmaz, Cevriye; Yenen, Müfit Cemal; Yavan, Tülay; Kılıç, Ayşe

    2011-12-01

    This paper is a report of a study of women's awareness of the human papilloma virus and related health problems. Cervical cancer is an important cause of mortality, making up approximately 12% of all cancers in women. Awareness on the part of carriers of human papilloma virus is crucial in preventing transmission of the infection and protecting against cervical cancer. The study was performed as a cross-sectional descriptive study. The study consists of 79 human papilloma virus-positive women who had not been diagnosed with cervical cancer and 150 women who had not been diagnosed with human papilloma virus. Data were collected via questionnaires between November 2007 and April 2008. Percentages and chi-square test were used. A significantly higher percentage of women with positive human papilloma virus knew the definition of human papilloma virus, the fact that it is transmitted via sexual contact and that it can lead to cervical cancer than did women with negative human papilloma virus. It was established that approximately half the women with positive human papilloma virus presented at the hospital with a genital wart. None of the women knew that a Pap smear test was a necessary tool in the prevention of cervical cancer. Women with positive human papilloma virus have insufficient knowledge of human papilloma virus, sexually transmitted diseases, the health risks associated with human papilloma virus and the means of preventing these risks. It is therefore necessary to evaluate the education of health workers, and especially of nurses, on human papilloma virus and its prevention. © 2011 Blackwell Publishing Ltd.

  10. New respiratory virus (chicken pox, influenza and respiratory syncytial virus) vaccines: efficacy, necessity and policy for the tropical world at present.

    PubMed

    Wiwanitkit, Viroj

    2009-09-01

    Several respiratory viruses are documented in medicine. Several infectious diseases due to these viruses are current global public health problems. Prevention of respiratory viral infections becomes the focus of the public health ministries of many tropical countries. Presently, there are many new vaccines for respiratory viruses. These vaccines include chicken pox vaccine, influenza vaccine and respiratory syncytial virus vaccine. In this article, the author will briefly discuss on these quoted vaccines focusing on efficacy, necessity and policy for tropical world at present.

  11. Why Do We Keep Catching the Common Cold?

    ERIC Educational Resources Information Center

    Gillen, Alan L.; Mayor, Heather D.

    1995-01-01

    Describes activities for biology teachers that will stimulate discussions on virus structure, cell biology, rhino viruses, and new trends in treating the common cold. Provides opportunity for inquiry and problem solving in exercises that emphasize an understanding of how common cold viruses might pack inside nasal epithelial cells. (14 references)…

  12. Why Do Computer Viruses Survive In The Internet?

    NASA Astrophysics Data System (ADS)

    Ifti, Margarita; Neumann, Paul

    2010-01-01

    We use the three-species cyclic competition model (Rock-Paper-Scissors), described by reactions A+B→2B, B+C→2C, C+A→2A, for emulating a computer network with e-mail viruses. Different topologies of the network bring about different dynamics of the epidemics. When the parameters of the network are varied, it is observed that very high clustering coefficients are necessary for a pandemics to happen. The differences between the networks of computer users, e-mail networks, and social networks, as well as their role in determining the nature of epidemics are also discussed.

  13. A new approach for detecting adventitious viruses shows Sf-rhabdovirus-negative Sf-RVN cells are suitable for safe biologicals production.

    PubMed

    Geisler, Christoph

    2018-02-07

    Adventitious viral contamination in cell substrates used for biologicals production is a major safety concern. A powerful new approach that can be used to identify adventitious viruses is a combination of bioinformatics tools with massively parallel sequencing technology. Typically, this involves mapping or BLASTN searching individual reads against viral nucleotide databases. Although extremely sensitive for known viruses, this approach can easily miss viruses that are too dissimilar to viruses in the database. Moreover, it is computationally intensive and requires reference cell genome databases. To avoid these drawbacks, we set out to develop an alternative approach. We reasoned that searching genome and transcriptome assemblies for adventitious viral contaminants using TBLASTN with a compact viral protein database covering extant viral diversity as the query could be fast and sensitive without a requirement for high performance computing hardware. We tested our approach on Spodoptera frugiperda Sf-RVN, a recently isolated insect cell line, to determine if it was contaminated with one or more adventitious viruses. We used Illumina reads to assemble the Sf-RVN genome and transcriptome and searched them for adventitious viral contaminants using TBLASTN with our viral protein database. We found no evidence of viral contamination, which was substantiated by the fact that our searches otherwise identified diverse sequences encoding virus-like proteins. These sequences included Maverick, R1 LINE, and errantivirus transposons, all of which are common in insect genomes. We also identified previously described as well as novel endogenous viral elements similar to ORFs encoded by diverse insect viruses. Our results demonstrate TBLASTN searching massively parallel sequencing (MPS) assemblies with a compact, manually curated viral protein database is more sensitive for adventitious virus detection than BLASTN, as we identified various sequences that encoded virus-like proteins, but had no similarity to viral sequences at the nucleotide level. Moreover, searches were fast without requiring high performance computing hardware. Our study also documents the enhanced biosafety profile of Sf-RVN as compared to other Sf cell lines, and supports the notion that Sf-RVN is highly suitable for the production of safe biologicals.

  14. Detecting a proper patient with a help of medical data retrieval

    NASA Astrophysics Data System (ADS)

    Malecka-Massalska, Teresa; Maciejewski, Ryszard; Wasiewicz, Piotr; Zaluska, Wojciech; Ksiazek, Andrzej

    2009-06-01

    Electric bioimpedance is one of methods to assess the hydrate status in hemodialyzed patients. It is also being used for assessing the hydration level among peritoneal dialysed patients, diagnosed with neoplastic diseases, patients after organ transplantations and the ones infected with HIV virus. During measurements sets were obtained from two groups, which were named a control (healthy volunteers) and test group (hemodialyzed patients). Zscored, discretized data and data retrieval results were computed in R language environment in order to find a simple rule for recognizing health problems. The executed experiments affirm possibilities of creating good classifiers for detecting a proper patient with the help of medical data sets, but only with previous training.

  15. Crime, Abuse, and Hacker Ethics.

    ERIC Educational Resources Information Center

    Johnson, Deborah G.

    1994-01-01

    Discusses computer ethics and the use of computer networks. Topics addressed include computer hackers; software piracy; computer viruses and worms; intentional and unintentional abuse; intellectual property rights versus freedom of thought; the role of information in a democratic society; individual privacy; legislation; social attitudes; and the…

  16. Atypical manifestations of Epstein-Barr virus in children: a diagnostic challenge.

    PubMed

    Bolis, Vasileios; Karadedos, Christos; Chiotis, Ioannis; Chaliasos, Nikolaos; Tsabouri, Sophia

    2016-01-01

    Clarify the frequency and the pathophysiological mechanisms of the rare manifestations of Epstein-Barr virus infection. Original research studies published in English between 1985 and 2015 were selected through a computer-assisted literature search (PubMed and Scopus). Computer searches used combinations of key words relating to "EBV infections" and "atypical manifestation." Epstein-Barr virus is a herpes virus responsible for a lifelong latent infection in almost every adult. The primary infection concerns mostly children and presents with the clinical syndrome of infectious mononucleosis. However, Epstein-Barr virus infection may exhibit numerous rare, atypical and threatening manifestations. It may cause secondary infections and various complications of the respiratory, cardiovascular, genitourinary, gastrointestinal, and nervous systems. Epstein-Barr virus also plays a significant role in pathogenesis of autoimmune diseases, allergies, and neoplasms, with Burkitt lymphoma as the main representative of the latter. The mechanisms of these manifestations are still unresolved. Therefore, the main suggestions are direct viral invasion and chronic immune response due to the reactivation of the latent state of the virus, or even various DNA mutations. Physicians should be cautious about uncommon presentations of the viral infection and consider EBV as a causative agent when they encounter similar clinical pictures. Copyright © 2016 Sociedade Brasileira de Pediatria. Published by Elsevier Editora Ltda. All rights reserved.

  17. Factors Associated with the Academic Achievement of Perinatally HIV-Infected Elementary and Middle School Children

    ERIC Educational Resources Information Center

    Ellis, Walter L.

    2004-01-01

    It is well documented that perinatally HIV-infected children experience difficulty in learning as well as behavioral and social problems in the school setting. While the research is mixed on the effect of the HIV virus on behavioral and social problems, it is much clearer on the effect of this virus on learning. This exploratory study identifies…

  18. Acute Problems of Virology and Prophylaxis of Viral Diseases,

    DTIC Science & Technology

    Contents: Immunogenic activity of attenuated variant of langat virus in experiments with monkeys; Evaluation of various methods of immunization of...monkeys by variant Tr-21-237 of the langat virus; A study of residual pathogenicity of attenuated variant Tr-21-237 of langat virus in experiments...with monkeys; Pathomorphological indexes of residual neurovirulence of the attenuated variant Tr-21-237 of langat virus in experiments with monkeys.

  19. West Nile Virus Encephalitis in a Barbary Macaque (Macaca sylvanus)

    PubMed Central

    Barker, Ian K.; Crawshaw, Graham J.; Bertelsen, Mads F.; Drebot, Michael A.; Andonova, Maya

    2004-01-01

    An aged Barbary ape (Macaca sylvanus) at the Toronto Zoo became infected with naturally acquired West Nile virus (WNV) encephalitis that caused neurologic signs, which, associated with other medical problems, led to euthanasia. The diagnosis was based on immunohistochemical assay of brain lesions, reverse transcriptase–polymerase chain reaction, and virus isolation. PMID:15200866

  20. Computational Approaches to Viral Evolution and Rational Vaccine Design

    NASA Astrophysics Data System (ADS)

    Bhattacharya, Tanmoy

    2006-10-01

    Viral pandemics, including HIV, are a major health concern across the world. Experimental techniques available today have uncovered a great wealth of information about how these viruses infect, grow, and cause disease; as well as how our body attempts to defend itself against them. Nevertheless, due to the high variability and fast evolution of many of these viruses, the traditional method of developing vaccines by presenting a heuristically chosen strain to the body fails and an effective intervention strategy still eludes us. A large amount of carefully curated genomic data on a number of these viruses are now available, often annotated with disease and immunological context. The availability of parallel computers has now made it possible to carry out a systematic analysis of this data within an evolutionary framework. I will describe, as an example, how computations on such data has allowed us to understand the origins and diversification of HIV, the causative agent of AIDS. On the practical side, computations on the same data is now being used to inform choice or defign of optimal vaccine strains.

  1. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    ERIC Educational Resources Information Center

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  2. [Biodiversity and evolution of circulating bacteria and virus populations. Novel problems of medical microbiology].

    PubMed

    Zhebrun, A V; Mukomolov, S L; Narvskaia, O V; Tseneva, G Ia; Kaftyreva, L A; Mokrousov, I V

    2011-01-01

    Biodiversity and evolution of circulating bacteria and virus populations is a serious scientific problem, solving this problem is necessary for effective prophylaxis of infectious diseases. Principal trends of development in this field of science are described. Results of studies that were carried out and investigated biodiversity of principal pathogens in Russia and St. Petersburg in particular are presented. Risk of infectious security of society caused by increasing diversity of pathogenic microorganisms is described, and priority trends of research development in this field are specified.

  3. [The history of hepatitis B virus-related determination tests and inspection and the measurements of problems in Japan].

    PubMed

    Shibata, Hiroshi

    2013-09-01

    Since Hepatitis B virus was detected as the cause of hepatitis, many high-sensitive measurement methods have been developed. In the development history, there are many problems in accuracy, sensitivity and health insurance regulations among different types of kits with different measurement principles. Advanced medical treatments cause problems of gene mutation or reactivation of HBV, leading to the necessity for high sensitive and sophisticated determination. The history of clinical analysis for the detection of HBV was reviewed from the viewpoint of our experiences.

  4. DOE's Computer Incident Advisory Capability (CIAC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schultz, E.

    1990-09-01

    Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less

  5. IMG/VR: a database of cultured and uncultured DNA Viruses and retroviruses

    DOE PAGES

    Paez-Espino, David; Chen, I. -Min A.; Palaniappan, Krishna; ...

    2016-10-30

    Viruses represent the most abundant life forms on the planet. Recent experimental and computational improvements have led to a dramatic increase in the number of viral genome sequences identified primarily from metagenomic samples. As a result of the expanding catalog of metagenomic viral sequences, there exists a need for a comprehensive computational platform integrating all these sequences with associated metadata and analytical tools. Here we present IMG/VR (https://img.jgi.doe.gov/vr/), the largest publicly available database of 3908 isolate reference DNA viruses with 264 413 computationally identified viral contigs from > 6000 ecologically diverse metagenomic samples. Approximately half of the viral contigs aremore » grouped into genetically distinct quasi-species clusters. Microbial hosts are predicted for 20 000 viral sequences, revealing nine microbial phyla previously unreported to be infected by viruses. Viral sequences can be queried using a variety of associated metadata, including habitat type and geographic location of the samples, or taxonomic classification according to hallmark viral genes. IMG/VR has a user-friendly interface that allows users to interrogate all integrated data and interact by comparingwith external sequences, thus serving as an essential resource in the viral genomics community.« less

  6. IMG/VR: a database of cultured and uncultured DNA Viruses and retroviruses

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Paez-Espino, David; Chen, I. -Min A.; Palaniappan, Krishna

    Viruses represent the most abundant life forms on the planet. Recent experimental and computational improvements have led to a dramatic increase in the number of viral genome sequences identified primarily from metagenomic samples. As a result of the expanding catalog of metagenomic viral sequences, there exists a need for a comprehensive computational platform integrating all these sequences with associated metadata and analytical tools. Here we present IMG/VR (https://img.jgi.doe.gov/vr/), the largest publicly available database of 3908 isolate reference DNA viruses with 264 413 computationally identified viral contigs from > 6000 ecologically diverse metagenomic samples. Approximately half of the viral contigs aremore » grouped into genetically distinct quasi-species clusters. Microbial hosts are predicted for 20 000 viral sequences, revealing nine microbial phyla previously unreported to be infected by viruses. Viral sequences can be queried using a variety of associated metadata, including habitat type and geographic location of the samples, or taxonomic classification according to hallmark viral genes. IMG/VR has a user-friendly interface that allows users to interrogate all integrated data and interact by comparingwith external sequences, thus serving as an essential resource in the viral genomics community.« less

  7. [Infection by hepatitis virus among the indigenous populations of South America: a review of the problem].

    PubMed

    Echevarría, J M; Blitz-Dorfman, L; Pujot, F H

    1996-09-01

    After the report of the epidemic outbreak of delta hepatitis among the Yukpa amerindians in the early 80s, the viral hepatitis arose as an important health problem in all the Amerindian communities from the north of South America and the Amazonian Basin. Despite the few data available, the results obtained in different communities from Venezuela (Yukpa, Barí, Yanomami) have shown a high endemicity of hepatitis B and D virus infections and a significant prevalence of hepatitis E virus-specific antibody among their members. By contrast, the infection by hepatitis C virus, which is present in all the urban areas from South America, seems uncommon, or even absent among some Amerindian populations. At the moment, a satisfactory explanation for this findings has not yet been arised. However, it could be possible that the margination of these populations regarding the health care system has been keeping them free of an infection largely linked worldwide to iatrogeny. Vaccination of Amerindian populations against hepatitis B should be taken as a priority of the health care programs. Moreover, such programs should consider the iatrogenic transmission of the HCV as a matter of concern regarding such populations, since parenterally transmitted hepatitis viruses seems to spread quickly among their members once they are introduced, giving rise to serious health problems.

  8. From Turing machines to computer viruses.

    PubMed

    Marion, Jean-Yves

    2012-07-28

    Self-replication is one of the fundamental aspects of computing where a program or a system may duplicate, evolve and mutate. Our point of view is that Kleene's (second) recursion theorem is essential to understand self-replication mechanisms. An interesting example of self-replication codes is given by computer viruses. This was initially explained in the seminal works of Cohen and of Adleman in the 1980s. In fact, the different variants of recursion theorems provide and explain constructions of self-replicating codes and, as a result, of various classes of malware. None of the results are new from the point of view of computability theory. We now propose a self-modifying register machine as a model of computation in which we can effectively deal with the self-reproduction and in which new offsprings can be activated as independent organisms.

  9. IDEPI: rapid prediction of HIV-1 antibody epitopes and other phenotypic features from sequence data using a flexible machine learning platform.

    PubMed

    Hepler, N Lance; Scheffler, Konrad; Weaver, Steven; Murrell, Ben; Richman, Douglas D; Burton, Dennis R; Poignard, Pascal; Smith, Davey M; Kosakovsky Pond, Sergei L

    2014-09-01

    Since its identification in 1983, HIV-1 has been the focus of a research effort unprecedented in scope and difficulty, whose ultimate goals--a cure and a vaccine--remain elusive. One of the fundamental challenges in accomplishing these goals is the tremendous genetic variability of the virus, with some genes differing at as many as 40% of nucleotide positions among circulating strains. Because of this, the genetic bases of many viral phenotypes, most notably the susceptibility to neutralization by a particular antibody, are difficult to identify computationally. Drawing upon open-source general-purpose machine learning algorithms and libraries, we have developed a software package IDEPI (IDentify EPItopes) for learning genotype-to-phenotype predictive models from sequences with known phenotypes. IDEPI can apply learned models to classify sequences of unknown phenotypes, and also identify specific sequence features which contribute to a particular phenotype. We demonstrate that IDEPI achieves performance similar to or better than that of previously published approaches on four well-studied problems: finding the epitopes of broadly neutralizing antibodies (bNab), determining coreceptor tropism of the virus, identifying compartment-specific genetic signatures of the virus, and deducing drug-resistance associated mutations. The cross-platform Python source code (released under the GPL 3.0 license), documentation, issue tracking, and a pre-configured virtual machine for IDEPI can be found at https://github.com/veg/idepi.

  10. [Progress in research of occult hepatitis B virus infection].

    PubMed

    Huang, X Y; Shi, Q F; Huang, T

    2017-05-10

    Occult hepatitis B virus infection is a worldwide public health problem, which seriously affects the clinical diagnosis of hepatitis B and threatens the safety of blood transfusion. The concept of occult hepatitis B virus infection, the pathogenesis of occult hepatitis B virus infection, the prevalence of occult hepatitis B virus infection in different groups, including healthy population and different patients, and the possibility of transmission were summarized. The prevalence of occult hepatitis B virus infection was found in healthy population and different patients, and there is possibility of occult hepatitis B virus infection to be transmitted through blood transfusion. The paper provides a comprehensive introduction of the pathogenesis and prevalence of occult hepatitis B virus infection. More attention should be paid to occult hepatitis B virus infection.

  11. Molecular screening of walnut backcross populations for a DNA marker linked to cherry leafroll virus resistance

    USDA-ARS?s Scientific Manuscript database

    Blackline disease, a graft union disorder caused by infection of English walnut (Juglans regia) trees by Cherry leafroll virus (CLRV) is a major problem for walnut production in Northern California where scions are grafted onto virus resistant black walnut (J. hindsii) or ‘Paradox’ (J. hindsii × J. ...

  12. Prevalence of and risk factors for substance use among perinatally human immunodeficiency virus-infected and perinatally exposed but uninfected youth.

    PubMed

    Alperen, Julie; Brummel, Sean; Tassiopoulos, Katherine; Mellins, Claude A; Kacanek, Deborah; Smith, Renee; Seage, George R; Moscicki, Anna-Barbara

    2014-03-01

    This study examined risk factors associated with recent substance use (SU) among perinatally human immunodeficiency virus (HIV)-infected (PHIV+) and perinatally exposed, uninfected (PHEU) youth and compared SU lifetime prevalence with the general population of United States (U.S.) adolescents. We conducted cross-sectional and longitudinal analyses of 511 PHIV+ and PHEU youth (mean age at study entry, 13.2 years; 51% female; 69% PHIV+; and 72% African-American) enrolled in a U.S. multisite prospective cohort study between 2007 and 2009. Substance use data were collected by audio computer-assisted self-interview. Youth Risk Behavior Surveillance System and Monitoring the Future data were used to compare SU lifetime prevalence with U.S. samples. Perinatal HIV infection was not a statistically significant risk factor for alcohol or marijuana use. Risk factors for alcohol use among PHIV+ youth included higher severity of emotional and conduct problems and alcohol and marijuana use in the home by the caregiver or others. Risk factors for marijuana use among PHIV+ youth included marijuana use in the home, higher severity of conduct problems, and stressful life events. Similar SU risk factors among PHEU youth included SU in the home and higher severity of conduct and emotional problems. Overall lifetime prevalence of SU by age was similar to that in national surveys. Although SU lifetime prevalence and risk factors for PHIV+ and PHEU adolescents were similar to national norms, the negative consequences are potentially greater for PHIV+ youth. Prevention efforts should begin before SU initiation and address the family and social environment and youth mental health status. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  13. The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach

    PubMed Central

    Yang, Lu-Xing; Draief, Moez; Yang, Xiaofan

    2015-01-01

    This paper addresses the impact of the structure of the viral propagation network on the viral prevalence. For that purpose, a new epidemic model of computer virus, known as the node-based SLBS model, is proposed. Our analysis shows that the maximum eigenvalue of the underlying network is a key factor determining the viral prevalence. Specifically, the value range of the maximum eigenvalue is partitioned into three subintervals: viruses tend to extinction very quickly or approach extinction or persist depending on into which subinterval the maximum eigenvalue of the propagation network falls. Consequently, computer virus can be contained by adjusting the propagation network so that its maximum eigenvalue falls into the desired subinterval. PMID:26222539

  14. Viruses, Trojan Horses, and Other Badware: Information and Implications for Online Searchers.

    ERIC Educational Resources Information Center

    Clancy, Steve

    1988-01-01

    Discusses the various forms of computer viruses and the threat they pose to online databases. Available protection programs are described, and a list of online sources of protection programs and news is provided. (14 references) (CLB)

  15. Online Hand Holding in Fixing Computer Glitches

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2005-01-01

    According to most surveys, computer manufacturers such as HP puts out reliable products, and computers in general are less troublesome than in the past. But personal computers are still prone to bugs, conflicts, viruses, spyware infestations, hacker and phishing attacks, and--most of all--user error. Unfortunately, technical support from computer…

  16. Novel Nipah virus immune-antagonism strategy revealed by experimental and computational study.

    PubMed

    Seto, Jeremy; Qiao, Liang; Guenzel, Carolin A; Xiao, Sa; Shaw, Megan L; Hayot, Fernand; Sealfon, Stuart C

    2010-11-01

    Nipah virus is an emerging pathogen that causes severe disease in humans. It expresses several antagonist proteins that subvert the immune response and that may contribute to its pathogenicity. Studies of its biology are difficult due to its high pathogenicity and requirement for biosafety level 4 containment. We integrated experimental and computational methods to elucidate the effects of Nipah virus immune antagonists. Individual Nipah virus immune antagonists (phosphoprotein and V and W proteins) were expressed from recombinant Newcastle disease viruses, and the responses of infected human monocyte-derived dendritic cells were determined. We developed an ordinary differential equation model of the infectious process that that produced results with a high degree of correlation with these experimental results. In order to simulate the effects of wild-type virus, the model was extended to incorporate published experimental data on the time trajectories of immune-antagonist production. These data showed that the RNA-editing mechanism utilized by the wild-type Nipah virus to produce immune antagonists leads to a delay in the production of the most effective immune antagonists, V and W. Model simulations indicated that this delay caused a disconnection between attenuation of the antiviral response and suppression of inflammation. While the antiviral cytokines were efficiently suppressed at early time points, some early inflammatory cytokine production occurred, which would be expected to increase vascular permeability and promote virus spread and pathogenesis. These results suggest that Nipah virus has evolved a unique immune-antagonist strategy that benefits from controlled expression of multiple antagonist proteins with various potencies.

  17. Computational analysis of Ebolavirus data: prospects, promises and challenges.

    PubMed

    Michaelis, Martin; Rossman, Jeremy S; Wass, Mark N

    2016-08-15

    The ongoing Ebola virus (also known as Zaire ebolavirus, a member of the Ebolavirus family) outbreak in West Africa has so far resulted in >28000 confirmed cases compared with previous Ebolavirus outbreaks that affected a maximum of a few hundred individuals. Hence, Ebolaviruses impose a much greater threat than we may have expected (or hoped). An improved understanding of the virus biology is essential to develop therapeutic and preventive measures and to be better prepared for future outbreaks by members of the Ebolavirus family. Computational investigations can complement wet laboratory research for biosafety level 4 pathogens such as Ebolaviruses for which the wet experimental capacities are limited due to a small number of appropriate containment laboratories. During the current West Africa outbreak, sequence data from many Ebola virus genomes became available providing a rich resource for computational analysis. Here, we consider the studies that have already reported on the computational analysis of these data. A range of properties have been investigated including Ebolavirus evolution and pathogenicity, prediction of micro RNAs and identification of Ebolavirus specific signatures. However, the accuracy of the results remains to be confirmed by wet laboratory experiments. Therefore, communication and exchange between computational and wet laboratory researchers is necessary to make maximum use of computational analyses and to iteratively improve these approaches. © 2016 The Author(s). published by Portland Press Limited on behalf of the Biochemical Society.

  18. Compensating for cross-reactions using avidity and computation in a suspension multiplex immunoassay for serotyping of Zika versus other flavivirus infections.

    PubMed

    Rönnberg, Bengt; Gustafsson, Åke; Vapalahti, Olli; Emmerich, Petra; Lundkvist, Åke; Schmidt-Chanasit, Jonas; Blomberg, Jonas

    2017-10-01

    The recent spread of Zika virus (ZIKV) in the Americas and Asia necessitates an increased preparedness for improved maternal and perinatal health and blood safety. However, serological cross-reactions, especially to Dengue virus (DENV), complicate ZIKV antibody serodiagnosis. A novel "pan-Flavi" suspension multiplex immunoassay (PFSMIA) using 25 antigens, whole virus (WV), non-structural protein 1 (NS1), and envelope (E) proteins, from 7 zoonotic flaviviruses for specific detection of ZIKV and DENV IgM and IgG was developed. Patterns of antibody cross-reactivity, avidity, and kinetics were established in 104 sera from returning travelers with known ZIKV and DENV infections. PFSMIA gave IgM- and IgG-sensitivities for both viruses of 96-100%, compared to an immunofluorescence assay. Main IgM cross-reactions were to NS1, for IgG to the E and WV antigens. Infecting virus yielded reactivity to several antigens of the homologous virus, while cross-reactions tended to occur only to a single antigen from heterologous virus(es). A specificity-enhancing computer procedure took into account antibody isotype, number of antibody-reactive antigens per virus, avidity, average degree of cross-reactivity to heterologous flavivirus antigens, and reactivity changes in serial sera. It classified all 50 cases correctly. Applied to sera from 200 pregnant women and 173 blood donors from Sweden, one blood donor was found ZIKV NS1 IgM positive, and another as ZIKV NS1 IgG positive. These samples did not react with other ZIKV antigens and were thereby judged as false-positives. PFSMIA provided sensitive and specific ZIKV and DENV serology, warranting high-throughput serological surveillance and a minimized need for laborious and expensive virus neutralization assays.

  19. Physician use of updated anti-virus software in a tertiary Nigerian hospital.

    PubMed

    Laabes, E P; Nyango, D D; Ayedima, M M; Ladep, N G

    2010-01-01

    While physicians are becoming increasingly dependent on computers and the internet, highly lethal malware continue to be loaded into cyberspace. We sought to assess the proportion of physicians with updated anti-virus software in Jos University Teaching Hospital Nigeria and to determine perceived barriers to getting updates. We used a pre-tested semi-structured self-administered questionnaire to conduct a cross-sectional survey among 118 physicians. The mean age (+/- SD) of subjects was 34 (+/- 4) years, with 94 male and 24 female physicians. Forty-two (36.5%) of 115 physicians with anti-virus software used an updated program (95% Cl: 27, 45). The top-three antivirus software were: McAfee 40 (33.9%), AVG 37 (31.4%) and Norton 17 (14.4%). Common infections were: Trojan horse 22 (29.7%), Brontok worm 8 (10.8%), and Ravmonlog.exe 5 (6.8%). Internet browsing with a firewall was an independent determinant for use of updated anti-virus software [OR 4.3, 95% CI, 1.86, 10.02; P < 0.001]. Busy schedule, 40 (33.9%) and lack of credit card 39 (33.1%) were perceived barriers to updating antivirus software. The use of regularly updated anti-virus software is sub-optimal among physicians implying vulnerability to computer viruses. Physicians should be careful with flash drives and should avoid being victims of the raging arms race between malware producers and anti-virus software developers.

  20. Guiding the evolution to catch the virus: An in silico study of affinity maturation against rapidly mutating antigen

    NASA Astrophysics Data System (ADS)

    Wang, Shenshen; Burton, Dennis; Kardar, Mehran; Chakraborty, Arup

    2014-03-01

    The immune system comprises an intricate and evolving collection of cells and molecules that enables a defense against pathogenic agents. Its workings present a rich source of physical problems that impact human health. One intriguing example is the process of affinity maturation (AM) through which an antibody (Ab)--a component of the host immune system--evolves to more efficiently bind an antigen (Ag)--a unique part of a foreign pathogen such as a virus. Sufficiently strong binding to the Ag enables recognition and neutralization. A major challenge is to contain a diversifying mixture of Ag variants, that arise in natural infection, from evading Ab neutralization. This entails a thorough understanding of AM against multiple Ag species and mutating Ag. During AM, Ab-encoding cells undergo cycles of mutation and selection, a process reminiscent of Darwinian evolution yet occurring in real time. We first cast affinity-dependent selection into an extreme value problem and show how the binding characteristics scale with Ag diversity. We then develop an agent-based residue-resolved computational model of AM which allows us to track the evolutionary trajectories of individual cells. This dynamic model not only reveals significant stochastic effects associated with the relatively small and highly dynamic population size, it also uncovers the markedly distinct maturation outcomes if designed Ag variants are presented in different temporal procedures. Insights thus obtained would guide rational design of vaccination protocols.

  1. Identifying blueberry germplasm that is slow to get Blueberry shock virus in the Pacific Northwest United States

    USDA-ARS?s Scientific Manuscript database

    Blueberry shock virus (BlShV) is a serious problem in blueberry production in the Pacific Northwest (PNW) region of North America. Infection occurs during bloom and the virus moves into other parts of the plant in an uneven but steady manner and may take several years to become fully systemic in mat...

  2. Immunotherapy of Congenital SIV Infection.

    DTIC Science & Technology

    1996-10-01

    replication-impaired viruses / threshold hypothesis diseases ©1996 Academic Press Ltd Live attenuated virus vaccines have been developed against...members of different virus families and protect against various human viral diseases including Problems for HIV-1 vaccine development poliomyelitis, mumps... Progress has been made also during year 02 on another aspect that will be a major benefit to primate vaccine research. We have developed highly

  3. Inhibitory effect of the green tea molecule EGCG against dengue virus infection.

    PubMed

    Raekiansyah, Muhareva; Buerano, Corazon C; Luz, Mark Anthony D; Morita, Kouichi

    2018-06-01

    Dengue virus (DENV) infection is a major public health problem worldwide; however, specific antiviral drugs against it are not available. Hence, identifying effective antiviral agents for the prevention of DENV infection is important. In this study, we showed that the reportedly highly biologically active green-tea component epigallocatechin gallate (EGCG) inhibited dengue virus infection regardless of infecting serotype, but no or minimal inhibition was observed with other flaviviruses, including Japanese encephalitis virus, yellow fever virus, and Zika virus. EGCG exerted its antiviral effect mainly at the early stage of infection, probably by interacting directly with virions to prevent virus infection. Our results suggest that EGCG specifically targets DENV and might be used as a lead structure to develop an antiviral drug for use against the virus.

  4. Multiobjective Genetic Algorithm applied to dengue control.

    PubMed

    Florentino, Helenice O; Cantane, Daniela R; Santos, Fernando L P; Bannwart, Bettina F

    2014-12-01

    Dengue fever is an infectious disease caused by a virus of the Flaviridae family and transmitted to the person by a mosquito of the genus Aedes aegypti. This disease has been a global public health problem because a single mosquito can infect up to 300 people and between 50 and 100 million people are infected annually on all continents. Thus, dengue fever is currently a subject of research, whether in the search for vaccines and treatments for the disease or efficient and economical forms of mosquito control. The current study aims to study techniques of multiobjective optimization to assist in solving problems involving the control of the mosquito that transmits dengue fever. The population dynamics of the mosquito is studied in order to understand the epidemic phenomenon and suggest strategies of multiobjective programming for mosquito control. A Multiobjective Genetic Algorithm (MGA_DENGUE) is proposed to solve the optimization model treated here and we discuss the computational results obtained from the application of this technique. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. vFitness: a web-based computing tool for improving estimation of in vitro HIV-1 fitness experiments

    PubMed Central

    2010-01-01

    Background The replication rate (or fitness) between viral variants has been investigated in vivo and in vitro for human immunodeficiency virus (HIV). HIV fitness plays an important role in the development and persistence of drug resistance. The accurate estimation of viral fitness relies on complicated computations based on statistical methods. This calls for tools that are easy to access and intuitive to use for various experiments of viral fitness. Results Based on a mathematical model and several statistical methods (least-squares approach and measurement error models), a Web-based computing tool has been developed for improving estimation of virus fitness in growth competition assays of human immunodeficiency virus type 1 (HIV-1). Conclusions Unlike the two-point calculation used in previous studies, the estimation here uses linear regression methods with all observed data in the competition experiment to more accurately estimate relative viral fitness parameters. The dilution factor is introduced for making the computational tool more flexible to accommodate various experimental conditions. This Web-based tool is implemented in C# language with Microsoft ASP.NET, and is publicly available on the Web at http://bis.urmc.rochester.edu/vFitness/. PMID:20482791

  6. vFitness: a web-based computing tool for improving estimation of in vitro HIV-1 fitness experiments.

    PubMed

    Ma, Jingming; Dykes, Carrie; Wu, Tao; Huang, Yangxin; Demeter, Lisa; Wu, Hulin

    2010-05-18

    The replication rate (or fitness) between viral variants has been investigated in vivo and in vitro for human immunodeficiency virus (HIV). HIV fitness plays an important role in the development and persistence of drug resistance. The accurate estimation of viral fitness relies on complicated computations based on statistical methods. This calls for tools that are easy to access and intuitive to use for various experiments of viral fitness. Based on a mathematical model and several statistical methods (least-squares approach and measurement error models), a Web-based computing tool has been developed for improving estimation of virus fitness in growth competition assays of human immunodeficiency virus type 1 (HIV-1). Unlike the two-point calculation used in previous studies, the estimation here uses linear regression methods with all observed data in the competition experiment to more accurately estimate relative viral fitness parameters. The dilution factor is introduced for making the computational tool more flexible to accommodate various experimental conditions. This Web-based tool is implemented in C# language with Microsoft ASP.NET, and is publicly available on the Web at http://bis.urmc.rochester.edu/vFitness/.

  7. Crispen's Five Antivirus Rules.

    ERIC Educational Resources Information Center

    Crispen, Patrick Douglas

    2000-01-01

    Explains five rules to protect computers from viruses. Highlights include commercial antivirus software programs and the need to upgrade them periodically (every year to 18 months); updating virus definitions at least weekly; scanning attached files from email with antivirus software before opening them; Microsoft Word macro protection; and the…

  8. IMG/VR: a database of cultured and uncultured DNA Viruses and retroviruses.

    PubMed

    Paez-Espino, David; Chen, I-Min A; Palaniappan, Krishna; Ratner, Anna; Chu, Ken; Szeto, Ernest; Pillay, Manoj; Huang, Jinghua; Markowitz, Victor M; Nielsen, Torben; Huntemann, Marcel; K Reddy, T B; Pavlopoulos, Georgios A; Sullivan, Matthew B; Campbell, Barbara J; Chen, Feng; McMahon, Katherine; Hallam, Steve J; Denef, Vincent; Cavicchioli, Ricardo; Caffrey, Sean M; Streit, Wolfgang R; Webster, John; Handley, Kim M; Salekdeh, Ghasem H; Tsesmetzis, Nicolas; Setubal, Joao C; Pope, Phillip B; Liu, Wen-Tso; Rivers, Adam R; Ivanova, Natalia N; Kyrpides, Nikos C

    2017-01-04

    Viruses represent the most abundant life forms on the planet. Recent experimental and computational improvements have led to a dramatic increase in the number of viral genome sequences identified primarily from metagenomic samples. As a result of the expanding catalog of metagenomic viral sequences, there exists a need for a comprehensive computational platform integrating all these sequences with associated metadata and analytical tools. Here we present IMG/VR (https://img.jgi.doe.gov/vr/), the largest publicly available database of 3908 isolate reference DNA viruses with 264 413 computationally identified viral contigs from >6000 ecologically diverse metagenomic samples. Approximately half of the viral contigs are grouped into genetically distinct quasi-species clusters. Microbial hosts are predicted for 20 000 viral sequences, revealing nine microbial phyla previously unreported to be infected by viruses. Viral sequences can be queried using a variety of associated metadata, including habitat type and geographic location of the samples, or taxonomic classification according to hallmark viral genes. IMG/VR has a user-friendly interface that allows users to interrogate all integrated data and interact by comparing with external sequences, thus serving as an essential resource in the viral genomics community. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  9. [Drug interactions and their management in patients with human immunodeficiency virus infection].

    PubMed

    Cabarcos Ortíz de Barrón, A; Martínez Vázquez, J M; Lorenzo Zúñiga, V; Barrio Gómez, E

    1998-03-01

    In fact patients with human immune deficiency virus infection are in treatment with multidrugs regimen, also in antiretrovirical therapy as profilaxis and treatment opportunist infections and other problems, in other fact the high tase of intravenous drugs users in meta-done programming (one of the principal transmission cause). Consequently is necessary an rational approximation to this problem also in the deepth knowledgment of his mechanisms and his management in the daily clinical practice.

  10. Computer Abuse: Vandalizing the Information Society.

    ERIC Educational Resources Information Center

    Furnell, Steven M.; Warren, Matthew J.

    1997-01-01

    Computing and telecommunications, key to an information-based society, are increasingly targets for criminals and mischief makers. This article examines the effects of malicious computer abuse: hacking and viruses, highlights the apparent increase in incidents, and examines their effect on public perceptions of technology. Presents broad…

  11. Special Issue: Honey Bee Viruses

    PubMed Central

    Gisder, Sebastian; Genersch, Elke

    2015-01-01

    Pollination of flowering plants is an important ecosystem service provided by wild insect pollinators and managed honey bees. Hence, losses and declines of pollinating insect species threaten human food security and are of major concern not only for apiculture or agriculture but for human society in general. Honey bee colony losses and bumblebee declines have attracted intensive research interest over the last decade and although the problem is far from being solved we now know that viruses are among the key players of many of these bee losses and bumblebee declines. With this special issue on bee viruses we, therefore, aimed to collect high quality original papers reflecting the current state of bee virus research. To this end, we focused on newly discovered viruses (Lake Sinai viruses, bee macula-like virus), or a so far neglected virus species (Apis mellifera filamentous virus), and cutting edge technologies (mass spectrometry, RNAi approach) applied in the field. PMID:26702462

  12. Special Issue: Honey Bee Viruses.

    PubMed

    Gisder, Sebastian; Genersch, Elke

    2015-10-01

    Pollination of flowering plants is an important ecosystem service provided by wild insect pollinators and managed honey bees. Hence, losses and declines of pollinating insect species threaten human food security and are of major concern not only for apiculture or agriculture but for human society in general. Honey bee colony losses and bumblebee declines have attracted intensive research interest over the last decade and although the problem is far from being solved we now know that viruses are among the key players of many of these bee losses and bumblebee declines. With this special issue on bee viruses we, therefore, aimed to collect high quality original papers reflecting the current state of bee virus research. To this end, we focused on newly discovered viruses (Lake Sinai viruses, bee macula-like virus), or a so far neglected virus species (Apis mellifera filamentous virus), and cutting edge technologies (mass spectrometry, RNAi approach) applied in the field.

  13. Among the New Worlds.

    ERIC Educational Resources Information Center

    Algeo, John; Algeo, Adele

    1989-01-01

    Presents definitions and examples of usage of late-twentieth century American words and terms, including: bite, dramedy, photo op, photo opportunist, safe computer practice, sound bite, teflon, trapdoor, vaccination program, computer virus, and wait state. (CB)

  14. Possible Human Papillomavirus 38 Contamination of Endometrial Cancer RNA Sequencing Samples in The Cancer Genome Atlas Database

    PubMed Central

    Kazemian, Majid; Ren, Min; Lin, Jian-Xin; Liao, Wei; Spolski, Rosanne

    2015-01-01

    ABSTRACT Viruses are causally associated with a number of human malignancies. In this study, we sought to identify new virus-cancer associations by searching RNA sequencing data sets from >2,000 patients, encompassing 21 cancers from The Cancer Genome Atlas (TCGA), for the presence of viral sequences. In agreement with previous studies, we found human papillomavirus 16 (HPV16) and HPV18 in oropharyngeal cancer and hepatitis B and C viruses in liver cancer. Unexpectedly, however, we found HPV38, a cutaneous form of HPV associated with skin cancer, in 32 of 168 samples from endometrial cancer. In 12 of the HPV38-positive (HPV38+) samples, we observed at least one paired read that mapped to both human and HPV38 genomes, indicative of viral integration into the host DNA, something not previously demonstrated for HPV38. The expression levels of HPV38 transcripts were relatively low, and all 32 HPV38+ samples belonged to the same experimental batch of 40 samples, whereas none of the other 128 endometrial carcinoma samples were HPV38+, raising doubts about the significance of the HPV38 association. Moreover, the HPV38+ samples contained the same 10 novel single nucleotide variations (SNVs), leading us to hypothesize that one patient was infected with this new isolate of HPV38, which was integrated into his/her genome and may have cross-contaminated other TCGA samples within batch 228. Based on our analysis, we propose guidelines to examine the batch effect, virus expression level, and SNVs as part of next-generation sequencing (NGS) data analysis for evaluating the significance of viral/pathogen sequences in clinical samples. IMPORTANCE High-throughput RNA sequencing (RNA-Seq), followed by computational analysis, has vastly accelerated the identification of viral and other pathogenic sequences in clinical samples, but cross-contamination during the processing of the samples remain a major problem that can lead to erroneous conclusions. We found HPV38 sequences specifically present in RNA-Seq samples from endometrial cancer patients from TCGA, a virus not previously associated with this type of cancer. However, multiple lines of evidence suggest possible cross-contamination in these samples, which were processed together in the same batch. Despite this potential cross-contamination, our data indicate that we have detected a new isolate of HPV38 that appears to be integrated into the human genome. We also provide general guidelines for computational detection and interpretation of pathogen-disease associations. PMID:26085148

  15. Possible Human Papillomavirus 38 Contamination of Endometrial Cancer RNA Sequencing Samples in The Cancer Genome Atlas Database.

    PubMed

    Kazemian, Majid; Ren, Min; Lin, Jian-Xin; Liao, Wei; Spolski, Rosanne; Leonard, Warren J

    2015-09-01

    Viruses are causally associated with a number of human malignancies. In this study, we sought to identify new virus-cancer associations by searching RNA sequencing data sets from >2,000 patients, encompassing 21 cancers from The Cancer Genome Atlas (TCGA), for the presence of viral sequences. In agreement with previous studies, we found human papillomavirus 16 (HPV16) and HPV18 in oropharyngeal cancer and hepatitis B and C viruses in liver cancer. Unexpectedly, however, we found HPV38, a cutaneous form of HPV associated with skin cancer, in 32 of 168 samples from endometrial cancer. In 12 of the HPV38-positive (HPV38(+)) samples, we observed at least one paired read that mapped to both human and HPV38 genomes, indicative of viral integration into the host DNA, something not previously demonstrated for HPV38. The expression levels of HPV38 transcripts were relatively low, and all 32 HPV38(+) samples belonged to the same experimental batch of 40 samples, whereas none of the other 128 endometrial carcinoma samples were HPV38(+), raising doubts about the significance of the HPV38 association. Moreover, the HPV38(+) samples contained the same 10 novel single nucleotide variations (SNVs), leading us to hypothesize that one patient was infected with this new isolate of HPV38, which was integrated into his/her genome and may have cross-contaminated other TCGA samples within batch 228. Based on our analysis, we propose guidelines to examine the batch effect, virus expression level, and SNVs as part of next-generation sequencing (NGS) data analysis for evaluating the significance of viral/pathogen sequences in clinical samples. High-throughput RNA sequencing (RNA-Seq), followed by computational analysis, has vastly accelerated the identification of viral and other pathogenic sequences in clinical samples, but cross-contamination during the processing of the samples remain a major problem that can lead to erroneous conclusions. We found HPV38 sequences specifically present in RNA-Seq samples from endometrial cancer patients from TCGA, a virus not previously associated with this type of cancer. However, multiple lines of evidence suggest possible cross-contamination in these samples, which were processed together in the same batch. Despite this potential cross-contamination, our data indicate that we have detected a new isolate of HPV38 that appears to be integrated into the human genome. We also provide general guidelines for computational detection and interpretation of pathogen-disease associations. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  16. STRAIN DIFFERENTIATION AND DETERMINATION OF CAPSID PROTEINS OF COXSACKIEVIRUS BY MALDI-MS

    EPA Science Inventory

    Introduction: Contamination of viruses in water environments (rivers, lakes, sources of drinking water) is a new threat and serious health problem. Amongst organisms discharged from sewage septic systems is the coxsackievirus (single-stranded RNA virus). Differentiation betwee...

  17. Microcephaly: computational and organotypic modeling of a ...

    EPA Pesticide Factsheets

    lecture discusses computational and organotypic models of microcephaly in an AOP Framework and ToxCast assays. Lecture slide presentation at UNC Chapel Hill for Advanced Toxicology course lecture on Computational Approaches to Developmental and Reproductive Toxicology with presentation on computational and organotypic modeling of a complex human birth defect microcephaly with is associated with the recent Zika virus outbreak.

  18. Top 10 Threats to Computer Systems Include Professors and Students

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…

  19. Grapevine fleck virus-like viruses in Vitis.

    PubMed

    Sabanadzovic, S; Abou-Ghanem, N; Castellano, M A; Digiaro, M; Martelli, G P

    2000-01-01

    Two sets of degenerate primers for the specific amplification of 572-575 nt and 386 nt segments of the methyltransferase and RNA- dependent RNA polymerase cistrons of members of the genera Tymovirus and Marafivirus and of the unassigned virus Grapevine fleck virus (GFkV) were designed on the basis of available sequences. These primers were used for amplifying and subsequent cloning and sequencing part of the open reading frame 1 of the genome of GFkV, Grapevine asteroid mosaic-associated virus (GAMaV) and of another previously unreported virus, for which the name Grapevine red globe virus (GRGV) is proposed. Computer-assisted analysis of the amplified genome portions showed that the three grapevine viruses are phylogenetically related with one another and with sequenced tymoviruses and marafiviruses. The relationships with tymoviruses was confirmed by the type of ultrastructural modifications induced in the host cells. RdRp-specific degenerate primers were successfully used for the aspecific detection of the three viruses in crude grapevine sap extracts. Specific virus identification was obtained with RT-PCR using antisense virus-specific primers.

  20. Animal Viruses Probe dataset (AVPDS) for microarray-based diagnosis and identification of viruses.

    PubMed

    Yadav, Brijesh S; Pokhriyal, Mayank; Vasishtha, Dinesh P; Sharma, Bhaskar

    2014-03-01

    AVPDS (Animal Viruses Probe dataset) is a dataset of virus-specific and conserve oligonucleotides for identification and diagnosis of viruses infecting animals. The current dataset contain 20,619 virus specific probes for 833 viruses and their subtypes and 3,988 conserved probes for 146 viral genera. Dataset of virus specific probe has been divided into two fields namely virus name and probe sequence. Similarly conserved probes for virus genera table have genus, and subgroup within genus name and probe sequence. The subgroup within genus is artificially divided subgroups with no taxonomic significance and contains probes which identifies viruses in that specific subgroup of the genus. Using this dataset we have successfully diagnosed the first case of Newcastle disease virus in sheep and reported a mixed infection of Bovine viral diarrhea and Bovine herpesvirus in cattle. These dataset also contains probes which cross reacts across species experimentally though computationally they meet specifications. These probes have been marked. We hope that this dataset will be useful in microarray-based detection of viruses. The dataset can be accessed through the link https://dl.dropboxusercontent.com/u/94060831/avpds/HOME.html.

  1. Comparison of the structures of three circoviruses: chicken anemia virus, porcine circovirus type 2, and beak and feather disease virus.

    PubMed

    Crowther, R A; Berriman, J A; Curran, W L; Allan, G M; Todd, D

    2003-12-01

    Circoviruses are small, nonenveloped icosahedral animal viruses characterized by circular single-stranded DNA genomes. Their genomes are the smallest possessed by animal viruses. Infections with circoviruses, which can lead to economically important diseases, frequently result in virus-induced damage to lymphoid tissue and immunosuppression. Within the family Circoviridae, different genera are distinguished by differences in genomic organization. Thus, Chicken anemia virus is in the genus Gyrovirus, while porcine circoviruses and Beak and feather disease virus belong to the genus CIRCOVIRUS: Little is known about the structures of circoviruses. Accordingly, we investigated the structures of these three viruses with a view to determining whether they are related. Three-dimensional maps computed from electron micrographs showed that all three viruses have a T=1 organization with capsids formed from 60 subunits. Porcine circovirus type 2 and beak and feather disease virus show similar capsid structures with flat pentameric morphological units, whereas chicken anemia virus has stikingly different protruding pentagonal trumpet-shaped units. It thus appears that the structures of viruses in the same genus are related but that those of viruses in different genera are unrelated.

  2. Phylodynamic Inference with Kernel ABC and Its Application to HIV Epidemiology.

    PubMed

    Poon, Art F Y

    2015-09-01

    The shapes of phylogenetic trees relating virus populations are determined by the adaptation of viruses within each host, and by the transmission of viruses among hosts. Phylodynamic inference attempts to reverse this flow of information, estimating parameters of these processes from the shape of a virus phylogeny reconstructed from a sample of genetic sequences from the epidemic. A key challenge to phylodynamic inference is quantifying the similarity between two trees in an efficient and comprehensive way. In this study, I demonstrate that a new distance measure, based on a subset tree kernel function from computational linguistics, confers a significant improvement over previous measures of tree shape for classifying trees generated under different epidemiological scenarios. Next, I incorporate this kernel-based distance measure into an approximate Bayesian computation (ABC) framework for phylodynamic inference. ABC bypasses the need for an analytical solution of model likelihood, as it only requires the ability to simulate data from the model. I validate this "kernel-ABC" method for phylodynamic inference by estimating parameters from data simulated under a simple epidemiological model. Results indicate that kernel-ABC attained greater accuracy for parameters associated with virus transmission than leading software on the same data sets. Finally, I apply the kernel-ABC framework to study a recent outbreak of a recombinant HIV subtype in China. Kernel-ABC provides a versatile framework for phylodynamic inference because it can fit a broader range of models than methods that rely on the computation of exact likelihoods. © The Author 2015. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  3. The sorption of influenza viruses and antibiotics on carbon nanotubes and polyaniline nanocomposites

    NASA Astrophysics Data System (ADS)

    Ivanova, V. T.; Katrukha, G. S.; Timofeeva, A. V.; Ilyna, M. V.; Kurochkina, Y. E.; Baratova, L. A.; Sapurina, I. Yu; Ivanov, V. F.

    2011-04-01

    The decontamination of the solutions from micropatogens and drug delivery are the important problems of modern life. It was shown that carbon nanotubes, polyaniline and their composites can interact with antibiotics-polypeptides and some viruses (pandemic strain of influenza viruses A(H1N1)v circulated in Russia in 2009-2010. During a short time drug and viruses can be absorbed by polyaniline and removed from aqueous solutions at the normal conditions. Polyaniline composites can be useful for the preparation of drug delivery and virus control filters and also in biotechnology for the improvement the methods of antibiotics purification.

  4. Human pathogenic viruses at sewage sludge disposal sites in the Middle Atlantic region.

    PubMed

    Goyal, S M; Adams, W N; O'Malley, M L; Lear, D W

    1984-10-01

    Human enteric viruses were detected in samples of water, crabs, and bottom sediments obtained from two sewage sludge disposal sites in the Atlantic Ocean. Viruses were isolated from sediments 17 months after the cessation of sludge dumping. These findings indicate that, under natural conditions, viruses can survive for a long period of time in the marine environment and that they may present potential public health problems to humans using these resources for food and recreation. The isolation of viruses in the absence of fecal indicator bacteria reinforces previous observations on the inadequacy of these bacteria for predicting the virological quality of water and shellfish.

  5. Estimating the reproductive number, total outbreak size, and reporting rates for Zika epidemics in South and Central America.

    PubMed

    Shutt, Deborah P; Manore, Carrie A; Pankavich, Stephen; Porter, Aaron T; Del Valle, Sara Y

    2017-12-01

    As South and Central American countries prepare for increased birth defects from Zika virus outbreaks and plan for mitigation strategies to minimize ongoing and future outbreaks, understanding important characteristics of Zika outbreaks and how they vary across regions is a challenging and important problem. We developed a mathematical model for the 2015/2016 Zika virus outbreak dynamics in Colombia, El Salvador, and Suriname. We fit the model to publicly available data provided by the Pan American Health Organization, using Approximate Bayesian Computation to estimate parameter distributions and provide uncertainty quantification. The model indicated that a country-level analysis was not appropriate for Colombia. We then estimated the basic reproduction number to range between 4 and 6 for El Salvador and Suriname with a median of 4.3 and 5.3, respectively. We estimated the reporting rate to be around 16% in El Salvador and 18% in Suriname with estimated total outbreak sizes of 73,395 and 21,647 people, respectively. The uncertainty in parameter estimates highlights a need for research and data collection that will better constrain parameter ranges. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  6. Estimating the reproductive number, total outbreak size, and reporting rates for Zika epidemics in South and Central America

    DOE PAGES

    Shutt, Deborah P.; Manore, Carrie A.; Pankavich, Stephen; ...

    2017-07-13

    As South and Central American countries prepare for increased birth defects from Zika virus outbreaks and plan for mitigation strategies to minimize ongoing and future outbreaks, understanding important characteristics of Zika outbreaks and how they vary across regions is a challenging and important problem. We developed a mathematical model for the 2015/2016 Zika virus outbreak dynamics in Colombia, El Salvador, and Suriname. We fit the model to publicly available data provided by the Pan American Health Organization, using Approximate Bayesian Computation to estimate parameter distributions and provide uncertainty quantification. The model indicated that a country-level analysis was not appropriate formore » Colombia. We then estimated the basic reproduction number to range between 4 and 6 for El Salvador and Suriname with a median of 4.3 and 5.3, respectively. We estimated the reporting rate to be around 16% in El Salvador and 18% in Suriname with estimated total outbreak sizes of 73,395 and 21,647 people, respectively. The uncertainty in parameter estimates highlights a need for research and data collection that will better constrain parameter ranges.« less

  7. Estimating the reproductive number, total outbreak size, and reporting rates for Zika epidemics in South and Central America

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shutt, Deborah P.; Manore, Carrie A.; Pankavich, Stephen

    As South and Central American countries prepare for increased birth defects from Zika virus outbreaks and plan for mitigation strategies to minimize ongoing and future outbreaks, understanding important characteristics of Zika outbreaks and how they vary across regions is a challenging and important problem. We developed a mathematical model for the 2015/2016 Zika virus outbreak dynamics in Colombia, El Salvador, and Suriname. We fit the model to publicly available data provided by the Pan American Health Organization, using Approximate Bayesian Computation to estimate parameter distributions and provide uncertainty quantification. The model indicated that a country-level analysis was not appropriate formore » Colombia. We then estimated the basic reproduction number to range between 4 and 6 for El Salvador and Suriname with a median of 4.3 and 5.3, respectively. We estimated the reporting rate to be around 16% in El Salvador and 18% in Suriname with estimated total outbreak sizes of 73,395 and 21,647 people, respectively. The uncertainty in parameter estimates highlights a need for research and data collection that will better constrain parameter ranges.« less

  8. A mixed SIR-SIS model to contain a virus spreading through networks with two degrees

    NASA Astrophysics Data System (ADS)

    Essouifi, Mohamed; Achahbar, Abdelfattah

    Due to the fact that the “nodes” and “links” of real networks are heterogeneous, to model computer viruses prevalence throughout the Internet, we borrow the idea of the reduced scale free network which was introduced recently. The purpose of this paper is to extend the previous deterministic two subchains of Susceptible-Infected-Susceptible (SIS) model into a mixed Susceptible-Infected-Recovered and Susceptible-Infected-Susceptible (SIR-SIS) model to contain the computer virus spreading over networks with two degrees. Moreover, we develop its stochastic counterpart. Due to the high protection and security taken for hubs class, we suggest to treat it by using SIR epidemic model rather than the SIS one. The analytical study reveals that the proposed model admits a stable viral equilibrium. Thus, it is shown numerically that the mean dynamic behavior of the stochastic model is in agreement with the deterministic one. Unlike the infection densities i2 and i which both tend to a viral equilibrium for both approaches as in the previous study, i1 tends to the virus-free equilibrium. Furthermore, since a proportion of infectives are recovered, the global infection density i is minimized. Therefore, the permanent presence of viruses in the network due to the lower-degree nodes class. Many suggestions are put forward for containing viruses propagation and minimizing their damages.

  9. [Ebola virus disease].

    PubMed

    Nazimek, Katarzyna; Bociaga-Jasik, Monika; Bryniarski, Krzysztof; Gałas, Aleksander; Garlicki, Aleksander; Gawda, Anna; Gawlik, Grzegorz; Gil, Krzysztof; Kosz-Vnenchak, Magdalena; Mrozek-Budzyn, Dorota; Olszanecki, Rafał; Piatek, Anna; Zawilińska, Barbara; Marcinkiewicz, Janusz

    2014-01-01

    Ebola is one of the most virulent zoonotic RNA viruses causing in humans haemorrhagic fever with fatality ratio reaching 90%. During the outbreak of 2014 the number of deaths exceeded 8.000. The "imported" cases reported in Western Europe and USA highlighted the extreme risk of Ebola virus spreading outside the African countries. Thus, haemorrhagic fever outbreak is an international epidemiological problem, also due to the lack of approved prevention and therapeutic strategies. The editorial review article briefly summarizes current knowledge on Ebola virus disease epidemiology, etiology, pathogenesis, clinical presentation, diagnosis as well as possible prevention and treatment.

  10. Epstein-Barr Virus and Hemophagocytic Lymphohistiocytosis.

    PubMed

    Marsh, Rebecca A

    2017-01-01

    Epstein-Barr virus (EBV) is a ubiquitous virus that infects nearly all people worldwide without serious sequela. However, for patients who have genetic diseases which predispose them to the development of hemophagocytic lymphohistiocytosis (HLH), EBV infection is a life-threatening problem. As a part of a themed collection of articles on EBV infection and human primary immune deficiencies, we will review key concepts related to the understanding and treatment of HLH.

  11. Selective Human Virus and the Ethics of Research Regulation,

    DTIC Science & Technology

    1981-03-01

    though more widespread) virus is Epstein-Barr, which is thought to cause infectious mononucleosis and possibly Burkitt’s lyaphoma (a cancer). As Albert... infectious mononucleosis , a disease with predilection for adolescents and young adults in the higher socio-economic groups. 6) Burkitt’s lymphoma...the virus may risk getting infectious mononucleosis , which can be a devastating disease." ( 9 ) This brings up the problems created by industrial

  12. Neutralization of Virus Infectivity by Antibodies: Old Problems in New Perspectives

    PubMed Central

    Klasse, P. J.

    2016-01-01

    Neutralizing antibodies (NAbs) can be both sufficient and necessary for protection against viral infections, although they sometimes act in concert with cellular immunity. Successful vaccines against viruses induce NAbs but vaccine candidates against some major viral pathogens, including HIV-1, have failed to induce potent and effective such responses. Theories of how antibodies neutralize virus infectivity have been formulated and experimentally tested since the 1930s; and controversies about the mechanistic and quantitative bases for neutralization have continually arisen. Soluble versions of native oligomeric viral proteins that mimic the functional targets of neutralizing antibodies now allow the measurement of the relevant affinities of NAbs. Thereby the neutralizing occupancies on virions can be estimated and related to the potency of the NAbs. Furthermore, the kinetics and stoichiometry of NAb binding can be compared with neutralizing efficacy. Recently, the fundamental discovery that the intracellular factor TRIM21 determines the degree of neutralization of adenovirus has provided new mechanistic and quantitative insights. Since TRIM21 resides in the cytoplasm, it would not affect the neutralization of enveloped viruses, but its range of activity against naked viruses will be important to uncover. These developments bring together the old problems of virus neutralization—mechanism, stoichiometry, kinetics, and efficacy—from surprising new angles. PMID:27099867

  13. OpenZika: An IBM World Community Grid Project to Accelerate Zika Virus Drug Discovery

    PubMed Central

    Perryman, Alexander L.; Horta Andrade, Carolina

    2016-01-01

    The Zika virus outbreak in the Americas has caused global concern. To help accelerate this fight against Zika, we launched the OpenZika project. OpenZika is an IBM World Community Grid Project that uses distributed computing on millions of computers and Android devices to run docking experiments, in order to dock tens of millions of drug-like compounds against crystal structures and homology models of Zika proteins (and other related flavivirus targets). This will enable the identification of new candidates that can then be tested in vitro, to advance the discovery and development of new antiviral drugs against the Zika virus. The docking data is being made openly accessible so that all members of the global research community can use it to further advance drug discovery studies against Zika and other related flaviviruses. PMID:27764115

  14. OpenZika: An IBM World Community Grid Project to Accelerate Zika Virus Drug Discovery.

    PubMed

    Ekins, Sean; Perryman, Alexander L; Horta Andrade, Carolina

    2016-10-01

    The Zika virus outbreak in the Americas has caused global concern. To help accelerate this fight against Zika, we launched the OpenZika project. OpenZika is an IBM World Community Grid Project that uses distributed computing on millions of computers and Android devices to run docking experiments, in order to dock tens of millions of drug-like compounds against crystal structures and homology models of Zika proteins (and other related flavivirus targets). This will enable the identification of new candidates that can then be tested in vitro, to advance the discovery and development of new antiviral drugs against the Zika virus. The docking data is being made openly accessible so that all members of the global research community can use it to further advance drug discovery studies against Zika and other related flaviviruses.

  15. Simulation models examining the effect of Brugian filariasis on dengue epidemics.

    PubMed

    Vaughan, Jefferson A; Focks, Dana A; Turell, Michael J

    2009-01-01

    Concurrent ingestion of microfilariae (mf) and arboviruses by mosquitoes can enhance the transmission of virus compared with when virus is ingested alone. We studied the effect of mf enhancement on the extrinsic incubation period (EIP) of dengue 1 virus within Aedes aegypti mosquitoes by feeding mosquitoes on blood that either contained virus plus Brugia malayi mf or virus only. Mosquitoes were sampled over time to determine viral dissemination rates. Co-ingestion of mf and virus reduced viral EIP by over half. We used the computer simulation program, DENSiM, to compare the predicted patterns of dengue incidence that would result from such a shortened EIP versus the EIP derived from the control (i.e., virus only) group of mosquitoes. Results indicated that, over the 14-year simulation period, mf-induced acceleration of the EIP would generate more frequent (but not necessarily more severe) epidemics. Potential interactions between arboviruses and hematozoans deserve closer scrutiny.

  16. DARPin-targeting of Measles Virus: Unique Bispecificity, Effective Oncolysis, and Enhanced Safety

    PubMed Central

    Friedrich, Katrin; Hanauer, Jan RH; Prüfer, Steffen; Münch, Robert C; Völker, Iris; Filippis, Christodoulos; Jost, Christian; Hanschmann, Kay-Martin; Cattaneo, Roberto; Peng, Kah-Whye; Plückthun, Andreas; Buchholz, Christian J; Cichutek, Klaus; Mühlebach, Michael D

    2013-01-01

    Oncolytic virotherapy is an emerging treatment modality that uses replication-competent viruses to destroy cancers. Many naturally occurring viruses have a preferential, although nonexclusive, tropism for tumors and tumor cells. In addition, specific targeting of cancer cells can be achieved at the virus entry level. We optimized retargeting of cell entry by elongating the measles virus attachment protein with designed ankyrin repeat proteins (DARPins), while simultaneously ablating entry through the natural receptors. DARPin-targeted viruses were strongly attenuated in off-target tissue, thereby enhancing safety, but completely eliminated tumor xenografts. Taking advantage of the unique properties of DARPins of being fused without generating folding problems, we generated a virus simultaneous targeting two different tumor markers. The bispecific virus retained the original oncolytic efficacy, while providing proof of concept for a strategy to counteract issues of resistance development. Thus, DARPin-targeting opens new prospects for the development of personalized, targeted therapeutics. PMID:23380817

  17. a Discrete Mathematical Model to Simulate Malware Spreading

    NASA Astrophysics Data System (ADS)

    Del Rey, A. Martin; Sánchez, G. Rodriguez

    2012-10-01

    With the advent and worldwide development of Internet, the study and control of malware spreading has become very important. In this sense, some mathematical models to simulate malware propagation have been proposed in the scientific literature, and usually they are based on differential equations exploiting the similarities with mathematical epidemiology. The great majority of these models study the behavior of a particular type of malware called computer worms; indeed, to the best of our knowledge, no model has been proposed to simulate the spreading of a computer virus (the traditional type of malware which differs from computer worms in several aspects). In this sense, the purpose of this work is to introduce a new mathematical model not based on continuous mathematics tools but on discrete ones, to analyze and study the epidemic behavior of computer virus. Specifically, cellular automata are used in order to design such model.

  18. Immortalized sheep microglial cells are permissive to a diverse range of ruminant viruses

    USDA-ARS?s Scientific Manuscript database

    Sheep and goats (small ruminants) are economically important livestock animals in many parts of the world. Infectious diseases, including many viral diseases, are significant problems to efficient production of small ruminants. Unfortunately, reagents tailored to small ruminant viruses are lacking ...

  19. Propagation and immunization of infection on general networks with both homogeneous and heterogeneous components

    NASA Astrophysics Data System (ADS)

    Liu, Zonghua; Lai, Ying-Cheng; Ye, Nong

    2003-03-01

    We consider the entire spectrum of architectures of general networks, ranging from being heterogeneous (scale-free) to homogeneous (random), and investigate the infection dynamics by using a three-state epidemiological model that does not involve the mechanism of self-recovery. This model is relevant to realistic situations such as the propagation of a flu virus or information over a social network. Our heuristic analysis and computations indicate that (1) regardless of the network architecture, there exists a substantial fraction of nodes that can never be infected and (2) heterogeneous networks are relatively more robust against spreads of infection as compared with homogeneous networks. We have also considered the problem of immunization for preventing wide spread of infection, with the result that targeted immunization is effective for heterogeneous networks.

  20. Emerging pathogens in the fish farming industry and sequencing-based pathogen discovery.

    PubMed

    Tengs, Torstein; Rimstad, Espen

    2017-10-01

    The use of large scale DNA/RNA sequencing has become an integral part of biomedical research. Reduced sequencing costs and the availability of efficient computational resources has led to a revolution in how problems concerning genomics and transcriptomics are addressed. Sequencing-based pathogen discovery represents one example of how genetic data can now be used in ways that were previously considered infeasible. Emerging pathogens affect both human and animal health due to a multitude of factors, including globalization, a shifting environment and an increasing human population. Fish farming represents a relevant, interesting and challenging system to study emerging pathogens. This review summarizes recent progress in pathogen discovery using sequence data, with particular emphasis on viruses in Atlantic salmon (Salmo salar). Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Genome-Wide Survey of Host Responses: Use of Computational Analysis to Classify Exposures and Extract Signatures of Unconventional Versus Common Viral Exposures

    DTIC Science & Technology

    2006-11-01

    alpha viruses, among which was Venezuelan equine encephalitis (VEE). The “training sets” were constructed from in vitro exposures to purified...virus and 4 serotypes of Dengue), and the forth group include 2 alpha viruses, among which was Venezuelan equine encephalitis (VEE). We have used...We examined our hypothesis that in vitro exposures can predict exposures in vivo. We have used data from PBMC exposed to Venezuelan equine

  2. Stochastic acidification, activation of hemagglutinin and escape of influenza viruses from an endosome

    NASA Astrophysics Data System (ADS)

    Lagache, Thibault; Sieben, Christian; Meyer, Tim; Herrmann, Andreas; Holcman, David

    2017-06-01

    Influenza viruses enter the cell inside an endosome. During the endosomal journey, acidification triggers a conformational change of the virus spike protein hemagglutinin (HA) that results in escape of the viral genome from the endosome into the cytoplasm. It is still unclear how the interplay between acidification and HA conformation changes affects the kinetics of the viral endosomal escape. We develop here a stochastic model to estimate the change of conformation of HAs inside the endosome nanodomain. Using a Markov process, we model the arrival of protons to HA binding sites and compute the kinetics of their accumulation. We compute the Mean First Passage Time (MFPT) of the number of HA bound sites to a threshold, which is used to estimate the HA activation rate for a given pH concentration. The present analysis reveals that HA proton binding sites possess a high chemical barrier, ensuring a stability of the spike protein at sub-acidic pH. We predict that activating more than 3 adjacent HAs is necessary to trigger endosomal fusion and this configuration prevents premature release of viruses from early endosomes

  3. Epidemiology of criniviruses: an emerging problem in world agriculture

    PubMed Central

    Tzanetakis, Ioannis E.; Martin, Robert R.; Wintermantel, William M.

    2013-01-01

    The genus Crinivirus includes the whitefly-transmitted members of the family Closteroviridae. Whitefly-transmitted viruses have emerged as a major problem for world agriculture and are responsible for diseases that lead to losses measured in the billions of dollars annually. Criniviruses emerged as a major agricultural threat at the end of the twentieth century with the establishment and naturalization of their whitefly vectors, members of the genera Trialeurodes and Bemisia, in temperate climates around the globe. Several criniviruses cause significant diseases in single infections whereas others remain asymptomatic and only cause disease when found in mixed infections with other viruses. Characterization of the majority of criniviruses has been done in the last 20 years and this article provides a detailed review on the epidemiology of this important group of viruses. PMID:23730300

  4. The experience of hepatitis C treatment for people with a history of mental health problems: An interpretative phenomenological analysis.

    PubMed

    Ware, K; Davies, J; Rowse, G; Whittaker, S

    2015-07-01

    This qualitative study explores the experience of hepatitis C virus treatment for people with pre-existing mental health problems within a large city hospital. Four men and four women with pre-existing mental health problems who had received hepatitis C virus treatment took part in semi-structured interviews which were analysed using interpretative phenomenological analysis. A central theme of 'Self, stigma and change' was identified which interlinked with three other main themes of 'Coping and responding to treatment', 'Connectedness to others' and 'The impact of information'. These themes and their sub-themes are discussed in relation to existing literature and clinical practice guidelines. © The Author(s) 2013.

  5. Evidence of pervasive biologically functional secondary structures within the genomes of eukaryotic single-stranded DNA viruses.

    PubMed

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y F; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie; Martin, Darren Patrick

    2014-02-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here.

  6. Evidence of Pervasive Biologically Functional Secondary Structures within the Genomes of Eukaryotic Single-Stranded DNA Viruses

    PubMed Central

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y. F.; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie

    2014-01-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here. PMID:24284329

  7. W-curve alignments for HIV-1 genomic comparisons.

    PubMed

    Cork, Douglas J; Lembark, Steven; Tovanabutra, Sodsai; Robb, Merlin L; Kim, Jerome H

    2010-06-01

    The W-curve was originally developed as a graphical visualization technique for viewing DNA and RNA sequences. Its ability to render features of DNA also makes it suitable for computational studies. Its main advantage in this area is utilizing a single-pass algorithm for comparing the sequences. Avoiding recursion during sequence alignments offers advantages for speed and in-process resources. The graphical technique also allows for multiple models of comparison to be used depending on the nucleotide patterns embedded in similar whole genomic sequences. The W-curve approach allows us to compare large numbers of samples quickly. We are currently tuning the algorithm to accommodate quirks specific to HIV-1 genomic sequences so that it can be used to aid in diagnostic and vaccine efforts. Tracking the molecular evolution of the virus has been greatly hampered by gap associated problems predominantly embedded within the envelope gene of the virus. Gaps and hypermutation of the virus slow conventional string based alignments of the whole genome. This paper describes the W-curve algorithm itself, and how we have adapted it for comparison of similar HIV-1 genomes. A treebuilding method is developed with the W-curve that utilizes a novel Cylindrical Coordinate distance method and gap analysis method. HIV-1 C2-V5 env sequence regions from a Mother/Infant cohort study are used in the comparison. The output distance matrix and neighbor results produced by the W-curve are functionally equivalent to those from Clustal for C2-V5 sequences in the mother/infant pairs infected with CRF01_AE. Significant potential exists for utilizing this method in place of conventional string based alignment of HIV-1 genomes, such as Clustal X. With W-curve heuristic alignment, it may be possible to obtain clinically useful results in a short time-short enough to affect clinical choices for acute treatment. A description of the W-curve generation process, including a comparison technique of aligning extremes of the curves to effectively phase-shift them past the HIV-1 gap problem, is presented. Besides yielding similar neighbor-joining phenogram topologies, most Mother and Infant C2-V5 sequences in the cohort pairs geometrically map closest to each other, indicating that W-curve heuristics overcame any gap problem.

  8. How long ago did smallpox virus emerge?

    PubMed

    Shchelkunov, Sergei N

    2009-01-01

    Unlike vertebrates, for which paleontological data are available, and RNA viruses, which display a high rate of genetic variation, an objective estimate of time parameters for the molecular evolution of DNA viruses, which display a low rate of accumulation of mutations, is a complex problem. Genomic studies of a set of smallpox (variola) virus (VARV) isolates demonstrated the patterns of phylogenetic relationships between geographic variants of this virus. Using archival data on smallpox outbreaks and the results of phylogenetic analyses of poxvirus genomes, different research teams have obtained contradictory data on the possible time point of VARV origin. I discuss the approaches used for dating of VARV evolution and adduce the arguments favoring its historically recent origin.

  9. Predicted secondary structure similarity in the absence of primary amino acid sequence homology: hepatitis B virus open reading frames.

    PubMed Central

    Schaeffer, E; Sninsky, J J

    1984-01-01

    Proteins that are related evolutionarily may have diverged at the level of primary amino acid sequence while maintaining similar secondary structures. Computer analysis has been used to compare the open reading frames of the hepatitis B virus to those of the woodchuck hepatitis virus at the level of amino acid sequence, and to predict the relative hydrophilic character and the secondary structure of putative polypeptides. Similarity is seen at the levels of relative hydrophilicity and secondary structure, in the absence of sequence homology. These data reinforce the proposal that these open reading frames encode viral proteins. Computer analysis of this type can be more generally used to establish structural similarities between proteins that do not share obvious sequence homology as well as to assess whether an open reading frame is fortuitous or codes for a protein. PMID:6585835

  10. HIV-1 Strategies of Immune Evasion

    NASA Astrophysics Data System (ADS)

    Castiglione, F.; Bernaschi, M.

    We simulate the progression of the HIV-1 infection in untreated host organisms. The phenotype features of the virus are represented by the replication rate, the probability of activating the transcription, the mutation rate and the capacity to stimulate an immune response (the so-called immunogenicity). It is very difficult to study in-vivo or in-vitro how these characteristics of the virus influence the evolution of the disease. Therefore we resorted to simulations based on a computer model validated in previous studies. We observe, by means of computer experiments, that the virus continuously evolves under the selective pressure of an immune response whose effectiveness downgrades along with the disease progression. The results of the simulations show that immunogenicity is the most important factor in determining the rate of disease progression but, by itself, it is not sufficient to drive the disease to a conclusion in all cases.

  11. Musculoskeletal manifestations of Ebola virus.

    PubMed

    Amissah-Arthur, Maame B; Poller, Bozena; Tunbridge, Anne; Adebajo, Adewale

    2018-01-01

    The 2014 West African Ebola virus disease outbreak shocked the world as it swept through the region leaving Guinea, Liberia and Sierra Leone struggling to gain control. As the largest Ebola virus disease outbreak to date, there are more survivors in its wake than ever before, with a spectrum of health problems requiring management. Here we review various musculoskeletal manifestations of the virus that can occur both during and after the infection, and consider possible pathogenesis. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Genetic diversity of viruses causing mosaic in Louisiana sugarcane

    USDA-ARS?s Scientific Manuscript database

    Mosaic caused by Sugarcane mosaic virus (SCMV) contributed to the near collapse of Louisiana’s sugarcane industry in the early 20th Century. By the 1950s, the cultivation of resistant cultivars eliminated mosaic as a major disease problem; however, new strains arose among previously resistant cultiv...

  13. History and diversity of Citrus leprosis virus recorded in herbarium specimens

    USDA-ARS?s Scientific Manuscript database

    Citrus leprosis disease is at the same time an emerging, a current and a historical problem. Two distinct viruses are associated with this disease, one that produces particles primarily in the nucleus of infected plant cells (CiLV-N; Dichorhavirus) and another, much more widespread type that produc...

  14. A Constructive Induction Approach to Computer Immunology

    DTIC Science & Technology

    1999-03-01

    LVM98] Lamont, Gary B., David A. Van Veldhuizen , and Robert E Marmelstein, A Distributed Architecture for a Self-Adaptive Computer Virus...Artificial Intelligence, Herndon, VA, 1995. [MVL98] Marmelstein, Robert E., David A. Van Veldhuizen , and Gary B. Lamont. Modeling & Analysis

  15. Functional and evolutionary insight from the crystal structure of rubella virus protein E1.

    PubMed

    DuBois, Rebecca M; Vaney, Marie-Christine; Tortorici, M Alejandra; Kurdi, Rana Al; Barba-Spaeth, Giovanna; Krey, Thomas; Rey, Félix A

    2013-01-24

    Little is known about the three-dimensional organization of rubella virus, which causes a relatively mild measles-like disease in children but leads to serious congenital health problems when contracted in utero. Although rubella virus belongs to the same family as the mosquito-borne alphaviruses, in many respects it is more similar to other aerosol-transmitted human viruses such as the agents of measles and mumps. Although the use of the triple MMR (measles, mumps and rubella) live vaccine has limited its incidence in western countries, congenital rubella syndrome remains an important health problem in the developing world. Here we report the 1.8 Å resolution crystal structure of envelope glycoprotein E1, the main antigen and sole target of neutralizing antibodies against rubella virus. E1 is the main player during entry into target cells owing to its receptor-binding and membrane-fusion functions. The structure reveals the epitope and the neutralization mechanism of an important category of protecting antibodies against rubella infection. It also shows that rubella virus E1 is a class II fusion protein, which had hitherto only been structurally characterized for the arthropod-borne alphaviruses and flaviviruses. In addition, rubella virus E1 has an extensive membrane-fusion surface that includes a metal site, reminiscent of the T-cell immunoglobulin and mucin family of cellular proteins that bind phosphatidylserine lipids at the plasma membrane of cells undergoing apoptosis. Such features have not been seen in any fusion protein crystallized so far. Structural comparisons show that the class II fusion proteins from alphaviruses and flaviviruses, despite belonging to different virus families, are closer to each other than they are to rubella virus E1. This suggests that the constraints on arboviruses imposed by alternating cycles between vertebrates and arthropods resulted in more conservative evolution. By contrast, in the absence of this constraint, the strictly human rubella virus seems to have drifted considerably into a unique niche as sole member of the Rubivirus genus.

  16. Analytical and computational modeling of early penetration of non-enveloped icosahedral viruses into cells.

    PubMed

    Katzengold, Rona; Zaharov, Evgeniya; Gefen, Amit

    2016-07-27

    As obligate intracellular parasites, all viruses penetrate target cells to initiate replication and infection. This study introduces two approaches for evaluating the contact loads applied to a cell during early penetration of non-enveloped icosahedral viruses. The first approach is analytical modeling which is based on Hertz's theory for the contact of two elastic bodies; here we model the virus capsid as a triangle and the cell as an order-of-magnitude larger sphere. The second approach is finite element modeling, where we simulate three types of viruses: adeno-, papilloma- and polio- viruses, each interacting with a cell section. We find that the peak contact pressures and forces generated at the initial virus-cell contact depend on the virus geometry - that is both size and shape. With respect to shape, we show that the icosahedral virus shape induces greater peak pressures compared to a spherical virus shape. With respect to size, it is shown that the larger the virus is the greater are the contact loads in the attacked cell. Utilization of our modeling can be substantially useful not only for basic science studies, but also in other, more applied fields, such as in the field of gene therapy, or in `phage' virus studies.

  17. Architecture for removable media USB-ARM

    DOEpatents

    Shue, Craig A.; Lamb, Logan M.; Paul, Nathanael R.

    2015-07-14

    A storage device is coupled to a computing system comprising an operating system and application software. Access to the storage device is blocked by a kernel filter driver, except exclusive access is granted to a first anti-virus engine. The first anti-virus engine is directed to scan the storage device for malicious software and report results. Exclusive access may be granted to one or more other anti-virus engines and they may be directed to scan the storage device and report results. Approval of all or a portion of the information on the storage device is based on the results from the first anti-virus engine and the other anti-virus engines. The storage device is presented to the operating system and access is granted to the approved information. The operating system may be a Microsoft Windows operating system. The kernel filter driver and usage of anti-virus engines may be configurable by a user.

  18. Applying Agrep to r-NSA to solve multiple sequences approximate matching.

    PubMed

    Ni, Bing; Wong, Man-Hon; Lam, Chi-Fai David; Leung, Kwong-Sak

    2014-01-01

    This paper addresses the approximate matching problem in a database consisting of multiple DNA sequences, where the proposed approach applies Agrep to a new truncated suffix array, r-NSA. The construction time of the structure is linear to the database size, and the computations of indexing a substring in the structure are constant. The number of characters processed in applying Agrep is analysed theoretically, and the theoretical upper-bound can approximate closely the empirical number of characters, which is obtained through enumerating the characters in the actual structure built. Experiments are carried out using (synthetic) random DNA sequences, as well as (real) genome sequences including Hepatitis-B Virus and X-chromosome. Experimental results show that, compared to the straight-forward approach that applies Agrep to multiple sequences individually, the proposed approach solves the matching problem in much shorter time. The speed-up of our approach depends on the sequence patterns, and for highly similar homologous genome sequences, which are the common cases in real-life genomes, it can be up to several orders of magnitude.

  19. Multiscale methods for computational RNA enzymology

    PubMed Central

    Panteva, Maria T.; Dissanayake, Thakshila; Chen, Haoyuan; Radak, Brian K.; Kuechler, Erich R.; Giambaşu, George M.; Lee, Tai-Sung; York, Darrin M.

    2016-01-01

    RNA catalysis is of fundamental importance to biology and yet remains ill-understood due to its complex nature. The multi-dimensional “problem space” of RNA catalysis includes both local and global conformational rearrangements, changes in the ion atmosphere around nucleic acids and metal ion binding, dependence on potentially correlated protonation states of key residues and bond breaking/forming in the chemical steps of the reaction. The goal of this article is to summarize and apply multiscale modeling methods in an effort to target the different parts of the RNA catalysis problem space while also addressing the limitations and pitfalls of these methods. Classical molecular dynamics (MD) simulations, reference interaction site model (RISM) calculations, constant pH molecular dynamics (CpHMD) simulations, Hamiltonian replica exchange molecular dynamics (HREMD) and quantum mechanical/molecular mechanical (QM/MM) simulations will be discussed in the context of the study of RNA backbone cleavage transesterification. This reaction is catalyzed by both RNA and protein enzymes, and here we examine the different mechanistic strategies taken by the hepatitis delta virus ribozyme (HDVr) and RNase A. PMID:25726472

  20. Risk assessment of virus infections in the Oder estuary (southern Baltic) on the basis of spatial transport and virus decay simulations.

    PubMed

    Schernewski, G; Jülich, W D

    2001-05-01

    The large Oder (Szczecin) Lagoon (687 km2) at the German-Polish border, close to the Baltic Sea, suffers from severe eutrophication and water quality problems due to high discharge of water, nutrients and pollutants by the river Oder. Sewage treatment around the lagoon has been very much improved during the last years, but large amounts of sewage still enter the Oder river. Human pathogenic viruses generally can be expected in all surface waters that are affected by municipal sewage. There is an increasing awareness that predisposed persons can be infected by a few infective units or even a single active virus. Another new aspect is, that at least polioviruses attached to suspended particles can be infective for weeks and therefore be transported over long distances. Therefore, the highest risk of virus inputs arise from the large amounts of untreated sewage of the city of Szczecin (Poland), which are released into the river Oder and transported to the lagoon and the Baltic Sea. Summer tourism is the most important economical factor in this coastal region and further growth is expected. Human pathogenic viruses might be a serious problem for bathing water quality and sustainable summer tourism. The potential hazard of virus infections along beaches and shores of the Oder lagoon and adjacent parts of the Baltic Sea is evaluated on the basis of model simulations and laboratory results. We used two scenarios for the Older Lagoon considering free viruses and viruses attached to suspended particle matter. The spatial impact of the average virus release in the city of Szczecin during summer (bathing period) was simulated with a hydrodynamic and particle tracking model. Simulations suggest that due to fast inactivation, free viruses in the water represent a risk only in the river and near the river mouth. On the other hand, viruses attached to suspended matter can affect large areas of the eastern, Polish part of the lagoon (Grosses Haff). At the same time the accumulation of viruses on suspended particulate matter increases the likelihood of an infection after incorporation of such a particle. There is no evidence, that there is a risk of virus infections in the western part of the lagoon (Kleines Haff) or along the outer Baltic Sea coast.

  1. Cyber War: The Next Frontier for NATO

    DTIC Science & Technology

    2015-03-01

    cyber-attacks as a way to advance their agenda. Common examples of cyber- attacks include computer viruses, worms , malware, and distributed denial of...take advantage of security holes and cause damage to computer systems, steal financial data, or acquire sensitive secrets. As technology becomes

  2. Safeguarding Databases Basic Concepts Revisited.

    ERIC Educational Resources Information Center

    Cardinali, Richard

    1995-01-01

    Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)

  3. Computational protein design: a review

    NASA Astrophysics Data System (ADS)

    Coluzza, Ivan

    2017-04-01

    Proteins are one of the most versatile modular assembling systems in nature. Experimentally, more than 110 000 protein structures have been identified and more are deposited every day in the Protein Data Bank. Such an enormous structural variety is to a first approximation controlled by the sequence of amino acids along the peptide chain of each protein. Understanding how the structural and functional properties of the target can be encoded in this sequence is the main objective of protein design. Unfortunately, rational protein design remains one of the major challenges across the disciplines of biology, physics and chemistry. The implications of solving this problem are enormous and branch into materials science, drug design, evolution and even cryptography. For instance, in the field of drug design an effective computational method to design protein-based ligands for biological targets such as viruses, bacteria or tumour cells, could give a significant boost to the development of new therapies with reduced side effects. In materials science, self-assembly is a highly desired property and soon artificial proteins could represent a new class of designable self-assembling materials. The scope of this review is to describe the state of the art in computational protein design methods and give the reader an outline of what developments could be expected in the near future.

  4. Applications of computer-aided approaches in the development of hepatitis C antiviral agents.

    PubMed

    Ganesan, Aravindhan; Barakat, Khaled

    2017-04-01

    Hepatitis C virus (HCV) is a global health problem that causes several chronic life-threatening liver diseases. The numbers of people affected by HCV are rising annually. Since 2011, the FDA has approved several anti-HCV drugs; while many other promising HCV drugs are currently in late clinical trials. Areas covered: This review discusses the applications of different computational approaches in HCV drug design. Expert opinion: Molecular docking and virtual screening approaches have emerged as a low-cost tool to screen large databases and identify potential small-molecule hits against HCV targets. Ligand-based approaches are useful for filtering-out compounds with rich physicochemical properties to inhibit HCV targets. Molecular dynamics (MD) remains a useful tool in optimizing the ligand-protein complexes and understand the ligand binding modes and drug resistance mechanisms in HCV. Despite their varied roles, the application of in-silico approaches in HCV drug design is still in its infancy. A more mature application should aim at modelling the whole HCV replicon in its active form and help to identify new effective druggable sites within the replicon system. With more technological advancements, the roles of computer-aided methods are only going to increase several folds in the development of next-generation HCV drugs.

  5. Detection of yellow fever virus genomes from four imported cases in China.

    PubMed

    Cui, Shujuan; Pan, Yang; Lyu, Yanning; Liang, Zhichao; Li, Jie; Sun, Yulan; Dou, Xiangfeng; Tian, Lili; Huo, Da; Chen, Lijuan; Li, Xinyu; Wang, Quanyi

    2017-07-01

    Yellow fever virus (YFV), as the first proven human-pathogenic virus, is still a major public health problem with a dramatic upsurge in recent years. This is a report on four imported cases of yellow fever virus into China identified by whole genome sequencing. Phylogenetic analysis was performed and the results showed that these four viruses were highly homologous with Angola 71 strains (AY968064). In addition, effective mutations of amino acids were not observed in the E protein domain of four viruses, thus confirming the effectiveness of the YFV-17D vaccine (X03700). Although there is low risk of local transmission in most part of China, the increasing public health risk of YF caused by international exchange should not be ignored. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  6. [ZIKA--VIRUS INFECTION].

    PubMed

    Velev, V

    2016-01-01

    This review summarizes the knowledge of the scientific community for Zika-virus infection. It became popular because of severe congenital damage causes of CNS in newborns whose mothers are infected during pregnancy, as well as the risk of pandemic distribution. Discusses the peculiarities of the biology and ecology of vectors--blood-sucking mosquitoes Aedes; stages in the spread of infection and practical problems which caused during pregnancy. Attention is paid to the recommendations that allow leading national and international medical organizations to deal with the threat Zika-virus infection.

  7. The future of influenza A virus vaccines for swine

    USDA-ARS?s Scientific Manuscript database

    Economic losses due to influenza A virus (IAV) infections are substantial and a global problem, ranking among the top three major health challenges in the swine industry. Currently, H1 and H3 subtypes circulate in pigs globally associated with different combinations of N1 and N2 subtypes; however, t...

  8. Problem-Solving Test: The Mechanism of Action of a Human Papilloma Virus Oncoprotein

    ERIC Educational Resources Information Center

    Szeberenyi, Jozsef

    2009-01-01

    Terms to be familiar with before you start to solve the test: human papilloma virus; cervical cancer; oncoproteins; malignant transformation; retinoblastoma protein; cell cycle; quiescent and cycling cells; cyclin/cyclin-dependent kinase (Cdk) complexes; E2F; S-phase genes; enhancer element; proto-oncogenes; tumor suppressor genes; radioactive…

  9. How to Keep Your Campus Safe from Infection

    ERIC Educational Resources Information Center

    Brown, Scott

    2005-01-01

    In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…

  10. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  11. Designing and Testing Broadly-Protective Filoviral Vaccines Optimized for Cytotoxic T-Lymphocyte Epitope Coverage

    PubMed Central

    Fenimore, Paul W.; Foley, Brian T.; Bakken, Russell R.; Thurmond, James R.; Yusim, Karina; Yoon, Hyejin; Parker, Michael; Hart, Mary Kate; Dye, John M.; Korber, Bette; Kuiken, Carla

    2012-01-01

    We report the rational design and in vivo testing of mosaic proteins for a polyvalent pan-filoviral vaccine using a computational strategy designed for the Human Immunodeficiency Virus type 1 (HIV-1) but also appropriate for Hepatitis C virus (HCV) and potentially other diverse viruses. Mosaics are sets of artificial recombinant proteins that are based on natural proteins. The recombinants are computationally selected using a genetic algorithm to optimize the coverage of potential cytotoxic T lymphocyte (CTL) epitopes. Because evolutionary history differs markedly between HIV-1 and filoviruses, we devised an adapted computational technique that is effective for sparsely sampled taxa; our first significant result is that the mosaic technique is effective in creating high-quality mosaic filovirus proteins. The resulting coverage of potential epitopes across filovirus species is superior to coverage by any natural variants, including current vaccine strains with demonstrated cross-reactivity. The mosaic cocktails are also robust: mosaics substantially outperformed natural strains when computationally tested against poorly sampled species and more variable genes. Furthermore, in a computational comparison of cross-reactive potential a design constructed prior to the Bundibugyo outbreak performed nearly as well against all species as an updated design that included Bundibugyo. These points suggest that the mosaic designs would be more resilient than natural-variant vaccines against future Ebola outbreaks dominated by novel viral variants. We demonstrate in vivo immunogenicity and protection against a heterologous challenge in a mouse model. This design work delineates the likely requirements and limitations on broadly-protective filoviral CTL vaccines. PMID:23056184

  12. Fast Dating Using Least-Squares Criteria and Algorithms.

    PubMed

    To, Thu-Hien; Jung, Matthieu; Lycett, Samantha; Gascuel, Olivier

    2016-01-01

    Phylogenies provide a useful way to understand the evolutionary history of genetic samples, and data sets with more than a thousand taxa are becoming increasingly common, notably with viruses (e.g., human immunodeficiency virus (HIV)). Dating ancestral events is one of the first, essential goals with such data. However, current sophisticated probabilistic approaches struggle to handle data sets of this size. Here, we present very fast dating algorithms, based on a Gaussian model closely related to the Langley-Fitch molecular-clock model. We show that this model is robust to uncorrelated violations of the molecular clock. Our algorithms apply to serial data, where the tips of the tree have been sampled through times. They estimate the substitution rate and the dates of all ancestral nodes. When the input tree is unrooted, they can provide an estimate for the root position, thus representing a new, practical alternative to the standard rooting methods (e.g., midpoint). Our algorithms exploit the tree (recursive) structure of the problem at hand, and the close relationships between least-squares and linear algebra. We distinguish between an unconstrained setting and the case where the temporal precedence constraint (i.e., an ancestral node must be older that its daughter nodes) is accounted for. With rooted trees, the former is solved using linear algebra in linear computing time (i.e., proportional to the number of taxa), while the resolution of the latter, constrained setting, is based on an active-set method that runs in nearly linear time. With unrooted trees the computing time becomes (nearly) quadratic (i.e., proportional to the square of the number of taxa). In all cases, very large input trees (>10,000 taxa) can easily be processed and transformed into time-scaled trees. We compare these algorithms to standard methods (root-to-tip, r8s version of Langley-Fitch method, and BEAST). Using simulated data, we show that their estimation accuracy is similar to that of the most sophisticated methods, while their computing time is much faster. We apply these algorithms on a large data set comprising 1194 strains of Influenza virus from the pdm09 H1N1 Human pandemic. Again the results show that these algorithms provide a very fast alternative with results similar to those of other computer programs. These algorithms are implemented in the LSD software (least-squares dating), which can be downloaded from http://www.atgc-montpellier.fr/LSD/, along with all our data sets and detailed results. An Online Appendix, providing additional algorithm descriptions, tables, and figures can be found in the Supplementary Material available on Dryad at http://dx.doi.org/10.5061/dryad.968t3. © The Author(s) 2015. Published by Oxford University Press, on behalf of the Society of Systematic Biologists.

  13. Fast Dating Using Least-Squares Criteria and Algorithms

    PubMed Central

    To, Thu-Hien; Jung, Matthieu; Lycett, Samantha; Gascuel, Olivier

    2016-01-01

    Phylogenies provide a useful way to understand the evolutionary history of genetic samples, and data sets with more than a thousand taxa are becoming increasingly common, notably with viruses (e.g., human immunodeficiency virus (HIV)). Dating ancestral events is one of the first, essential goals with such data. However, current sophisticated probabilistic approaches struggle to handle data sets of this size. Here, we present very fast dating algorithms, based on a Gaussian model closely related to the Langley–Fitch molecular-clock model. We show that this model is robust to uncorrelated violations of the molecular clock. Our algorithms apply to serial data, where the tips of the tree have been sampled through times. They estimate the substitution rate and the dates of all ancestral nodes. When the input tree is unrooted, they can provide an estimate for the root position, thus representing a new, practical alternative to the standard rooting methods (e.g., midpoint). Our algorithms exploit the tree (recursive) structure of the problem at hand, and the close relationships between least-squares and linear algebra. We distinguish between an unconstrained setting and the case where the temporal precedence constraint (i.e., an ancestral node must be older that its daughter nodes) is accounted for. With rooted trees, the former is solved using linear algebra in linear computing time (i.e., proportional to the number of taxa), while the resolution of the latter, constrained setting, is based on an active-set method that runs in nearly linear time. With unrooted trees the computing time becomes (nearly) quadratic (i.e., proportional to the square of the number of taxa). In all cases, very large input trees (>10,000 taxa) can easily be processed and transformed into time-scaled trees. We compare these algorithms to standard methods (root-to-tip, r8s version of Langley–Fitch method, and BEAST). Using simulated data, we show that their estimation accuracy is similar to that of the most sophisticated methods, while their computing time is much faster. We apply these algorithms on a large data set comprising 1194 strains of Influenza virus from the pdm09 H1N1 Human pandemic. Again the results show that these algorithms provide a very fast alternative with results similar to those of other computer programs. These algorithms are implemented in the LSD software (least-squares dating), which can be downloaded from http://www.atgc-montpellier.fr/LSD/, along with all our data sets and detailed results. An Online Appendix, providing additional algorithm descriptions, tables, and figures can be found in the Supplementary Material available on Dryad at http://dx.doi.org/10.5061/dryad.968t3. PMID:26424727

  14. [Study of the virus carrier state in chicken influenza].

    PubMed

    Smolenskiĭ, V I; Osidze, N G; Bogautdinov, Z F; Panteleev, Iu V; Siurin, V N

    1978-01-01

    The problems of virus carrier state in influenza are connected with two aspects of the disease: the duration of virus antigen persistence in convalescents and changes of influenza virus properties in the course of persistence. In the present study, natural influenza infection in chickens caused by influenza A/chicken/USSR/336/74 virus (Hav6H3--N2) was used to determine the duration of virus antigen persistence (up to 60 days) and the entire period of virus isolation from the survivers (up to 30 days). Administration of hydrocortisone on the 50th day of convalescence permitted to obtain from the chickens several influenza A virus isolates antigenically unrelated to the epizootic strain either in hemagglutinin or in neuraminidase. Cultivation of isolate No. 42 (Hav7Neq1) in the presence of the homologous serum yielded strain 42' which was neutralized by the serum to Hav6H3--N2 virus. The isolates differed from the epizootic virus by their biological properties: the eluting activity, pathogenesis and morphology. The above facts of antigenic variability are considered in the light of the antigenic heterogeneity of the natural virus population and the possibility of virus activation by the provoking effect of extreme conditions on the carriers of latent infection.

  15. Preliminary Classification of Novel Hemorrhagic Fever-Causing Viruses Using Sequence-Based PAirwise Sequence Comparison (PASC) Analysis.

    PubMed

    Bào, Yīmíng; Kuhn, Jens H

    2018-01-01

    During the last decade, genome sequence-based classification of viruses has become increasingly prominent. Viruses can be even classified based on coding-complete genome sequence data alone. Nevertheless, classification remains arduous as experts are required to establish phylogenetic trees to depict the evolutionary relationships of such sequences for preliminary taxonomic placement. Pairwise sequence comparison (PASC) of genomes is one of several novel methods for establishing relationships among viruses. This method, provided by the US National Center for Biotechnology Information as an open-access tool, circumvents phylogenetics, and yet PASC results are often in agreement with those of phylogenetic analyses. Computationally inexpensive, PASC can be easily performed by non-taxonomists. Here we describe how to use the PASC tool for the preliminary classification of novel viral hemorrhagic fever-causing viruses.

  16. A review of simulation modelling approaches used for the spread of zoonotic influenza viruses in animal and human populations.

    PubMed

    Dorjee, S; Poljak, Z; Revie, C W; Bridgland, J; McNab, B; Leger, E; Sanchez, J

    2013-09-01

    Increasing incidences of emerging and re-emerging diseases that are mostly zoonotic (e.g. severe acute respiratory syndrome, avian influenza H5N1, pandemic influenza) has led to the need for a multidisciplinary approach to tackling these threats to public and animal health. Accordingly, a global movement of 'One-Health/One-Medicine' has been launched to foster collaborative efforts amongst animal and human health officials and researchers to address these problems. Historical evidence points to the fact that pandemics caused by influenza A viruses remain a major zoonotic threat to mankind. Recently, a range of mathematical and computer simulation modelling methods and tools have increasingly been applied to improve our understanding of disease transmission dynamics, contingency planning and to support policy decisions on disease outbreak management. This review provides an overview of methods, approaches and software used for modelling the spread of zoonotic influenza viruses in animals and humans, particularly those related to the animal-human interface. Modelling parameters used in these studies are summarized to provide references for future work. This review highlights the limited application of modelling research to influenza in animals and at the animal-human interface, in marked contrast to the large volume of its research in human populations. Although swine are widely recognized as a potential host for generating novel influenza viruses, and that some of these viruses, including pandemic influenza A/H1N1 2009, have been shown to be readily transmissible between humans and swine, only one study was found related to the modelling of influenza spread at the swine-human interface. Significant gaps in the knowledge of frequency of novel viral strains evolution in pigs, farm-level natural history of influenza infection, incidences of influenza transmission between farms and between swine and humans are clearly evident. Therefore, there is a need to direct additional research to the study of influenza transmission dynamics in animals and at the animal-human interface. © 2012 Blackwell Verlag GmbH.

  17. Patient and physician preferences for the treatment of chronic hepatitis C virus infections: does the perspective matter?

    PubMed

    Pacou, Maud; Basso, Federica; Gore, Charles; Hass, Bastian; Taieb, Vanessa; Cognet, Magali; Pol, Stanislas

    2015-09-01

    The objectives of this study were to identify and quantify the factors driving patient and physician preferences for treatments of genotype 1 hepatitis C virus infection in the UK. A web survey was conducted, including 100 patients (50 treatment-naive and 50 treatment-experienced patients) and 50 physicians (gastroenterologists/ hepatologists and infectious disease specialists). A discrete-choice experiment was conducted to elicit the participants' preferences on the basis of seven attributes with four levels each: efficacy, that is probability of reaching sustained virologic response, treatment duration, treatment convenience (i.e. number of pills and/or injections), gastrointestinal problems, anaemia, dermatological problems and neuropsychological problems. The statistical analysis applied a mixed logit model to estimate preference weights and relative importance scores. Results indicated that the sustained virologic response rate was the most important attribute to participants. Physicians placed an even greater weight on the efficacy of treatments with a relative importance score of 9.33 [95% confidence interval: (6.93-11.91)], as compared with 6.16 [95% confidence interval: (4.34-8.15)] for patients. Neuropsychological problems ranked second for patients and physicians, and were more important to treatment-naive patients than to treatment-experienced patients or physicians. Gastrointestinal problems, anaemia and dermatological problems were of minor importance to all participants. These findings may be explained by the improvement in the management of physical adverse reactions over the last few years, thus making treatment easier to tolerate. This study is the first conjoint analysis assessing and comparing the preferences of patients and physicians in hepatitis C virus.

  18. A better communcation with the patients improves the management of HIV disease: a nonsystematic review

    PubMed Central

    TZANEVA, VALENTINA; IACOB, TEODORA

    2013-01-01

    The human immunodeficiency virus (HIV) is a blood-borne, sexually transmissible virus which belongs to a subset of viruses called retroviruses. Patients with HIV disease face problems like stigma, discrimination, poverty and marginalization. These problems also affect the physician-patient communication in HIV disease. Learning to conduct a consultation is a complex skill which is gradually learned and perfected during training and career. Good physician-patient communication in HIV disease demands medical professional competence, good communication skills, ethical behaviour, respect of patient’s dignity, good teamwork skills and maintaining confidentiality. The most important aspect of patient care is education, which should include empowering patients with basic knowledge about HIV infection, methods of transmission, progression, prognosis, and prevention. A multidisciplinary approach that uses the special skills of nurses, pharmacists, nutritionists, social workers, and case managers is desirable. Effective methods for clinicians to support such development are needed. PMID:26527943

  19. Space pruning monotonic search for the non-unique probe selection problem.

    PubMed

    Pappalardo, Elisa; Ozkok, Beyza Ahlatcioglu; Pardalos, Panos M

    2014-01-01

    Identification of targets, generally viruses or bacteria, in a biological sample is a relevant problem in medicine. Biologists can use hybridisation experiments to determine whether a specific DNA fragment, that represents the virus, is presented in a DNA solution. A probe is a segment of DNA or RNA, labelled with a radioactive isotope, dye or enzyme, used to find a specific target sequence on a DNA molecule by hybridisation. Selecting unique probes through hybridisation experiments is a difficult task, especially when targets have a high degree of similarity, for instance in a case of closely related viruses. After preliminary experiments, performed by a canonical Monte Carlo method with Heuristic Reduction (MCHR), a new combinatorial optimisation approach, the Space Pruning Monotonic Search (SPMS) method, is introduced. The experiments show that SPMS provides high quality solutions and outperforms the current state-of-the-art algorithms.

  20. Next-generation sequencing in clinical virology: Discovery of new viruses.

    PubMed

    Datta, Sibnarayan; Budhauliya, Raghvendra; Das, Bidisha; Chatterjee, Soumya; Vanlalhmuaka; Veer, Vijay

    2015-08-12

    Viruses are a cause of significant health problem worldwide, especially in the developing nations. Due to different anthropological activities, human populations are exposed to different viral pathogens, many of which emerge as outbreaks. In such situations, discovery of novel viruses is utmost important for deciding prevention and treatment strategies. Since last century, a number of different virus discovery methods, based on cell culture inoculation, sequence-independent PCR have been used for identification of a variety of viruses. However, the recent emergence and commercial availability of next-generation sequencers (NGS) has entirely changed the field of virus discovery. These massively parallel sequencing platforms can sequence a mixture of genetic materials from a very heterogeneous mix, with high sensitivity. Moreover, these platforms work in a sequence-independent manner, making them ideal tools for virus discovery. However, for their application in clinics, sample preparation or enrichment is necessary to detect low abundance virus populations. A number of techniques have also been developed for enrichment or viral nucleic acids. In this manuscript, we review the evolution of sequencing; NGS technologies available today as well as widely used virus enrichment technologies. We also discuss the challenges associated with their applications in the clinical virus discovery.

  1. Self-assembly of virus-like particles of canine parvovirus capsid protein expressed from Escherichia coli and application as virus-like particle vaccine.

    PubMed

    Xu, Jin; Guo, Hui-Chen; Wei, Yan-Quan; Dong, Hu; Han, Shi-Chong; Ao, Da; Sun, De-Hui; Wang, Hai-Ming; Cao, Sui-Zhong; Sun, Shi-Qi

    2014-04-01

    Canine parvovirus disease is an acute infectious disease caused by canine parvovirus (CPV). Current commercial vaccines are mainly attenuated and inactivated; as such, problems concerning safety may occur. To resolve this problem, researchers developed virus-like particles (VLPs) as biological nanoparticles resembling natural virions and showing high bio-safety. This property allows the use of VLPs for vaccine development and mechanism studies of viral infections. Tissue-specific drug delivery also employs VLPs as biological nanomaterials. Therefore, VLPs derived from CPV have a great potential in medicine and diagnostics. In this study, small ubiquitin-like modifier (SUMO) fusion motif was utilized to express a whole, naturalVP2 protein of CPV in Escherichia coli. After the cleavage of the fusion motif, the CPV VP2 protein has self-assembled into VLPs. The VLPs had a size and shape that resembled the authentic virus capsid. However, the self-assembly efficiency of VLPs can be affected by different pH levels and ionic strengths. The mice vaccinated subcutaneously with CPV VLPs and CPV-specific immune responses were compared with those immunized with the natural virus. This result showed that VLPs can effectively induce anti-CPV specific antibody and lymphocyte proliferation as a whole virus. This result further suggested that the antigen epitope of CPV was correctly present on VLPs, thereby showing the potential application of a VLP-based CPV vaccine.

  2. Low temperature MS2 (ATCC15597-B1) virus inactivation using a hot bubble column evaporator (HBCE).

    PubMed

    Garrido, A; Pashley, R M; Ninham, B W

    2017-03-01

    In the treatment of household wastewater viruses are hard to eliminate. A new technique is described which tackles this major problem. The MS2 (ATCC15597-B1) virus was used as a surrogate to estimate the inactivation rates for enteric viruses by a hot (150°C) air bubble column evaporator (HBCE) system Its surface charging properties obtained by dynamic light scattering, have been studied in a range of aqueous salt solutions and secondary treated synthetic sewage water. A combination of MS2 virus surface charge properties with thermal inactivation rates, and an improved double layer plaque assay technique, allows an assessment of the efficiency of the HBCE process for virus removal in water. The system is a new energy efficient treatment for water reuse applications. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. New molecular methods for the detection of hepatitis A and Norwalk viruses in shellfish.

    PubMed

    Romalde, J L

    1996-12-01

    Outbreaks of viral enteric diseases after consumption of shellfish are a major health risk. Methodological problems (such as toxicity for cell cultures and low viral concentrations) and the unculturability of some strains (i.e. hepatitis A virus, Norwalk virus) have made it difficult to study those viruses in the environmental samples. Currently, the analysis of the hygienic quality of marketable shellfish is determined by the use of fecal indicator bacteria, but their reliability in determining viral pollution of shellfish is very low. Recent biotechnology developments are providing available rapid, sensitive, and specific tools for detecting food-borne viruses in shellfish and in shellfish-growing waters. In this paper, a review of these new molecular methods is carried out, discussing their advantages and possible applications.

  4. Assessment of computer-related health problems among post-graduate nursing students.

    PubMed

    Khan, Shaheen Akhtar; Sharma, Veena

    2013-01-01

    The study was conducted to assess computer-related health problems among post-graduate nursing students and to develop a Self Instructional Module for prevention of computer-related health problems in a selected university situated in Delhi. A descriptive survey with co-relational design was adopted. A total of 97 samples were selected from different faculties of Jamia Hamdard by multi stage sampling with systematic random sampling technique. Among post-graduate students, majority of sample subjects had average compliance with computer-related ergonomics principles. As regards computer related health problems, majority of post graduate students had moderate computer-related health problems, Self Instructional Module developed for prevention of computer-related health problems was found to be acceptable by the post-graduate students.

  5. Utilisation of ISA Reverse Genetics and Large-Scale Random Codon Re-Encoding to Produce Attenuated Strains of Tick-Borne Encephalitis Virus within Days.

    PubMed

    de Fabritus, Lauriane; Nougairède, Antoine; Aubry, Fabien; Gould, Ernest A; de Lamballerie, Xavier

    2016-01-01

    Large-scale codon re-encoding is a new method of attenuating RNA viruses. However, the use of infectious clones to generate attenuated viruses has inherent technical problems. We previously developed a bacterium-free reverse genetics protocol, designated ISA, and now combined it with large-scale random codon-re-encoding method to produce attenuated tick-borne encephalitis virus (TBEV), a pathogenic flavivirus which causes febrile illness and encephalitis in humans. We produced wild-type (WT) and two re-encoded TBEVs, containing 273 or 273+284 synonymous mutations in the NS5 and NS5+NS3 coding regions respectively. Both re-encoded viruses were attenuated when compared with WT virus using a laboratory mouse model and the relative level of attenuation increased with the degree of re-encoding. Moreover, all infected animals produced neutralizing antibodies. This novel, rapid and efficient approach to engineering attenuated viruses could potentially expedite the development of safe and effective new-generation live attenuated vaccines.

  6. Swine influenza virus vaccine research and technology: What does the future hold and what are our next steps?

    USDA-ARS?s Scientific Manuscript database

    Swine influenza represents a problem for the health of pigs and the economic health of the swine industry due to real and perceived public health risks. This is largely driven by the diversity of influenza A viruses (IAV) in swine herds. Antigenic drift (mutations) and shifts (reassortments) by in...

  7. Use of novel RT-PCR assay to detect picobirnavirus in Poultry Intestinal samples collected from the field

    USDA-ARS?s Scientific Manuscript database

    Recent metagenomic analyses of the turkey gut ribonucleic acid (RNA) virus community in our laboratory have identified novel enteric RNA viruses that may play roles in the poultry enteric diseases and in performance problems noted in the field. This has lead to new molecular diagnostic assays for ce...

  8. Detection of cucumber green mottle mosaic virus-infected watermelon seeds using short wave infrared (SWIR) hyperspectral imaging system

    USDA-ARS?s Scientific Manuscript database

    The cucurbit diseases caused by cucumber green mottle mosaic virus (CGMMV) have led to a serious problem to growers and seed producers because it is difficult to prevent spreading through causal agent of seeds. Conventional detection methods for infected seed such as a biological, serological, and m...

  9. [Selected problems of manufacturing influenza vaccines].

    PubMed

    Augustynowicz, Ewa

    2010-01-01

    In the study chosen issues of manufacturing influenza vaccines running to increase effectiveness were performed. New concepts into development of process of safety and efficacy influenza vaccines are connected with use a new adjuvants, use of alternative routes of administration of vaccine, new structural virus subunits including DNA, new way of virus culture and use of live, attenuated vaccines.

  10. Identification of aberrantly expressed circRNAs in subgroup J avian leucosis virus induced tumor livers by RNA sequencing

    USDA-ARS?s Scientific Manuscript database

    ALV-J (subgroup J avian leucosis virus) is a kind of oncogenic exogenous retrovirus and diseases associated with ALV-J have caused severe reproduction problems in the poultry industry worldwide. However, the pathogenesis of ALV-J-induced tumor formation is still unclear. In recent years, circRNAs ar...

  11. Demonstration of systemic infection of BVDV Vaccine virus after vaccination in presence of PI calves

    USDA-ARS?s Scientific Manuscript database

    Bovine viral diarrhea virus (BVDV) was detected during routine necropsy of calves, from a well vaccinated, large Jersey/Holstein dairy herd (n=10,000) in California, that succumbed to ill thrift. According to herd management, BVDV has not been considered a problem in the past. The herd had been exte...

  12. West Nile Virus Fitness Costs in Different Mosquito Species.

    PubMed

    Coffey, Lark L; Reisen, William K

    2016-06-01

    West Nile virus (WNV) remains an important public health problem causing annual epidemics in the United States. Grubaugh et al. observed that WNV genetic divergence is dependent on the vector mosquito species. This suggests that specific WNV vector-bird species pairings may generate novel genotypes that could promote outbreaks. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Assessment of common soybean-infecting viruses in Ohio, USA, through multisite sampling and high-throughput sequencing

    USDA-ARS?s Scientific Manuscript database

    To assess the scope of virus disease problems of soybean in Ohio, USA, a survey was conducted during 2011 and 2012 soybean growing seasons. A total of 259 samples were collected from 80 soybean fields distributed in 42 Ohio counties, accounting for more than 90% of major soybean-growing counties in ...

  14. Characterization of whitefly and whitefly-borne virus populations in tomato- and sweet pepper-growing greenhouses in the Cartago province, Costa Rica

    USDA-ARS?s Scientific Manuscript database

    Crop production in greenhouse environments requires special care. Poor management can favor pest related problems which can lead to economic losses. Whiteflies and whitefly-borne viruses are major constraints to the production of tomato and sweet pepper both in field and greenhouses settings. Limit...

  15. A computationally designed inhibitor of an Epstein-Barr viral Bcl-2 protein induces apoptosis in infected cells

    PubMed Central

    Shen, Betty W.; Song, Yifan; Frayo, Shani; Convertine, Anthony J.; Margineantu, Daciana; Booth, Garrett; Correia, Bruno E.; Cheng, Yuanhua; Schief, William R.; Hockenbery, David M.; Press, Oliver W.; Stoddard, Barry L.; Stayton, Patrick S.; Baker, David

    2014-01-01

    SUMMARY Since apoptosis of infected cells can limit virus production and spread, some viruses have co-opted prosurvival genes from the host. This includes the Epstein-Barr virus (EBV) gene BHRF1, a homologue of human Bcl-2 proteins that block apoptosis and are associated with cancer. Computational design and experimental optimization were used to generate a novel protein called BINDI that binds BHRF1 with picomolar affinity. BINDI recognizes the hydrophobic cleft of BHRF1 in a manner similar to other Bcl-2 protein interactions, but makes many additional contacts to achieve exceptional affinity and specificity. BINDI induces apoptosis in EBV-infected cancer lines, and when delivered with an antibody-targeted intracellular delivery carrier, BINDI suppressed tumor growth and extended survival in a xenograft disease model of EBV-positive human lymphoma. High specificity designed proteins that selectively kill target cells may provide an advantage over the toxic compounds used in current generation antibody-drug conjugates. PMID:24949974

  16. A computationally optimized broadly reactive H5 hemagglutinin vaccine provides protection against homologous and heterologous H5N1 highly pathogenic avian influenza virus infection in chickens

    USDA-ARS?s Scientific Manuscript database

    Since its emergence in 1996 in China, H5N1 highly pathogenic avian influenza (HPAI) virus has continuously evolved into different genetic clades that have created challenges to maintaining antigenically relevant H5N1 vaccine seeds. Therefore, a universal (multi-hemagglutinin [HA] subtype) or more c...

  17. Computer Security: Virus Highlights Need for Improved Internet Management

    DTIC Science & Technology

    1989-06-01

    and Finance Committee on Energy and Commerce House of Representatives Dear Mr. Chairman: This report responds to your October 14,1988, request and...virus incident, the Chairman, Subcommittee on Telecommunications and Finance , House Committee on Energy and Commerce, asked GAO to provide an overview...Chairman, Subcom- mittee on Telecommunications and Finance , House Committee on Energy and Commerce, and subsequent agreements with his office, the

  18. Epstein-Barr virus: a paradigm for persistent infection - for real and in virtual reality.

    PubMed

    Thorley-Lawson, David A; Duca, Karen A; Shapiro, Michael

    2008-04-01

    The really interesting thing about herpesviruses is that they can establish lifelong persistant infections in immunocompetent hosts. At first glance, they would seem to have very different ways of doing this. Here we will use as a model our current understanding of how the human herpesvirus Epstein-Barr virus establishes and maintains such an infection. We apply information from a wide range of sources including laboratory experimentation, clinical observation, animal models and a new computer simulation. We propose that the detailed mechanisms for establishing infection are dependent on the virus and tissues involved, but the strategy is the same - to persist in a long-lived cell type where the virus is invisible to the immune system and nonpathogenic.

  19. The Protein/Peptide Direct Virus Inactivation During Chromatographic Process: Developing Approaches.

    PubMed

    Volkov, Georgii L; Havryliuk, Sergiy P; Krasnobryzha, Ievgenia M; Havryliuk, Olena S

    2017-01-01

    Virus clearance is required for pharmaceutical preparations derived from animal or human sources such as blood products, vaccines, recombinant proteins produced in mammalian cell lines, etc. High cost and substantial protein losses during virus inactivation are significant problems for protein/peptide manufacturing. The goal of this project was to develop a method to perform virus inactivation in a course of protein chromatographic purification. Another goal was to show that the chromatographic adsorbent can serve as reliable "sieva" for mechanical washing away of infecting viruses. Using chromatographic, photometric, IFA, and RT-PCR approaches, it was discovered that high temperature-depending dynamic capacity of adsorbent allowed to perform a virus inactivation directly in a chromatographic column by solvent/detergent treatment. The peptide/protein biological activity was completely preserved. Using this new approach enveloped and nonenveloped viruses were effectively removed protein preparation. In addition, it was shown that RT-PCR method demonstrates more precise and reproducible results and robust properties for assessment of virus reduction than virus titer followed by infectivity studies. Presented method allowed to obtain the factor of virus concentration decrease (FVD) values that were higher than those provided by known technologies and was sufficient for a full inactivation of viruses. The method is recommended to use in pharmaceutical industry.

  20. Phylogeny of the Genus Flavivirus

    PubMed Central

    Kuno, Goro; Chang, Gwong-Jen J.; Tsuchiya, K. Richard; Karabatsos, Nick; Cropp, C. Bruce

    1998-01-01

    We undertook a comprehensive phylogenetic study to establish the genetic relationship among the viruses of the genus Flavivirus and to compare the classification based on molecular phylogeny with the existing serologic method. By using a combination of quantitative definitions (bootstrap support level and the pairwise nucleotide sequence identity), the viruses could be classified into clusters, clades, and species. Our phylogenetic study revealed for the first time that from the putative ancestor two branches, non-vector and vector-borne virus clusters, evolved and from the latter cluster emerged tick-borne and mosquito-borne virus clusters. Provided that the theory of arthropod association being an acquired trait was correct, pairwise nucleotide sequence identity among these three clusters provided supporting data for a possibility that the non-vector cluster evolved first, followed by the separation of tick-borne and mosquito-borne virus clusters in that order. Clades established in our study correlated significantly with existing antigenic complexes. We also resolved many of the past taxonomic problems by establishing phylogenetic relationships of the antigenically unclassified viruses with the well-established viruses and by identifying synonymous viruses. PMID:9420202

  1. Phylogeny of the genus Flavivirus.

    PubMed

    Kuno, G; Chang, G J; Tsuchiya, K R; Karabatsos, N; Cropp, C B

    1998-01-01

    We undertook a comprehensive phylogenetic study to establish the genetic relationship among the viruses of the genus Flavivirus and to compare the classification based on molecular phylogeny with the existing serologic method. By using a combination of quantitative definitions (bootstrap support level and the pairwise nucleotide sequence identity), the viruses could be classified into clusters, clades, and species. Our phylogenetic study revealed for the first time that from the putative ancestor two branches, non-vector and vector-borne virus clusters, evolved and from the latter cluster emerged tick-borne and mosquito-borne virus clusters. Provided that the theory of arthropod association being an acquired trait was correct, pairwise nucleotide sequence identity among these three clusters provided supporting data for a possibility that the non-vector cluster evolved first, followed by the separation of tick-borne and mosquito-borne virus clusters in that order. Clades established in our study correlated significantly with existing antigenic complexes. We also resolved many of the past taxonomic problems by establishing phylogenetic relationships of the antigenically unclassified viruses with the well-established viruses and by identifying synonymous viruses.

  2. The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.

    ERIC Educational Resources Information Center

    Stewart, Michael

    2000-01-01

    In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help…

  3. Space lab system analysis: Advanced Solid Rocket Motor (ASRM) communications networks analysis

    NASA Technical Reports Server (NTRS)

    Ingels, Frank M.; Moorhead, Robert J., II; Moorhead, Jane N.; Shearin, C. Mark; Thompson, Dale R.

    1990-01-01

    A synopsis of research on computer viruses and computer security is presented. A review of seven technical meetings attended is compiled. A technical discussion on the communication plans for the ASRM facility is presented, with a brief tutorial on the potential local area network media and protocols.

  4. The Hidden Costs of Wireless Computer Labs

    ERIC Educational Resources Information Center

    Daly, Una

    2005-01-01

    Various elementary schools and middle schools across the U.S. have purchased one or more mobile laboratories. Although the wireless labs have provided more classroom computing, teachers and technology aides still have mixed views about their cost-benefit ratio. This is because the proliferation of viruses and spyware has dramatically increased…

  5. Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture

    DTIC Science & Technology

    2004-09-01

    protection. Firewalls, Intrusion Detection Systems (IDS’s), Anti-Virus (AV) software , and routers are such tools used. In recent years, computer security...associated with operating systems, application software , and computing hardware. When IDS’s are utilized on a host computer or network, there are two...primary approaches to detecting and / or preventing attacks. Traditional IDS’s, like most AV software , rely on known “signatures” to detect attacks

  6. All-atom molecular dynamics of virus capsids as drug targets

    DOE PAGES

    Perilla, Juan R.; Hadden, Jodi A.; Goh, Boon Chong; ...

    2016-04-29

    Virus capsids are protein shells that package the viral genome. Although their morphology and biological functions can vary markedly, capsids often play critical roles in regulating viral infection pathways. A detailed knowledge of virus capsids, including their dynamic structure, interactions with cellular factors, and the specific roles that they play in the replication cycle, is imperative for the development of antiviral therapeutics. The following Perspective introduces an emerging area of computational biology that focuses on the dynamics of virus capsids and capsid–protein assemblies, with particular emphasis on the effects of small-molecule drug binding on capsid structure, stability, and allosteric pathways.more » When performed at chemical detail, molecular dynamics simulations can reveal subtle changes in virus capsids induced by drug molecules a fraction of their size. Finally, the current challenges of performing all-atom capsid–drug simulations are discussed, along with an outlook on the applicability of virus capsid simulations to reveal novel drug targets.« less

  7. All-atom molecular dynamics of virus capsids as drug targets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perilla, Juan R.; Hadden, Jodi A.; Goh, Boon Chong

    Virus capsids are protein shells that package the viral genome. Although their morphology and biological functions can vary markedly, capsids often play critical roles in regulating viral infection pathways. A detailed knowledge of virus capsids, including their dynamic structure, interactions with cellular factors, and the specific roles that they play in the replication cycle, is imperative for the development of antiviral therapeutics. The following Perspective introduces an emerging area of computational biology that focuses on the dynamics of virus capsids and capsid–protein assemblies, with particular emphasis on the effects of small-molecule drug binding on capsid structure, stability, and allosteric pathways.more » When performed at chemical detail, molecular dynamics simulations can reveal subtle changes in virus capsids induced by drug molecules a fraction of their size. Finally, the current challenges of performing all-atom capsid–drug simulations are discussed, along with an outlook on the applicability of virus capsid simulations to reveal novel drug targets.« less

  8. Virus Particle Detection by Convolutional Neural Network in Transmission Electron Microscopy Images.

    PubMed

    Ito, Eisuke; Sato, Takaaki; Sano, Daisuke; Utagawa, Etsuko; Kato, Tsuyoshi

    2018-06-01

    A new computational method for the detection of virus particles in transmission electron microscopy (TEM) images is presented. Our approach is to use a convolutional neural network that transforms a TEM image to a probabilistic map that indicates where virus particles exist in the image. Our proposed approach automatically and simultaneously learns both discriminative features and classifier for virus particle detection by machine learning, in contrast to existing methods that are based on handcrafted features that yield many false positives and require several postprocessing steps. The detection performance of the proposed method was assessed against a dataset of TEM images containing feline calicivirus particles and compared with several existing detection methods, and the state-of-the-art performance of the developed method for detecting virus was demonstrated. Since our method is based on supervised learning that requires both the input images and their corresponding annotations, it is basically used for detection of already-known viruses. However, the method is highly flexible, and the convolutional networks can adapt themselves to any virus particles by learning automatically from an annotated dataset.

  9. Mathematical Model of Cytomegalovirus (CMV) Disease

    NASA Astrophysics Data System (ADS)

    Sriningsih, R.; Subhan, M.; Nasution, M. L.

    2018-04-01

    The article formed the mathematical model of cytomegalovirus (CMV) disease. Cytomegalovirus (CMV) is a type of herpes virus. This virus is actually not dangerous, but if the body's immune weakens the virus can cause serious problems for health and even can cause death. This virus is also susceptible to infect pregnant women. In addition, the baby may also be infected through the placenta. If this is experienced early in pregnancy, it will increase the risk of miscarriage. If the baby is born, it can cause disability in the baby. The model is formed by determining its variables and parameters based on assumptions. The goal is to analyze the dynamics of cytomegalovirus (CMV) disease spread.

  10. Progress and Problems in Understanding and Managing Primary Epstein-Barr Virus Infections

    PubMed Central

    Odumade, Oludare A.; Hogquist, Kristin A.; Balfour, Henry H.

    2011-01-01

    Summary: Epstein-Barr virus (EBV) is a gammaherpesvirus that infects a large fraction of the human population. Primary infection is often asymptomatic but results in lifelong infection, which is kept in check by the host immune system. In some cases, primary infection can result in infectious mononucleosis. Furthermore, when host-virus balance is not achieved, the virus can drive potentially lethal lymphoproliferation and lymphomagenesis. In this review, we describe the biology of EBV and the host immune response. We review the diagnosis of EBV infection and discuss the characteristics and pathogenesis of infectious mononucleosis. These topics are approached in the context of developing therapeutic and preventative strategies. PMID:21233512

  11. Natural history of chronic hepatitis B virus infection.

    PubMed

    Busch, Katrin; Thimme, Robert

    2015-02-01

    Hepatitis B virus infection represents a major global health problem. Currently, there are more than 240 million chronically infected people worldwide. The development of chronic hepatitis B virus-mediated liver disease may lead to liver fibrosis, cirrhosis and eventually hepatocellular carcinoma. Recently, the discovery of the viral entry receptor sodium taurocholate cotransporting polypeptide has facilitated new approaches for a better understanding of viral physiopathology. Hopefully, these novel insights may give rise to the development of more effective antiviral therapy concepts during the next years. In this review, we will discuss the natural history of hepatitis B virus infection including the viral biology, the clinical course of infection and the role of the immune response.

  12. Zika Virus

    MedlinePlus

    ... Operations Administrative Services Office of Biodefense Research & Surety Communications Government Relations Cyber Infrastructure Computational Biology Equal Employment Opportunity Ethics Global Research Office of Mission Integration and Financial ...

  13. Structure-based energetics of protein interfaces guide Foot-and-Mouth Disease virus vaccine design

    PubMed Central

    Scott, Katherine; Burman, Alison; Loureiro, Silvia; Ren, Jingshan; Porta, Claudine; Ginn, Helen M.; Jackson, Terry; Perez-Martin, Eva; Siebert, C. Alistair; Paul, Guntram; Huiskonen, Juha T.; Jones, Ian M.; Esnouf, Robert M.; Fry, Elizabeth E.; Maree, Francois F.; Charleston, Bryan; Stuart, David I.

    2018-01-01

    Summary Virus capsids are primed for disassembly yet capsid integrity is key to generating a protective immune response. Here we devise a computational method to assess relative stability of protein-protein interfaces and use it to design improved candidate vaccines for two of the least stable, but globally important, serotypes of Foot-and-Mouth Disease virus (FMDV), O and SAT2. FMDV capsids comprise identical pentameric protein subunits held together by tenuous non-covalent interactions, and are often unstable. Chemically inactivated or recombinant empty capsids, which could form the basis of future vaccines, are even less stable than live virus. We use a novel restrained molecular dynamics strategy, to rank mutations predicted to strengthen the pentamer interfaces to produce stabilized capsids. Structural analyses and stability assays confirmed the predictions, and vaccinated animals generated improved neutralising antibody responses to stabilised particles over parental viruses and wild-type capsids. PMID:26389739

  14. Optimizing Restriction Site Placement for Synthetic Genomes

    NASA Astrophysics Data System (ADS)

    Montes, Pablo; Memelli, Heraldo; Ward, Charles; Kim, Joondong; Mitchell, Joseph S. B.; Skiena, Steven

    Restriction enzymes are the workhorses of molecular biology. We introduce a new problem that arises in the course of our project to design virus variants to serve as potential vaccines: we wish to modify virus-length genomes to introduce large numbers of unique restriction enzyme recognition sites while preserving wild-type function by substitution of synonymous codons. We show that the resulting problem is NP-Complete, give an exponential-time algorithm, and propose effective heuristics, which we show give excellent results for five sample viral genomes. Our resulting modified genomes have several times more unique restriction sites and reduce the maximum gap between adjacent sites by three to nine-fold.

  15. Amoeba-inspired nanoarchitectonic computing: solving intractable computational problems using nanoscale photoexcitation transfer dynamics.

    PubMed

    Aono, Masashi; Naruse, Makoto; Kim, Song-Ju; Wakabayashi, Masamitsu; Hori, Hirokazu; Ohtsu, Motoichi; Hara, Masahiko

    2013-06-18

    Biologically inspired computing devices and architectures are expected to overcome the limitations of conventional technologies in terms of solving computationally demanding problems, adapting to complex environments, reducing energy consumption, and so on. We previously demonstrated that a primitive single-celled amoeba (a plasmodial slime mold), which exhibits complex spatiotemporal oscillatory dynamics and sophisticated computing capabilities, can be used to search for a solution to a very hard combinatorial optimization problem. We successfully extracted the essential spatiotemporal dynamics by which the amoeba solves the problem. This amoeba-inspired computing paradigm can be implemented by various physical systems that exhibit suitable spatiotemporal dynamics resembling the amoeba's problem-solving process. In this Article, we demonstrate that photoexcitation transfer phenomena in certain quantum nanostructures mediated by optical near-field interactions generate the amoebalike spatiotemporal dynamics and can be used to solve the satisfiability problem (SAT), which is the problem of judging whether a given logical proposition (a Boolean formula) is self-consistent. SAT is related to diverse application problems in artificial intelligence, information security, and bioinformatics and is a crucially important nondeterministic polynomial time (NP)-complete problem, which is believed to become intractable for conventional digital computers when the problem size increases. We show that our amoeba-inspired computing paradigm dramatically outperforms a conventional stochastic search method. These results indicate the potential for developing highly versatile nanoarchitectonic computers that realize powerful solution searching with low energy consumption.

  16. Non-classical phase diagram for virus bacterial coevolution mediated by clustered regularly interspaced short palindromic repeats.

    PubMed

    Han, Pu; Deem, Michael W

    2017-02-01

    CRISPR is a newly discovered prokaryotic immune system. Bacteria and archaea with this system incorporate genetic material from invading viruses into their genomes, providing protection against future infection by similar viruses. The condition for coexistence of prokaryots and viruses is an interesting problem in evolutionary biology. In this work, we show an intriguing phase diagram of the virus extinction probability, which is more complex than that of the classical predator-prey model. As the CRISPR incorporates genetic material, viruses are under pressure to evolve to escape recognition by CRISPR. When bacteria have a small rate of deleting spacers, a new parameter region in which bacteria and viruses can coexist arises, and it leads to a more complex coexistence patten for bacteria and viruses. For example, when the virus mutation rate is low, the virus extinction probability changes non-montonically with the bacterial exposure rate. The virus and bacteria coevolution not only alters the virus extinction probability, but also changes the bacterial population structure. Additionally, we show that recombination is a successful strategy for viruses to escape from CRISPR recognition when viruses have multiple proto-spacers, providing support for a recombination-mediated escape mechanism suggested experimentally. Finally, we suggest that the re-entrant phase diagram, in which phages can progress through three phases of extinction and two phases of abundance at low spacer deletion rates as a function of exposure rate to bacteria, is an experimentally testable phenomenon. © 2017 The Author(s).

  17. Cyclosporin A inhibits the propagation of influenza virus by interfering with a late event in the virus life cycle.

    PubMed

    Hamamoto, Itsuki; Harazaki, Kazuhiro; Inase, Naohiko; Takaku, Hiroshi; Tashiro, Masato; Yamamoto, Norio

    2013-01-01

    Influenza is a global public health problem that causes a serious respiratory disease. Influenza virus frequently undergoes amino acid substitutions, which result in the emergence of drug-resistant viruses. To control influenza viruses that are resistant to currently available drugs, it is essential to develop new antiviral drugs with a novel molecular target. Here, we report that cyclosporin A (CsA) inhibits the propagation of influenza virus in A549 cells by interfering with a late event in the virus life cycle. CsA did not affect adsorption, internalization, viral RNA replication, or synthesis of viral proteins in A549 cells, but inhibited the step(s) after viral protein synthesis, such as assembly or budding. In addition, siRNA-mediated knockdown of the expression of the major CsA targets, namely cyclophilin A (CypA), cyclophilin B (CypB), and P-glycoprotein (Pgp), did not inhibit influenza virus propagation. These results suggest that CsA inhibits virus propagation by mechanism(s) independent of the inhibition of the function of CypA, CypB, and Pgp. CsA may target an unknown molecule that works as a positive regulator in the propagation of influenza virus. Our findings would contribute to the development of a novel anti-influenza virus therapy and clarification of the regulatory mechanism of influenza virus multiplication.

  18. Natural reservoirs for homologs of hepatitis C virus

    PubMed Central

    Pfaender, Stephanie; Brown, Richard JP; Pietschmann, Thomas; Steinmann, Eike

    2014-01-01

    Hepatitis C virus is considered a major public health problem, infecting 2%–3% of the human population. Hepatitis C virus infection causes acute and chronic liver disease, including chronic hepatitis, cirrhosis and hepatocellular carcinoma. In fact, hepatitis C virus infection is the most frequent indication for liver transplantation and a vaccine is not available. Hepatitis C virus displays a narrow host species tropism, naturally infecting only humans, although chimpanzees are also susceptible to experimental infection. To date, there is no evidence for an animal reservoir of viruses closely related to hepatitis C virus which may have crossed the species barrier to cause disease in humans and resulted in the current pandemic. In fact, due to this restricted host range, a robust immunocompetent small animal model is still lacking, hampering mechanistic analysis of virus pathogenesis, immune control and prophylactic vaccine development. Recently, several studies discovered new viruses related to hepatitis C virus, belonging to the hepaci- and pegivirus genera, in small wild mammals (rodents and bats) and domesticated animals which live in close contact with humans (dogs and horses). Genetic and biological characterization of these newly discovered hepatitis C virus-like viruses infecting different mammals will contribute to our understanding of the origins of hepatitis C virus in humans and enhance our ability to study pathogenesis and immune responses using tractable animal models. In this review article, we start with an introduction on the genetic diversity of hepatitis C virus and then focus on the newly discovered viruses closely related to hepatitis C virus. Finally, we discuss possible theories about the origin of this important viral human pathogen. PMID:26038514

  19. Cell-free transmission of human adenovirus by passive mass transfer in cell culture simulated in a computer model.

    PubMed

    Yakimovich, Artur; Gumpert, Heidi; Burckhardt, Christoph J; Lütschg, Verena A; Jurgeit, Andreas; Sbalzarini, Ivo F; Greber, Urs F

    2012-09-01

    Viruses spread between cells, tissues, and organisms by cell-free and cell-cell transmissions. Both mechanisms enhance disease development, but it is difficult to distinguish between them. Here, we analyzed the transmission mode of human adenovirus (HAdV) in monolayers of epithelial cells by wet laboratory experimentation and a computer simulation. Using live-cell fluorescence microscopy and replication-competent HAdV2 expressing green fluorescent protein, we found that the spread of infection invariably occurred after cell lysis. It was affected by convection and blocked by neutralizing antibodies but was independent of second-round infections. If cells were overlaid with agarose, convection was blocked and round plaques developed around lytic infected cells. Infected cells that did not lyse did not give rise to plaques, highlighting the importance of cell-free transmission. Key parameters for cell-free virus transmission were the time from infection to lysis, the dose of free viruses determining infection probability, and the diffusion of single HAdV particles in aqueous medium. With these parameters, we developed an in silico model using multiscale hybrid dynamics, cellular automata, and particle strength exchange. This so-called white box model is based on experimentally determined parameters and reproduces viral infection spreading as a function of the local concentration of free viruses. These analyses imply that the extent of lytic infections can be determined by either direct plaque assays or can be predicted by calculations of virus diffusion constants and modeling.

  20. Filovirus RefSeq Entries: Evaluation and Selection of Filovirus Type Variants, Type Sequences, and Names

    PubMed Central

    Kuhn, Jens H.; Andersen, Kristian G.; Bào, Yīmíng; Bavari, Sina; Becker, Stephan; Bennett, Richard S.; Bergman, Nicholas H.; Blinkova, Olga; Bradfute, Steven; Brister, J. Rodney; Bukreyev, Alexander; Chandran, Kartik; Chepurnov, Alexander A.; Davey, Robert A.; Dietzgen, Ralf G.; Doggett, Norman A.; Dolnik, Olga; Dye, John M.; Enterlein, Sven; Fenimore, Paul W.; Formenty, Pierre; Freiberg, Alexander N.; Garry, Robert F.; Garza, Nicole L.; Gire, Stephen K.; Gonzalez, Jean-Paul; Griffiths, Anthony; Happi, Christian T.; Hensley, Lisa E.; Herbert, Andrew S.; Hevey, Michael C.; Hoenen, Thomas; Honko, Anna N.; Ignatyev, Georgy M.; Jahrling, Peter B.; Johnson, Joshua C.; Johnson, Karl M.; Kindrachuk, Jason; Klenk, Hans-Dieter; Kobinger, Gary; Kochel, Tadeusz J.; Lackemeyer, Matthew G.; Lackner, Daniel F.; Leroy, Eric M.; Lever, Mark S.; Mühlberger, Elke; Netesov, Sergey V.; Olinger, Gene G.; Omilabu, Sunday A.; Palacios, Gustavo; Panchal, Rekha G.; Park, Daniel J.; Patterson, Jean L.; Paweska, Janusz T.; Peters, Clarence J.; Pettitt, James; Pitt, Louise; Radoshitzky, Sheli R.; Ryabchikova, Elena I.; Saphire, Erica Ollmann; Sabeti, Pardis C.; Sealfon, Rachel; Shestopalov, Aleksandr M.; Smither, Sophie J.; Sullivan, Nancy J.; Swanepoel, Robert; Takada, Ayato; Towner, Jonathan S.; van der Groen, Guido; Volchkov, Viktor E.; Volchkova, Valentina A.; Wahl-Jensen, Victoria; Warren, Travis K.; Warfield, Kelly L.; Weidmann, Manfred; Nichol, Stuart T.

    2014-01-01

    Sequence determination of complete or coding-complete genomes of viruses is becoming common practice for supporting the work of epidemiologists, ecologists, virologists, and taxonomists. Sequencing duration and costs are rapidly decreasing, sequencing hardware is under modification for use by non-experts, and software is constantly being improved to simplify sequence data management and analysis. Thus, analysis of virus disease outbreaks on the molecular level is now feasible, including characterization of the evolution of individual virus populations in single patients over time. The increasing accumulation of sequencing data creates a management problem for the curators of commonly used sequence databases and an entry retrieval problem for end users. Therefore, utilizing the data to their fullest potential will require setting nomenclature and annotation standards for virus isolates and associated genomic sequences. The National Center for Biotechnology Information’s (NCBI’s) RefSeq is a non-redundant, curated database for reference (or type) nucleotide sequence records that supplies source data to numerous other databases. Building on recently proposed templates for filovirus variant naming [ ()////-], we report consensus decisions from a majority of past and currently active filovirus experts on the eight filovirus type variants and isolates to be represented in RefSeq, their final designations, and their associated sequences. PMID:25256396

  1. Overview of swine influenza virus vaccine research and technology: What's on the horizon and what do we need to move forward?

    USDA-ARS?s Scientific Manuscript database

    Introduction Swine influenza represents a problem for the health of pigs and the economic health of the swine industry due to real and perceived public health risks. This is largely driven by the diversity of influenza A viruses (IAV) in swine herds. Antigenic drift (mutations) and shifts (reassortm...

  2. Construction of recombinant Newcastle disease viruses expessing chicken IFN-gamma: effect of elevated levels of expression on the transcriptional host response, viral replication and pathogenesis

    USDA-ARS?s Scientific Manuscript database

    Newcastle disease (ND) is a severe problem of poultry and other avian species, characterized by high morbidity and mortality. It is caused by virulent strains of Newcastle disease virus (NDV), part of the Mononegavirales class, Paramyxoviride family, Avulavirus genus. Although it is one of the mos...

  3. Multiplex hydrolysis probe real-time PCR for simultaneous detection of hepatitis A virus and hepatitis E virus.

    PubMed

    Qiu, Feng; Cao, Jingyuan; Su, Qiudong; Yi, Yao; Bi, Shengli

    2014-05-30

    Detection of hepatitis viral infections has traditionally relied on the circulating antibody test using the enzyme-linked immunosorbent assay. However, multiplex real-time PCR has been increasingly used for a variety of viral nucleic acid detections and has proven to be superior to traditional methods. Hepatitis A virus (HAV) and hepatitis E virus (HEV) are the major causes of acute hepatitis worldwide; both HAV and HEV infection are a main public health problem. In the present study, a one-step multiplex reverse transcriptase quantitative polymerase chain reaction assay using hydrolysis probes was developed for simultaneously detecting HAV and HEV. This novel detection system proved specific to the target viruses, to be highly sensitive and to be applicable to clinical sera samples, making it useful for rapid, accurate and feasible identification of HAV and HEV.

  4. A Lagrangian particle model to predict the airborne spread of foot-and-mouth disease virus

    NASA Astrophysics Data System (ADS)

    Mayer, D.; Reiczigel, J.; Rubel, F.

    Airborne spread of bioaerosols in the boundary layer over a complex terrain is simulated using a Lagrangian particle model, and applied to modelling the airborne spread of foot-and-mouth disease (FMD) virus. Two case studies are made with study domains located in a hilly region in the northwest of the Styrian capital Graz, the second largest town in Austria. Mountainous terrain as well as inhomogeneous and time varying meteorological conditions prevent from application of so far used Gaussian dispersion models, while the proposed model can handle these realistically. In the model, trajectories of several thousands of particles are computed and the distribution of virus concentration near the ground is calculated. This allows to assess risk of infection areas with respect to animal species of interest, such as cattle, swine or sheep. Meteorological input data like wind field and other variables necessary to compute turbulence were taken from the new pre-operational version of the non-hydrostatic numerical weather prediction model LMK ( Lokal-Modell-Kürzestfrist) running at the German weather service DWD ( Deutscher Wetterdienst). The LMK model provides meteorological parameters with a spatial resolution of about 2.8 km. To account for the spatial resolution of 400 m used by the Lagrangian particle model, the initial wind field is interpolated upon the finer grid by a mass consistent interpolation method. Case studies depict a significant influence of local wind systems on the spread of virus. Higher virus concentrations at the upwind side of the hills and marginal concentrations in the lee are well observable, as well as canalization effects by valleys. The study demonstrates that the Lagrangian particle model is an appropriate tool for risk assessment of airborne spread of virus by taking into account the realistic orographic and meteorological conditions.

  5. A virus spreading model for cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Hou, L.; Yeung, K. H.; Wong, K. Y.

    2012-12-01

    Since cognitive radio (CR) networks could solve the spectrum scarcity problem, they have drawn much research in recent years. Artificial intelligence(AI) is introduced into CRs to learn from and adapt to their environment. Nonetheless, AI brings in a new kind of attacks specific to CR networks. The most powerful one is a self-propagating AI virus. And no spreading properties specific to this virus have been reported in the literature. To fill this research gap, we propose a virus spreading model of an AI virus by considering the characteristics of CR networks and the behavior of CR users. Several important observations are made from the simulation results based on the model. Firstly, the time taken to infect the whole network increases exponentially with the network size. Based on this result, CR network designers could calculate the optimal network size to slow down AI virus propagation rate. Secondly, the anti-virus performance of static networks to an AI virus is better than dynamic networks. Thirdly, if the CR devices with the highest degree are initially infected, the AI virus propagation rate will be increased substantially. Finally, it is also found that in the area with abundant spectrum resource, the AI virus propagation speed increases notably but the variability of the spectrum does not affect the propagation speed much.

  6. Computer use problems and accommodation strategies at work and home for people with systemic sclerosis: a needs assessment.

    PubMed

    Baker, Nancy A; Aufman, Elyse L; Poole, Janet L

    2012-01-01

    We identified the extent of the need for interventions and assistive technology to prevent computer use problems in people with systemic sclerosis (SSc) and the accommodation strategies they use to alleviate such problems. Respondents were recruited through the Scleroderma Foundation. Twenty-seven people with SSc who used a computer and reported difficulty in working completed the Computer Problems Survey. All but 1 of the respondents reported one problem with at least one equipment type. The highest number of respondents reported problems with keyboards (88%) and chairs (85%). More than half reported discomfort in the past month associated with the chair, keyboard, and mouse. Respondents used a variety of accommodation strategies. Many respondents experienced problems and discomfort related to computer use. The characteristic symptoms of SSc may contribute to these problems. Occupational therapy interventions for computer use problems in clients with SSc need to be tested. Copyright © 2012 by the American Occupational Therapy Association, Inc.

  7. Use of a Computer Language in Teaching Dynamic Programming. Final Report.

    ERIC Educational Resources Information Center

    Trimble, C. J.; And Others

    Most optimization problems of any degree of complexity must be solved using a computer. In the teaching of dynamic programing courses, it is often desirable to use a computer in problem solution. The solution process involves conceptual formulation and computational Solution. Generalized computer codes for dynamic programing problem solution…

  8. Spyware

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it…

  9. 76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...

  10. Information Security and Integrity Systems

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  11. Visual problems in young adults due to computer use.

    PubMed

    Moschos, M M; Chatziralli, I P; Siasou, G; Papazisis, L

    2012-04-01

    Computer use can cause visual problems. The purpose of our study was to evaluate visual problems due to computer use in young adults. Participants in our study were 87 adults, 48 male and 39 female, mean aged 31.3 years old (SD 7.6). All the participants completed a questionnaire regarding visual problems detected after computer use. The mean daily use of computers was 3.2 hours (SD 2.7). 65.5 % of the participants complained for dry eye, mainly after more than 2.5 hours of computer use. 32 persons (36.8 %) had a foreign body sensation in their eyes, while 15 participants (17.2 %) complained for blurred vision which caused difficulties in driving, after 3.25 hours of continuous computer use. 10.3 % of the participants sought medical advice for their problem. There was a statistically significant correlation between the frequency of visual problems and the duration of computer use (p = 0.021). 79.3 % of the participants use artificial tears during or after long use of computers, so as not to feel any ocular discomfort. The main symptom after computer use in young adults was dry eye. All visual problems associated with the duration of computer use. Artificial tears play an important role in the treatment of ocular discomfort after computer use. © Georg Thieme Verlag KG Stuttgart · New York.

  12. Influenza Virus Reassortment Is Enhanced by Semi-infectious Particles but Can Be Suppressed by Defective Interfering Particles

    PubMed Central

    Tao, Hui; Steel, John; Lowen, Anice C.

    2015-01-01

    A high particle to infectivity ratio is a feature common to many RNA viruses, with ~90–99% of particles unable to initiate a productive infection under low multiplicity conditions. A recent publication by Brooke et al. revealed that, for influenza A virus (IAV), a proportion of these seemingly non-infectious particles are in fact semi-infectious. Semi-infectious (SI) particles deliver an incomplete set of viral genes to the cell, and therefore cannot support a full cycle of replication unless complemented through co-infection. In addition to SI particles, IAV populations often contain defective-interfering (DI) particles, which actively interfere with production of infectious progeny. With the aim of understanding the significance to viral evolution of these incomplete particles, we tested the hypothesis that SI and DI particles promote diversification through reassortment. Our approach combined computational simulations with experimental determination of infection, co-infection and reassortment levels following co-inoculation of cultured cells with two distinct influenza A/Panama/2007/99 (H3N2)-based viruses. Computational results predicted enhanced reassortment at a given % infection or multiplicity of infection with increasing semi-infectious particle content. Comparison of experimental data to the model indicated that the likelihood that a given segment is missing varies among the segments and that most particles fail to deliver ≥1 segment. To verify the prediction that SI particles augment reassortment, we performed co-infections using viruses exposed to low dose UV. As expected, the introduction of semi-infectious particles with UV-induced lesions enhanced reassortment. In contrast to SI particles, inclusion of DI particles in modeled virus populations could not account for observed reassortment outcomes. DI particles were furthermore found experimentally to suppress detectable reassortment, relative to that seen with standard virus stocks, most likely by interfering with production of infectious progeny from co-infected cells. These data indicate that semi-infectious particles increase the rate of reassortment and may therefore accelerate adaptive evolution of IAV. PMID:26440404

  13. Modelling the human immunodeficiency virus (HIV) epidemic: A review of the substance and role of models in South Africa

    PubMed Central

    2018-01-01

    We review key mathematical models of the South African human immunodeficiency virus (HIV) epidemic from the early 1990s onwards. In our descriptions, we sometimes differentiate between the concepts of a model world and its mathematical or computational implementation. The model world is the conceptual realm in which we explicitly declare the rules – usually some simplification of ‘real world’ processes as we understand them. Computing details of informative scenarios in these model worlds is a task requiring specialist knowledge, but all other aspects of the modelling process, from describing the model world to identifying the scenarios and interpreting model outputs, should be understandable to anyone with an interest in the epidemic. PMID:29568647

  14. Zika virus: a new arboviral public health problem.

    PubMed

    Demir, Tulin; Kilic, Selcuk

    2016-11-01

    Zika virus (ZIKV) is a single-stranded RNA virus in the Flaviviridae family and transmitted to human through infected mosquitos (Aedes aegypti and Aedes albopictus). Virus is closely related with other flaviviruses; dengue virus, yellow fever virus, West Nile virus, and Japanese encephalitis virus phylogenetically. Due to the possible relationship between virus and clinical features including microcephaly, ventricule, and eye deformities, Guillain-Barre syndrome increases the interest on this virus gradually. Along with the vector-borne transmission, exposure via blood transfusion and sexual contact are further concerns. Since December 2015, CDC reported 440.000-1.300.000 possible cases in Brazil and as of 19 January 2016, El Salvador, Venezuela, Colombia, Brazil, Surinam, French Guana, Honduras, Mexico, and Panama are the countries with active epidemic. CDC recommends ZIKV screening for all pregnants including asymptomatic cases those living in the active epidemic areas. Recently, virus is detected in the USA and most European countries including UK, Netherlands, Denmark, Switzerland, and Italy as a travel-associated infection. Owing to the changing world with increased capabilities for transportation globally, this vector-borne infection represents a valuable marker for the ability of spreading of any infection from its original area that it was first seen. In this review, we summarized the up-to-date data and reports in terms of the importance of the ZIKV infection in the public health.

  15. Advances in vaccine research against economically important viral diseases of food animals: Infectious bursal disease virus.

    PubMed

    Jackwood, Daral J

    2017-07-01

    Numerous reviews have been published on infectious bursal disease (IBD) and infectious bursal disease virus (IBDV). Many high quality vaccines are commercially available for the control of IBD that, when used correctly, provide solid protection against infection and disease caused by IBDV. Viruses are not static however; they continue to evolve and vaccines need to keep pace with them. The evolution of IBDV has resulted in very virulent strains and new antigenic types of the virus. This review will discuss some of the limitations associated with existing vaccines, potential solutions to these problems and advances in new vaccines for the control of IBD. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Preventive and Therapeutic Strategies for Bovine Leukemia Virus: Lessons for HTLV

    PubMed Central

    Rodríguez, Sabrina M.; Florins, Arnaud; Gillet, Nicolas; de Brogniez, Alix; Sánchez-Alcaraz, María Teresa; Boxus, Mathieu; Boulanger, Fanny; Gutiérrez, Gerónimo; Trono, Karina; Alvarez, Irene; Vagnoni, Lucas; Willems, Luc

    2011-01-01

    Bovine leukemia virus (BLV) is a retrovirus closely related to the human T-lymphotropic virus type 1 (HTLV-1). BLV is a major animal health problem worldwide causing important economic losses. A series of attempts were developed to reduce prevalence, chiefly by eradication of infected cattle, segregation of BLV-free animals and vaccination. Although having been instrumental in regions such as the EU, these strategies were unsuccessful elsewhere mainly due to economic costs, management restrictions and lack of an efficient vaccine. This review, which summarizes the different attempts previously developed to decrease seroprevalence of BLV, may be informative for management of HTLV-1 infection. We also propose a new approach based on competitive infection with virus deletants aiming at reducing proviral loads. PMID:21994777

  17. Pathogens as Predictors of Honey Bee Colony Strength in England and Wales.

    PubMed

    Budge, Giles E; Pietravalle, Stéphane; Brown, Mike; Laurenson, Lynn; Jones, Ben; Tomkies, Victoria; Delaplane, Keith S

    2015-01-01

    Inspectors with the UK National Bee Unit were asked for 2007-2008 to target problem apiaries in England and Wales for pathogen screening and colony strength measures. Healthy colonies were included in the sampling to provide a continuum of health conditions. A total of 406 adult bee samples was screened and yielded 7 viral, 1 bacterial, and 2 microsporidial pathogens and 1 ectoparasite (Acarapis woodi). In addition, 108 samples of brood were screened and yielded 4 honey bee viruses. Virus prevalence varied from common (deformed wing virus, black queen cell virus) to complete absence (Israeli acute paralysis virus). When colonies were forced into one of two classes, strong or weak, the weak colonies contained more pathogens in adult bees. Among observed pathogens, only deformed wing virus was able to predict colony strength. The effect was negative such that colonies testing positive for deformed wing virus were likely to have fewer combs of bees or brood. This study constitutes the first record for Nosema ceranae in Great Britain. These results contribute to the growing body of evidence linking pathogens to poor honey bee health.

  18. A strategy for reducing turnaround time in design optimization using a distributed computer system

    NASA Technical Reports Server (NTRS)

    Young, Katherine C.; Padula, Sharon L.; Rogers, James L.

    1988-01-01

    There is a need to explore methods for reducing lengthly computer turnaround or clock time associated with engineering design problems. Different strategies can be employed to reduce this turnaround time. One strategy is to run validated analysis software on a network of existing smaller computers so that portions of the computation can be done in parallel. This paper focuses on the implementation of this method using two types of problems. The first type is a traditional structural design optimization problem, which is characterized by a simple data flow and a complicated analysis. The second type of problem uses an existing computer program designed to study multilevel optimization techniques. This problem is characterized by complicated data flow and a simple analysis. The paper shows that distributed computing can be a viable means for reducing computational turnaround time for engineering design problems that lend themselves to decomposition. Parallel computing can be accomplished with a minimal cost in terms of hardware and software.

  19. Development of hepatitis C virus genotype 3a cell culture system.

    PubMed

    Kim, Sulyi; Date, Tomoko; Yokokawa, Hiroshi; Kono, Tamaki; Aizaki, Hideki; Maurel, Patrick; Gondeau, Claire; Wakita, Takaji

    2014-12-01

    Hepatitis C virus (HCV) genotype 3a infection poses a serious health problem worldwide. A significant association has been reported between HCV genotype 3a infections and hepatic steatosis. Nevertheless, virological characterization of genotype 3a HCV is delayed due to the lack of appropriate virus cell culture systems. In the present study, we established the first infectious genotype 3a HCV system by introducing adaptive mutations into the S310 strain. HCV core proteins had different locations in JFH-1 and S310 virus-infected cells. Furthermore, the lipid content in S310 virus-infected cells was higher than Huh7.5.1 cells and JFH-1 virus-infected cells as determined by the lipid droplet staining area. This genotype 3a infectious cell culture system may be a useful experimental model for studying genotype 3a viral life cycles, molecular mechanisms of pathogenesis, and genotype 3a-specific antiviral drug development. © 2014 by the American Association for the Study of Liver Diseases.

  20. Characterization of tick-borne encephalitis virus from Latvia.

    PubMed

    Mavtchoutko, V; Vene, S; Haglund, M; Forsgren, M; Duks, A; Kalnina, V; Hörling, J; Lundkvist, A

    2000-02-01

    Viruses of the tick-borne encephalitis (TBE) antigenic complex, within the family Flaviviridae, cause a variety of diseases including uncomplicated febrile illness, encephalitis, meningo-encephalitis, hemorrhagic fever and chronic disease in humans, domesticated animals or wildlife species. TBE is a serious problem in Latvia with up to a 1,000 patients confirmed serologically annually 1994-1995. No previous data had been reported on the causative agent of TBE in Latvia. In the present study, a virus was isolated from serum of a patient with clinical symptoms of an acute TBE infection. Nucleotide sequence information obtained by direct reverse transcription-polymerase chain reaction (RT-PCR) and the serological characteristics of the isolated virus strain, designated TBE-Latvia-1-96, indicated a closer relationship to the Vasilchenko strain, isolated in Novosibirsk (Siberia, Russia), as compared to the western European or far eastern subtypes of TBE viruses. In a mouse neurovirulence assay, a significant difference in survival rates (days) was shown between Latvia-1-96 and the western European TBE virus subtype. Copyright 2000 Wiley-Liss, Inc.

  1. [Hepatitis A virus infection in Amerindian area in the east Brazilian Amazon].

    PubMed

    Nunes, Heloisa Marceliano; Soares, Manoel do Carmo Pereira; Silva, Helena Maria Ribeiro

    2004-01-01

    The hepatitis A virus infection represents an important problem of public health all over the world, being related to the socioeconomic and hygienic conditions of the population. In Brazilian Amazon, seroepidemiological studies in amerindians populations have been demonstrating high endemicity related to the infection. With the objective of evaluate the prevalence of the hepatitis virus A infection in xicrin village, in the municipality district of Altamira-Pará-Brazil, whose investigation was unchained by indigenous child's obit, that clinical developed in nine days with a picture icterus-hemorrhagic, without confirmation by serologic exams, 352 samples of blood were analyzed by serologic tests of the markers of the hepatitis A, B, C and D virus, for immunoenzymatic technic, that indicated a prevalence of 98% of antibodies against the hepatitis A virus, which 30.5% with recent infection, characterizing in laboratorial basis, the outbreak of infection for the virus of the hepatitis A and raising the possibility to be associated with the obit happened in the village.

  2. Zika virus: Epidemiological study and its association with public health risk.

    PubMed

    Noor, Rashed; Ahmed, Tasnia

    2018-04-26

    Propagation of Zika virus has become an alarming global public health issue. The infection is spreading rapidly to different countries by several methods, especially by the transmission through traveling. Bangladesh is also at a risk to be affected with such newly viral infections. Though the virus initially appears to cause mild problems, the long term effects are more devastating to the next generation as seen in case of the delivery of the microcephalic babies. Current review discussed the epidemiologic era of the virus; i.e., the administration of Zika virus in the non-human mammals and finally to the human host across the world. Typical sign-symptoms which can often be considered as dengue or chikungunya for their similarities have been stated. The diagnosis of Zika virus, the protective measures taken by mass people as well as the actions that should be endorsed to prevent acquisition of the infection from travelers are discussed. Copyright © 2018. Published by Elsevier Ltd.

  3. Integrating Computers into the Problem-Solving Process.

    ERIC Educational Resources Information Center

    Lowther, Deborah L.; Morrison, Gary R.

    2003-01-01

    Asserts that within the context of problem-based learning environments, professors can encourage students to use computers as problem-solving tools. The ten-step Integrating Technology for InQuiry (NteQ) model guides professors through the process of integrating computers into problem-based learning activities. (SWM)

  4. Antibodies induced by the HA2 glycopolypeptide of influenza virus haemagglutinin improve recovery from influenza A virus infection.

    PubMed

    Gocník, M; Fislová, T; Mucha, V; Sládková, T; Russ, G; Kostolansky, F; Varecková, E

    2008-04-01

    The haemagglutinin (HA) of influenza A virus consists of two glycopolypeptides designated HA1 and HA2. Antibodies recognizing HA1 inhibit virus haemagglutination, neutralize virus infectivity and provide good protection against infection, but do not cross-react with the HA of other subtypes. Little is known regarding the biological activities of antibodies against HA2. To study the role of antibodies directed against HA2 during influenza virus infection, two vaccinia virus recombinants (rVVs) were used expressing chimeric molecules of HA, in which HA1 and HA2 were derived from different HA subtypes. The KG-11 recombinant expressed HA1 from A/PR/8/34 (H1N1) virus and HA2 from A/NT/60 (H3N2) virus, whilst KG-12 recombinant expressed HA1 from A/NT/60 virus and HA2 from A/PR/8/34 virus. Immunization of BALB/c mice with rVV expressing HA2 of the HA subtype homologous to the challenge virus [A/PR/8/34 (H1N1) or A/Mississippi/1/85 (H3N2)] did not prevent virus infection, but nevertheless resulted in an increase in mice survival and faster elimination of virus from the lungs. Passive immunization with antibodies purified from mice immunized with rVVs confirmed that antibodies against HA2 were responsible for the described effect on virus infection. Based on the facts that HA2 is a rather conserved part of the HA and that antibodies against HA2, as shown here, may moderate virus infection, future vaccine design should deal with the problem of how to increase the HA2 antibody response.

  5. Ocular Manifestations of Ebola Virus Disease: An Ophthalmologist's Guide to Prevent Infection and Panic

    PubMed Central

    Vingolo, Enzo Maria; Messano, Giuseppe Alessio; Fragiotta, Serena; Petti, Stefano

    2015-01-01

    Ebola virus disease (EVD—formerly known as Ebola hemorrhagic fever) is a severe hemorrhagic fever caused by lipid-enveloped, nonsegmented, negative-stranded RNA viruses belonging to the genus Ebolavirus. Case fatality rates may reach up to 76% of infected individuals, making this infection a deadly health problem in the sub-Saharan population. At the moment, there are still no indications on ophthalmological clinical signs and security suggestions for healthcare professionals (doctors and nurses or cooperative persons). This paper provides a short but complete guide to reduce infection risks. PMID:26557674

  6. Proceedings of the 1993 Particle Accelerator Conference Held in Washington, DC on May 17-20, 1993. Volume 2

    DTIC Science & Technology

    1993-05-20

    up/cool-down cycles have been made. A cool-down procedure which avoids the "Q- virus " problem has been identified. I. INTRODUCTION The first Cornell B...at Cornell the cavity attempt to identify our susceptibility to the "Q- virus ". All was rinsed with methanol sprayed at -40 psi, dried in a class tests...34Q- virus " (see [4] for the most recent summary of outbreaks and causes). The indication that Figure 3. Qo vs Eacc for the cavity test after etching. RF

  7. Surfactant-modified zeolite can protect drinking water wells from viruses and bacteria

    NASA Astrophysics Data System (ADS)

    Schulze-Makuch, Dirk; Pillai, Suresh D.; Guan, Huade; Bowman, Robert; Couroux, Emile; Hielscher, Frank; Totten, James; Espinosa, Isabell Y.; Kretzschmar, Thomas

    Septic tanks, sewage effluents, and landfills can release microbial pathogens into groundwater. This problem is amplified in the so-called colonias along the U.S.-Mexico border and other low-income areas around the world that have no public sewage systems. The result is often outbreaks of groundwater-associated disease for which enteric viruses and bacteria, spread via a fecal-oral route, are responsible. However, due to difficulties and limitations in detection and surveillance of disease outbreaks, the causative agents for more than 50% of the outbreaks are unknown, though the clinical features suggest a viral etiology for most of those cases [U.S. Centers for Disease Control and Prevention, 1993]. Enteric pathogens such as E coli 0157:H7, Campylobacter, Enteroviruses, Hepatitis A virus, and caliciviruses have been responsible for groundwater-related microbial infections in humans. Inexpensive solutions to this problem are urgently needed. The recent threat of bio-terrorism and concerns about the safety of drinking water supplies further add to that urgency.

  8. A Cognitive Model for Problem Solving in Computer Science

    ERIC Educational Resources Information Center

    Parham, Jennifer R.

    2009-01-01

    According to industry representatives, computer science education needs to emphasize the processes involved in solving computing problems rather than their solutions. Most of the current assessment tools used by universities and computer science departments analyze student answers to problems rather than investigating the processes involved in…

  9. Application of evolutionary computation in ECAD problems

    NASA Astrophysics Data System (ADS)

    Lee, Dae-Hyun; Hwang, Seung H.

    1998-10-01

    Design of modern electronic system is a complicated task which demands the use of computer- aided design (CAD) tools. Since a lot of problems in ECAD are combinatorial optimization problems, evolutionary computations such as genetic algorithms and evolutionary programming have been widely employed to solve those problems. We have applied evolutionary computation techniques to solve ECAD problems such as technology mapping, microcode-bit optimization, data path ordering and peak power estimation, where their benefits are well observed. This paper presents experiences and discusses issues in those applications.

  10. Artificial-life researchers try to create social reality.

    PubMed

    Flam, F

    1994-08-12

    Some scientists, among them cosmologist Stephen Hawking, argue that computer viruses are alive. A better case might be made for many of the self-replicating silicon-based creatures featured at the fourth Conference on Artificial Life, held on 5 to 8 July in Boston. Researchers from computer science, biology, and other disciplines presented computer programs that, among other things, evolved cooperative strategies in a selfish world and recreated themselves in ever more complex forms.

  11. Multiplex Hydrolysis Probe Real-Time PCR for Simultaneous Detection of Hepatitis A Virus and Hepatitis E Virus

    PubMed Central

    Qiu, Feng; Cao, Jingyuan; Su, Qiudong; Yi, Yao; Bi, Shengli

    2014-01-01

    Detection of hepatitis viral infections has traditionally relied on the circulating antibody test using the enzyme-linked immunosorbent assay. However, multiplex real-time PCR has been increasingly used for a variety of viral nucleic acid detections and has proven to be superior to traditional methods. Hepatitis A virus (HAV) and hepatitis E virus (HEV) are the major causes of acute hepatitis worldwide; both HAV and HEV infection are a main public health problem. In the present study, a one-step multiplex reverse transcriptase quantitative polymerase chain reaction assay using hydrolysis probes was developed for simultaneously detecting HAV and HEV. This novel detection system proved specific to the target viruses, to be highly sensitive and to be applicable to clinical sera samples, making it useful for rapid, accurate and feasible identification of HAV and HEV. PMID:24886818

  12. Badnaviruses: The Current Global Scenario

    PubMed Central

    Bhat, Alangar Ishwara; Hohn, Thomas; Selvarajan, Ramasamy

    2016-01-01

    Badnaviruses (Family: Caulimoviridae; Genus: Badnavirus) are non-enveloped bacilliform DNA viruses with a monopartite genome containing about 7.2 to 9.2 kb of dsDNA with three to seven open reading frames. They are transmitted by mealybugs and a few species by aphids in a semi-persistent manner. They are one of the most important plant virus groups and have emerged as serious pathogens affecting the cultivation of several horticultural crops in the tropics, especially banana, black pepper, cocoa, citrus, sugarcane, taro, and yam. Some badnaviruses are also known as endogenous viruses integrated into their host genomes and a few such endogenous viruses can be awakened, e.g., through abiotic stress, giving rise to infective episomal forms. The presence of endogenous badnaviruses poses a new challenge for the fool-proof diagnosis, taxonomy, and management of the diseases. The present review aims to highlight emerging disease problems, virus characteristics, transmission, and diagnosis of badnaviruses. PMID:27338451

  13. Modeling virus capsids and their protein binding -- the search for weak regions within the HIV capsid

    NASA Astrophysics Data System (ADS)

    Sankey, Otto; Benson, Daryn

    2010-10-01

    Viruses remain a threat to the health of humans worldwide with 33 million infected with AIDS. Viruses are ubiquitous infecting animals, plants, and bacteria. Each virus infects in its own unique manner making the problem seem intractable. However, some general physical steps apply to many viruses and the application of basic physical modeling can potentially have great impact. The aim of this theoretical study is to investigate the stability of the HIV viral capsid (protein shell). The structural shell can be compromised by physical probes such as pulsed laser light. But what are the weakest regions of the capsid so that we can begin to understand vulnerabilities of these deadly materials? The atomic structure of HIV capsids is not precisely known and we begin by describing our work to model the capsid structure. Next we describe a course grained model to investigate protein interactions within the capsid.

  14. Badnaviruses: The Current Global Scenario.

    PubMed

    Bhat, Alangar Ishwara; Hohn, Thomas; Selvarajan, Ramasamy

    2016-06-22

    Badnaviruses (Family: Caulimoviridae; Genus: Badnavirus) are non-enveloped bacilliform DNA viruses with a monopartite genome containing about 7.2 to 9.2 kb of dsDNA with three to seven open reading frames. They are transmitted by mealybugs and a few species by aphids in a semi-persistent manner. They are one of the most important plant virus groups and have emerged as serious pathogens affecting the cultivation of several horticultural crops in the tropics, especially banana, black pepper, cocoa, citrus, sugarcane, taro, and yam. Some badnaviruses are also known as endogenous viruses integrated into their host genomes and a few such endogenous viruses can be awakened, e.g., through abiotic stress, giving rise to infective episomal forms. The presence of endogenous badnaviruses poses a new challenge for the fool-proof diagnosis, taxonomy, and management of the diseases. The present review aims to highlight emerging disease problems, virus characteristics, transmission, and diagnosis of badnaviruses.

  15. West Nile Virus Encephalitis 16 Years Later.

    PubMed

    Kleinschmidt-DeMasters, Bette K; Beckham, J David

    2015-09-01

    Arboviruses (Arthropod-borne viruses) include several families of viruses (Flaviviridae, Togaviradae, Bunyaviradae, Reoviradae) that are spread by arthropod vectors, most commonly mosquitoes, ticks and sandflies. The RNA genome allows these viruses to rapidly adapt to ever-changing host and environmental conditions. Thus, these virus families are largely responsible for the recent expansion in geographic range of emerging viruses including West Nile virus (WNV), dengue virus and Chikungunya virus. This review will focus on WNV, especially as it has progressively spread westward in North America since its introduction in New York in 1999. By 2003, WNV infections in humans had reached almost all lower 48 contiguous United States (US) and since that time, fluctuations in outbreaks have occurred. Cases decreased between 2008 and 2011, followed by a dramatic flair in 2012, with the epicenter in the Dallas-Fort Worth region of Texas. The 2012 outbreak was associated with an increase in reported neuroinvasive cases. Neuroinvasive disease continues to be a problem particularly in the elderly and immunocompromised populations, although WNV infections also represented the second most frequent cause of pediatric encephalitis in these same years. Neuropathological features in cases from the 2012 epidemic highlight the extent of viral damage that can occur in the CNS. © 2015 International Society of Neuropathology.

  16. Teaching Reductive Thinking

    ERIC Educational Resources Information Center

    Armoni, Michal; Gal-Ezer, Judith

    2005-01-01

    When dealing with a complex problem, solving it by reduction to simpler problems, or problems for which the solution is already known, is a common method in mathematics and other scientific disciplines, as in computer science and, specifically, in the field of computability. However, when teaching computational models (as part of computability)…

  17. PREDAC-H3: a user-friendly platform for antigenic surveillance of human influenza a(H3N2) virus based on hemagglutinin sequences.

    PubMed

    Peng, Yousong; Yang, Lei; Li, Honglei; Zou, Yuanqiang; Deng, Lizong; Wu, Aiping; Du, Xiangjun; Wang, Dayan; Shu, Yuelong; Jiang, Taijiao

    2016-08-15

    Timely surveillance of the antigenic dynamics of the influenza virus is critical for accurate selection of vaccine strains, which is important for effective prevention of viral spread and infection. Here, we provide a computational platform, called PREDAC-H3, for antigenic surveillance of human influenza A(H3N2) virus based on the sequence of surface protein hemagglutinin (HA). PREDAC-H3 not only determines the antigenic variants and antigenic cluster (grouped for similar antigenicity) to which the virus belongs, based on HA sequences, but also allows visualization of the spatial distribution and temporal dynamics of antigenic clusters of viruses isolated from around the world, thus assisting in antigenic surveillance of human influenza A(H3N2) virus. It is publicly available from: http://biocloud.hnu.edu.cn/influ411/html/index.php : yshu@cnic.org.cn or taijiao@moon.ibp.ac.cn. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  18. Antiviral agents: structural basis of action and rational design.

    PubMed

    Menéndez-Arias, Luis; Gago, Federico

    2013-01-01

    During the last 30 years, significant progress has been made in the development of novel antiviral drugs, mainly crystallizing in the establishment of potent antiretroviral therapies and the approval of drugs inhibiting hepatitis C virus replication. Although major targets of antiviral intervention involve intracellular processes required for the synthesis of viral proteins and nucleic acids, a number of inhibitors blocking virus assembly, budding, maturation, entry or uncoating act on virions or viral capsids. In this review, we focus on the drug discovery process while presenting the currently used methodologies to identify novel antiviral drugs by using a computer-based approach. We provide examples illustrating structure-based antiviral drug development, specifically neuraminidase inhibitors against influenza virus (e.g. oseltamivir and zanamivir) and human immunodeficiency virus type 1 protease inhibitors (i.e. the development of darunavir from early peptidomimetic compounds such as saquinavir). A number of drugs in preclinical development acting against picornaviruses, hepatitis B virus and human immunodeficiency virus and their mechanism of action are presented to show how viral capsids can be exploited as targets of antiviral therapy.

  19. The impact of neighboring infection on the computer virus spread in packets on scale-free networks

    NASA Astrophysics Data System (ADS)

    Lazfi, S.; Lamzabi, S.; Rachadi, A.; Ez-Zahraouy, H.

    2017-12-01

    In this paper, we introduce the effect of neighbors on the infection of packets by computer virus in the SI and SIR models using the minimal traffic routing protocol. We have applied this model to the Barabasi-Albert network to determine how intrasite and extrasite infection rates affect virus propagation through the traffic flow of information packets in both the free-flow and the congested phases. The numerical results show that when we change the intrasite infection rate λ1 while keeping constant the extrasite infection rate λ2, we get normal behavior in the congested phase: in the network, the proportion of infected packets increases to reach a peak and then decreases resulting in a simultaneous increase of the recovered packets. In contrast, when the intrasite infection rate λ1 is kept fixed, an increase of the extrasite infection rate results in two regimes: The first one is characterized by an increase of the proportion of infected packets until reaching some peak value and then decreases smoothly. The second regime is characterized by an increase of infected packets to some stationary value.

  20. The Binding Interface between Human APOBEC3F and HIV-1 Vif Elucidated by Genetic and Computational Approaches.

    PubMed

    Richards, Christopher; Albin, John S; Demir, Özlem; Shaban, Nadine M; Luengas, Elizabeth M; Land, Allison M; Anderson, Brett D; Holten, John R; Anderson, John S; Harki, Daniel A; Amaro, Rommie E; Harris, Reuben S

    2015-12-01

    APOBEC3 family DNA cytosine deaminases provide overlapping defenses against pathogen infections. However, most viruses have elaborate evasion mechanisms such as the HIV-1 Vif protein, which subverts cellular CBF-β and a polyubiquitin ligase complex to neutralize these enzymes. Despite advances in APOBEC3 and Vif biology, a full understanding of this direct host-pathogen conflict has been elusive. We combine virus adaptation and computational studies to interrogate the APOBEC3F-Vif interface and build a robust structural model. A recurring compensatory amino acid substitution from adaptation experiments provided an initial docking constraint, and microsecond molecular dynamic simulations optimized interface contacts. Virus infectivity experiments validated a long-lasting electrostatic interaction between APOBEC3F E289 and HIV-1 Vif R15. Taken together with mutagenesis results, we propose a wobble model to explain how HIV-1 Vif has evolved to bind different APOBEC3 enzymes and, more generally, how pathogens may evolve to escape innate host defenses. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  1. Coinfection of hepatitis E virus and other hepatitis virus in Colombia and its genotypic characterization.

    PubMed

    Peláez, Dioselina; Martínez-Vargas, Daniel; Escalante-Mora, Martha; Palacios-Vivero, Mariel; Contreras-Gómez, Lady

    2015-12-04

    Hepatitis E virus has emerged as a public health problem, particularly in developing countries. The four genotypes identified in mammals include the G3 found in indigenous hepatitis in countries and regions with high porcine population, and the G1, associated with maternal deaths.  To determine coinfection by hepatitis E virus and the circulating genotypes in Colombia in 1,097 samples using serological markers for hepatitis A, B and C.  Serum samples of 1,097 patients from different regions of Colombia stored at the Laboratorio de Virología of the Instituto Nacional de Salud were selected to detect IgG and IgM anti-hepatitis E virus antibodies. The viral genomes of positive samples were amplified by RT-PCR, and the products were sequenced and phylogenetically analyzed by comparing ORF2 sequences deposited in the GenBank.  IgG anti-hepatitis E virus antibodies were found in 278 samples, IgM in 62, and both markers in 64. Hepatitis E virus and hepatitis A virus coinfection determined by IgG anti-hepatitis E virus was 33.6% and 16.1% by IgM; hepatitis E virus and hepatitis B virus coinfection was 23.4% and 8.1%, and hepatitis E virus and hepatitis C virus coinfection was 35.4% and 5.83%, respectively. Among the 52 positive samples by PCR nine were sequenced and grouped within genotype 3A of the American porcine strain.  The highest seropositivity was observed for hepatitis A and E. The incidence of hepatitis E virus coinfection with other hepatotropic viruses indicated that this pathogen is more frequent than expected. The circulation of genotype 3A implies that this disease may occur in outbreaks and as zoonosis in Colombia.

  2. Exact parallel algorithms for some members of the traveling salesman problem family

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pekny, J.F.

    1989-01-01

    The traveling salesman problem and its many generalizations comprise one of the best known combinatorial optimization problem families. Most members of the family are NP-complete problems so that exact algorithms require an unpredictable and sometimes large computational effort. Parallel computers offer hope for providing the power required to meet these demands. A major barrier to applying parallel computers is the lack of parallel algorithms. The contributions presented in this thesis center around new exact parallel algorithms for the asymmetric traveling salesman problem (ATSP), prize collecting traveling salesman problem (PCTSP), and resource constrained traveling salesman problem (RCTSP). The RCTSP is amore » particularly difficult member of the family since finding a feasible solution is an NP-complete problem. An exact sequential algorithm is also presented for the directed hamiltonian cycle problem (DHCP). The DHCP algorithm is superior to current heuristic approaches and represents the first exact method applicable to large graphs. Computational results presented for each of the algorithms demonstrates the effectiveness of combining efficient algorithms with parallel computing methods. Performance statistics are reported for randomly generated ATSPs with 7,500 cities, PCTSPs with 200 cities, RCTSPs with 200 cities, DHCPs with 3,500 vertices, and assignment problems of size 10,000. Sequential results were collected on a Sun 4/260 engineering workstation, while parallel results were collected using a 14 and 100 processor BBN Butterfly Plus computer. The computational results represent the largest instances ever solved to optimality on any type of computer.« less

  3. Transmission of Hepatitis C Virus during Computed Tomography Scanning with Contrast

    PubMed Central

    Rius, Cristina; Caylà, Joan A.

    2008-01-01

    Six cases of acute hepatitis C related to computed tomography scanning with contrast were identified in 3 hospitals. A patient with chronic hepatitis C had been subjected to the same procedure immediately before each patient who developed acute infection. Viral molecular analysis showed identity between isolates from cases with acute and chronic hepatitis C. PMID:18258135

  4. The Weekly Fab Five: Things You Should Do Every Week To Keep Your Computer Running in Tip-Top Shape.

    ERIC Educational Resources Information Center

    Crispen, Patrick

    2001-01-01

    Describes five steps that school librarians should follow every week to keep their computers running at top efficiency. Explains how to update virus definitions; run Windows update; run ScanDisk to repair errors on the hard drive; run a disk defragmenter; and backup all data. (LRW)

  5. Preventing Catastrophes from Data Loss

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2004-01-01

    What's the worst thing that can happen to your computer? Worse than a hard disk crash, virus infection, spam assault, denial-of-service attack, hacker take-over, fire, flood, or other human, mechanical or natural disaster is a faulty backup when you really need it. If the computer blows up, as long as your data is backed up securely, you can…

  6. Parallel computation with molecular-motor-propelled agents in nanofabricated networks.

    PubMed

    Nicolau, Dan V; Lard, Mercy; Korten, Till; van Delft, Falco C M J M; Persson, Malin; Bengtsson, Elina; Månsson, Alf; Diez, Stefan; Linke, Heiner; Nicolau, Dan V

    2016-03-08

    The combinatorial nature of many important mathematical problems, including nondeterministic-polynomial-time (NP)-complete problems, places a severe limitation on the problem size that can be solved with conventional, sequentially operating electronic computers. There have been significant efforts in conceiving parallel-computation approaches in the past, for example: DNA computation, quantum computation, and microfluidics-based computation. However, these approaches have not proven, so far, to be scalable and practical from a fabrication and operational perspective. Here, we report the foundations of an alternative parallel-computation system in which a given combinatorial problem is encoded into a graphical, modular network that is embedded in a nanofabricated planar device. Exploring the network in a parallel fashion using a large number of independent, molecular-motor-propelled agents then solves the mathematical problem. This approach uses orders of magnitude less energy than conventional computers, thus addressing issues related to power consumption and heat dissipation. We provide a proof-of-concept demonstration of such a device by solving, in a parallel fashion, the small instance {2, 5, 9} of the subset sum problem, which is a benchmark NP-complete problem. Finally, we discuss the technical advances necessary to make our system scalable with presently available technology.

  7. Control of virus diseases in soybeans.

    PubMed

    Hill, John H; Whitham, Steven A

    2014-01-01

    Soybean, one of the world's most important sources of animal feed and vegetable oil, can be infected by numerous viruses. However, only a small number of the viruses that can potentially infect soybean are considered as major economic problems to soybean production. Therefore, we consider management options available to control diseases caused by eight viruses that cause, or have the potential to cause, significant economic loss to producers. We summarize management tactics in use and suggest direction for the future. Clearly, the most important tactic is disease resistance. Several resistance genes are available for three of the eight viruses discussed. Other options include use of virus-free seed and avoidance of alternative virus hosts when planting. Attempts at arthropod vector control have generally not provided consistent disease management. In the future, disease management will be considerably enhanced by knowledge of the interaction between soybean and viral proteins. Identification of genes required for soybean defense may represent key regulatory hubs that will enhance or broaden the spectrum of basal resistance to viruses. It may be possible to create new recessive or dominant negative alleles of host proteins that do not support viral functions but perform normal cellular function. The future approach to virus control based on gene editing or exploiting allelic diversity points to necessary research into soybean-virus interactions. This will help to generate the knowledge needed for rational design of durable resistance that will maximize global production.

  8. A Signature in HIV-1 Envelope Leader Peptide Associated with Transition from Acute to Chronic Infection Impacts Envelope Processing and Infectivity

    PubMed Central

    Asmal, Mohammed; Hellmann, Ina; Liu, Weimin; Keele, Brandon F.; Perelson, Alan S.; Bhattacharya, Tanmoy; Gnanakaran, S.; Daniels, Marcus; Haynes, Barton F.; Korber, Bette T.; Hahn, Beatrice H.; Shaw, George M.; Letvin, Norman L.

    2011-01-01

    Mucosal transmission of the human immunodeficiency virus (HIV) results in a bottleneck in viral genetic diversity. Gnanakaran and colleagues used a computational strategy to identify signature amino acids at particular positions in Envelope that were associated either with transmitted sequences sampled very early in infection, or sequences sampled during chronic infection. Among the strongest signatures observed was an enrichment for the stable presence of histidine at position 12 at transmission and in early infection, and a recurrent loss of histidine at position 12 in chronic infection. This amino acid lies within the leader peptide of Envelope, a region of the protein that has been shown to influence envelope glycoprotein expression and virion infectivity. We show a strong association between a positively charged amino acid like histidine at position 12 in transmitted/founder viruses with more efficient trafficking of the nascent envelope polypeptide to the endoplasmic reticulum and higher steady-state glycoprotein expression compared to viruses that have a non-basic position 12 residue, a substitution that was enriched among viruses sampled from chronically infected individuals. When expressed in the context of other viral proteins, transmitted envelopes with a basic amino acid position 12 were incorporated at higher density into the virus and exhibited higher infectious titers than did non-signature envelopes. These results support the potential utility of using a computational approach to examine large viral sequence data sets for functional signatures and indicate the importance of Envelope expression levels for efficient HIV transmission. PMID:21876761

  9. RNA Secondary Structure Prediction by Using Discrete Mathematics: An Interdisciplinary Research Experience for Undergraduate Students

    PubMed Central

    Ellington, Roni; Wachira, James

    2010-01-01

    The focus of this Research Experience for Undergraduates (REU) project was on RNA secondary structure prediction by using a lattice walk approach. The lattice walk approach is a combinatorial and computational biology method used to enumerate possible secondary structures and predict RNA secondary structure from RNA sequences. The method uses discrete mathematical techniques and identifies specified base pairs as parameters. The goal of the REU was to introduce upper-level undergraduate students to the principles and challenges of interdisciplinary research in molecular biology and discrete mathematics. At the beginning of the project, students from the biology and mathematics departments of a mid-sized university received instruction on the role of secondary structure in the function of eukaryotic RNAs and RNA viruses, RNA related to combinatorics, and the National Center for Biotechnology Information resources. The student research projects focused on RNA secondary structure prediction on a regulatory region of the yellow fever virus RNA genome and on an untranslated region of an mRNA of a gene associated with the neurological disorder epilepsy. At the end of the project, the REU students gave poster and oral presentations, and they submitted written final project reports to the program director. The outcome of the REU was that the students gained transferable knowledge and skills in bioinformatics and an awareness of the applications of discrete mathematics to biological research problems. PMID:20810968

  10. RNA secondary structure prediction by using discrete mathematics: an interdisciplinary research experience for undergraduate students.

    PubMed

    Ellington, Roni; Wachira, James; Nkwanta, Asamoah

    2010-01-01

    The focus of this Research Experience for Undergraduates (REU) project was on RNA secondary structure prediction by using a lattice walk approach. The lattice walk approach is a combinatorial and computational biology method used to enumerate possible secondary structures and predict RNA secondary structure from RNA sequences. The method uses discrete mathematical techniques and identifies specified base pairs as parameters. The goal of the REU was to introduce upper-level undergraduate students to the principles and challenges of interdisciplinary research in molecular biology and discrete mathematics. At the beginning of the project, students from the biology and mathematics departments of a mid-sized university received instruction on the role of secondary structure in the function of eukaryotic RNAs and RNA viruses, RNA related to combinatorics, and the National Center for Biotechnology Information resources. The student research projects focused on RNA secondary structure prediction on a regulatory region of the yellow fever virus RNA genome and on an untranslated region of an mRNA of a gene associated with the neurological disorder epilepsy. At the end of the project, the REU students gave poster and oral presentations, and they submitted written final project reports to the program director. The outcome of the REU was that the students gained transferable knowledge and skills in bioinformatics and an awareness of the applications of discrete mathematics to biological research problems.

  11. Exploring quantum computing application to satellite data assimilation

    NASA Astrophysics Data System (ADS)

    Cheung, S.; Zhang, S. Q.

    2015-12-01

    This is an exploring work on potential application of quantum computing to a scientific data optimization problem. On classical computational platforms, the physical domain of a satellite data assimilation problem is represented by a discrete variable transform, and classical minimization algorithms are employed to find optimal solution of the analysis cost function. The computation becomes intensive and time-consuming when the problem involves large number of variables and data. The new quantum computer opens a very different approach both in conceptual programming and in hardware architecture for solving optimization problem. In order to explore if we can utilize the quantum computing machine architecture, we formulate a satellite data assimilation experimental case in the form of quadratic programming optimization problem. We find a transformation of the problem to map it into Quadratic Unconstrained Binary Optimization (QUBO) framework. Binary Wavelet Transform (BWT) will be applied to the data assimilation variables for its invertible decomposition and all calculations in BWT are performed by Boolean operations. The transformed problem will be experimented as to solve for a solution of QUBO instances defined on Chimera graphs of the quantum computer.

  12. Conceptualizing Fraudulent Studies as Viruses: New Models for Handling Retractions

    ERIC Educational Resources Information Center

    Montgomery, Kathleen; Oliver, Amalya L.

    2017-01-01

    This paper addresses the growing problem of retractions in the scientific literature of publications that contain bad data (i.e., fabricated, falsified, or containing error), also called "false science." While the problem is particularly acute in the biomedical literature because of the life-threatening implications when treatment…

  13. Beet curly top resistance in USDA-ARS Ft. Collins germplasm, 2017

    USDA-ARS?s Scientific Manuscript database

    Curly top caused by Beet curly top virus (BCTV) is a widespread disease problem vectored by the beet leafhopper in semiarid sugar beet production areas. Host resistance is the primary defense against this problem, but resistance in commercial cultivars is only low to intermediate. In order to iden...

  14. Foliar insecticides for the control of curly top in Idaho sugar beet, 2017

    USDA-ARS?s Scientific Manuscript database

    Curly top caused by Beet curly top virus (BCTV) is a widespread disease problem vectored by the beet leafhopper in semiarid sugar beet production areas. Host resistance is the primary defense against this problem, but resistance in commercial cultivars is only low to intermediate. The neonicotiono...

  15. Beet curly top resistance in USDA-ARS plant introduction lines, 2017

    USDA-ARS?s Scientific Manuscript database

    Curly top caused by Beet curly top virus (BCTV) is a widespread disease problem vectored by the beet leafhopper in semiarid sugar beet production areas. Host resistance is the primary defense against this problem, but resistance in commercial cultivars is only low to intermediate. In order to iden...

  16. Insecticide seed treatments for sugarbeet

    USDA-ARS?s Scientific Manuscript database

    Pest feeding and vectoring of viruses cause serious problems in sugarbeet production worldwide. In order to ameliorate pest and disease problems on sugarbeet, two seed treatments, Poncho Beta (60 g a.i. clothianidin + 8 g a.i. beta-cyfluthrin/100,000 seed) and Cruiser Tef (60 g a.i. thiamethoxam + 8...

  17. Beet curly top resistance in USDA-ARS plant introduction lines, 2016

    USDA-ARS?s Scientific Manuscript database

    Curly top caused by Beet curly top virus (BCTV) is a widespread disease problem vectored by the beet leafhopper in semiarid sugar beet production areas. Host resistance is the primary defense against this problem, but resistance in commercial cultivars is only low to intermediate. In order to iden...

  18. Beet curly top resistance in USDA-ARS Kimberly germplasm lines, 2015

    USDA-ARS?s Scientific Manuscript database

    Curly top caused by Beet curly top virus is a widespread disease problem vectored by the beet leafhopper in semiarid sugar beet production areas. Host resistance is the primary defense against this problem, but resistance in commercial cultivars is only low to intermediate. In order to identify no...

  19. [Assessment and prevention of zoonoses: "one health approach"].

    PubMed

    Bonizzi, Luigi; Guarino, Marcella; Roncada, Paola; Colosio, Claudio

    2013-01-01

    Zoonotic pathologies represent diseases that can be transmittable from animals to humans and vice versa. In most cases zoonotic agents are bacteria or viruses and represent a huge problem for health. Zoonosis could represent easily solvable diseases such as simple infections or even deathly such as prion infections. They could be directly transmittable as tuberculosis or brucellosis or indirectly transmittable through vectors as biological fluids or foods from animal production. The increasing production and the globalization of animal food production have caused the spread of zoonosis worldwide turning this topic into a global problem. It is necessary to enforce the actual scientific collaboration between all countries in order to counteract the spread of these pathologies. About this topic WHO, FAO and OIE took part to the world project "one health" highlighting as most important topics the research on Rabies virus, influenza virus and on antibiotic resistance. In particular antibiotic resistance represents one of the most important topics of the last decade due to the inappropriate use of antibiotics, from animal production to human health. This last topic represents a serious problem for health system worldwide. This paper is mainly based on zoonoses such as avian flu, BSE and brucellosis and will describe the strategies used to limit their expansion.

  20. Proposal for a revised taxonomy of the family Filoviridae: classification, names of taxa and viruses, and virus abbreviations

    PubMed Central

    Kuhn, Jens H.; Becker, Stephan; Ebihara, Hideki; Geisbert, Thomas W.; Johnson, Karl M.; Kawaoka, Yoshihiro; Lipkin, W. Ian; Negredo, Ana I.; Netesov, Sergey V.; Nichol, Stuart T.; Palacios, Gustavo; Peters, Clarence J.; Tenorio, Antonio; Volchkov, Viktor E.; Jahrling, Peter B.

    2011-01-01

    The taxonomy of the family Filoviridae (marburgviruses and ebolaviruses) has changed several times since the discovery of its members, resulting in a plethora of species and virus names and abbreviations. The current taxonomy has only been partially accepted by most laboratory virologists. Confusion likely arose for several reasons: species names that consist of several words or which (should) contain diacritical marks, the current orthographic identity of species and virus names, and the similar pronunciation of several virus abbreviations in the absence of guidance for the correct use of vernacular names. To rectify this problem, we suggest (1) to retain the current species names Reston ebolavirus, Sudan ebolavirus, and Zaire ebolavirus, but to replace the name Cote d'Ivoire ebolavirus [sic] with Taï Forest ebolavirus and Lake Victoria marburgvirus with Marburg marburgvirus; (2) to revert the virus names of the type marburgviruses and ebolaviruses to those used for decades in the field (Marburg virus instead of Lake Victoria marburgvirus and Ebola virus instead of Zaire ebolavirus); (3) to introduce names for the remaining viruses reminiscent of jargon used by laboratory virologists but nevertheless different from species names (Reston virus, Sudan virus, Taï Forest virus), and (4) to introduce distinct abbreviations for the individual viruses (RESTV for Reston virus, SUDV for Sudan virus, and TAFV for Taï Forest virus), while retaining that for Marburg virus (MARV) and reintroducing that used over decades for Ebola virus (EBOV). Paying tribute to developments in the field, we propose (a) to create a new ebolavirus species (Bundibugyo ebolavirus) for one member virus (Bundibugyo virus, BDBV); (b) to assign a second virus to the species Marburg marburgvirus (Ravn virus, RAVV) for better reflection of now available high-resolution phylogeny; and (c) to create a new tentative genus (Cuevavirus) with one tentative species (Lloviu cuevavirus) for the recently discovered Lloviu virus (LLOV). Furthermore, we explain the etymological derivation of individual names, their pronunciation, and their correct use, and we elaborate on demarcation criteria for each taxon and virus. PMID:21046175

  1. Proposal for a revised taxonomy of the family Filoviridae: classification, names of taxa and viruses, and virus abbreviations.

    PubMed

    Kuhn, Jens H; Becker, Stephan; Ebihara, Hideki; Geisbert, Thomas W; Johnson, Karl M; Kawaoka, Yoshihiro; Lipkin, W Ian; Negredo, Ana I; Netesov, Sergey V; Nichol, Stuart T; Palacios, Gustavo; Peters, Clarence J; Tenorio, Antonio; Volchkov, Viktor E; Jahrling, Peter B

    2010-12-01

    The taxonomy of the family Filoviridae (marburgviruses and ebolaviruses) has changed several times since the discovery of its members, resulting in a plethora of species and virus names and abbreviations. The current taxonomy has only been partially accepted by most laboratory virologists. Confusion likely arose for several reasons: species names that consist of several words or which (should) contain diacritical marks, the current orthographic identity of species and virus names, and the similar pronunciation of several virus abbreviations in the absence of guidance for the correct use of vernacular names. To rectify this problem, we suggest (1) to retain the current species names Reston ebolavirus, Sudan ebolavirus, and Zaire ebolavirus, but to replace the name Cote d'Ivoire ebolavirus [sic] with Taï Forest ebolavirus and Lake Victoria marburgvirus with Marburg marburgvirus; (2) to revert the virus names of the type marburgviruses and ebolaviruses to those used for decades in the field (Marburg virus instead of Lake Victoria marburgvirus and Ebola virus instead of Zaire ebolavirus); (3) to introduce names for the remaining viruses reminiscent of jargon used by laboratory virologists but nevertheless different from species names (Reston virus, Sudan virus, Taï Forest virus), and (4) to introduce distinct abbreviations for the individual viruses (RESTV for Reston virus, SUDV for Sudan virus, and TAFV for Taï Forest virus), while retaining that for Marburg virus (MARV) and reintroducing that used over decades for Ebola virus (EBOV). Paying tribute to developments in the field, we propose (a) to create a new ebolavirus species (Bundibugyo ebolavirus) for one member virus (Bundibugyo virus, BDBV); (b) to assign a second virus to the species Marburg marburgvirus (Ravn virus, RAVV) for better reflection of now available high-resolution phylogeny; and (c) to create a new tentative genus (Cuevavirus) with one tentative species (Lloviu cuevavirus) for the recently discovered Lloviu virus (LLOV). Furthermore, we explain the etymological derivation of individual names, their pronunciation, and their correct use, and we elaborate on demarcation criteria for each taxon and virus.

  2. Broad cross-reactive T cell receptor repertoires recognizing dissimilar Epstein-Barr and influenza A virus epitopes

    PubMed Central

    Clute, Shalyn C.; Naumov, Yuri N.; Watkin, Levi B.; Aslan, Nuray; Sullivan, John L.; Thorley-Lawson, David A.; Luzuriaga, Katherine; Welsh, Raymond M.; Puzone, Roberto; Celada, Franco; Selin, Liisa K.

    2013-01-01

    Memory T cells cross-reactive with epitopes encoded by related or even unrelated viruses may alter the immune response and pathogenesis of infection by a process known as heterologous immunity. Because a challenge virus epitope may react with only a subset of the T cell repertoire in a cross-reactive epitope-specific memory pool, the vigorous cross-reactive response may be narrowly focused, or oligoclonal. We show here, by examining human T cell cross-reactivity between the HLA-A2-restricted influenza A virus-encoded M158-66 epitope (GILGFVFTL) and the dissimilar Epstein-Barr virus-encoded BMLF1280-288 epitope (GLCTLVAML), that under some conditions heterologous immunity can lead to a significant broadening rather than a narrowing of the T cell receptor repertoire. We suggest that dissimilar cross-reactive epitopes might generate a broad rather than narrow T cell repertoire if there is a lack of dominant high affinity clones, and this hypothesis is supported by computer simulation. PMID:21048112

  3. Virus Database and Online Inquiry System Based on Natural Vectors.

    PubMed

    Dong, Rui; Zheng, Hui; Tian, Kun; Yau, Shek-Chung; Mao, Weiguang; Yu, Wenping; Yin, Changchuan; Yu, Chenglong; He, Rong Lucy; Yang, Jie; Yau, Stephen St

    2017-01-01

    We construct a virus database called VirusDB (http://yaulab.math.tsinghua.edu.cn/VirusDB/) and an online inquiry system to serve people who are interested in viral classification and prediction. The database stores all viral genomes, their corresponding natural vectors, and the classification information of the single/multiple-segmented viral reference sequences downloaded from National Center for Biotechnology Information. The online inquiry system serves the purpose of computing natural vectors and their distances based on submitted genomes, providing an online interface for accessing and using the database for viral classification and prediction, and back-end processes for automatic and manual updating of database content to synchronize with GenBank. Submitted genomes data in FASTA format will be carried out and the prediction results with 5 closest neighbors and their classifications will be returned by email. Considering the one-to-one correspondence between sequence and natural vector, time efficiency, and high accuracy, natural vector is a significant advance compared with alignment methods, which makes VirusDB a useful database in further research.

  4. Sleep problems and computer use during work and leisure: Cross-sectional study among 7800 adults.

    PubMed

    Andersen, Lars Louis; Garde, Anne Helene

    2015-01-01

    Previous studies linked heavy computer use to disturbed sleep. This study investigates the association between computer use during work and leisure and sleep problems in working adults. From the 2010 round of the Danish Work Environment Cohort Study, currently employed wage earners on daytime schedule (N = 7883) replied to the Bergen insomnia scale and questions on weekly duration of computer use. Results showed that sleep problems for three or more days per week (average of six questions) were experienced by 14.9% of the respondents. Logistic regression analyses, controlled for gender, age, physical and psychosocial work factors, lifestyle, chronic disease and mental health showed that computer use during leisure for 30 or more hours per week (reference 0-10 hours per week) was associated with increased odds of sleep problems (OR 1.83 [95% CI 1.06-3.17]). Computer use during work and shorter duration of computer use during leisure were not associated with sleep problems. In conclusion, excessive computer use during leisure - but not work - is associated with sleep problems in adults working on daytime schedule.

  5. Reverse Genetics Approaches for the Development of Influenza Vaccines

    PubMed Central

    Nogales, Aitor; Martínez-Sobrido, Luis

    2016-01-01

    Influenza viruses cause annual seasonal epidemics and occasional pandemics of human respiratory disease. Influenza virus infections represent a serious public health and economic problem, which are most effectively prevented through vaccination. However, influenza viruses undergo continual antigenic variation, which requires either the annual reformulation of seasonal influenza vaccines or the rapid generation of vaccines against potential pandemic virus strains. The segmented nature of influenza virus allows for the reassortment between two or more viruses within a co-infected cell, and this characteristic has also been harnessed in the laboratory to generate reassortant viruses for their use as either inactivated or live-attenuated influenza vaccines. With the implementation of plasmid-based reverse genetics techniques, it is now possible to engineer recombinant influenza viruses entirely from full-length complementary DNA copies of the viral genome by transfection of susceptible cells. These reverse genetics systems have provided investigators with novel and powerful approaches to answer important questions about the biology of influenza viruses, including the function of viral proteins, their interaction with cellular host factors and the mechanisms of influenza virus transmission and pathogenesis. In addition, reverse genetics techniques have allowed the generation of recombinant influenza viruses, providing a powerful technology to develop both inactivated and live-attenuated influenza vaccines. In this review, we will summarize the current knowledge of state-of-the-art, plasmid-based, influenza reverse genetics approaches and their implementation to provide rapid, convenient, safe and more effective influenza inactivated or live-attenuated vaccines. PMID:28025504

  6. Prevalence of human herpes virus types 1-7 in the semen of men attending an infertility clinic and correlation with semen parameters.

    PubMed

    Neofytou, Eirini; Sourvinos, George; Asmarianaki, Maria; Spandidos, Demetrios A; Makrigiannakis, Antonios

    2009-06-01

    To determine the prevalence of herpes viruses in the semen of an asymptomatic male cohort with and without infertility problems and its association with altered semen parameters. A prospective randomized study. Medical school and IVF clinic. One hundred seventy-two male patients undergoing routine semen analysis: 80 with normal semen parameters (control group) and 92 with abnormal semen parameters. Semen samples were collected by masturbation. The DNA from the Herpesviridae family (herpes simplex virus 1 [HSV-1], herpes simplex virus 2 [HSV-2], Varicella zoster virus [VZV], Epstein-Barr virus [EBV], cytomegalovirus [CMV], human herpes virus type 6 [HHV-6], human herpes virus type 7 [HHV-7]) and routine semen parameters. Viral DNA was detected in 143/172 (83.1%) of the total samples for at least one herpes virus: HSV-1, 2.5%; VZV, 1.2%; EBV, 45%; CMV, 62.5%; HHV-6, 70%; HHV-7, 0% in the normal semen samples and HSV-1, 2.1%; VZV, 3.2%; EBV, 39.1%; CMV, 56.5%; HHV-6, 66.3%; HHV-7, 0% in the abnormal semen samples. No association was found between the presence of viral DNA and semen parameters. Interestingly, a statistical significance between leukocytospermia and the presence of EBV DNA was observed. The DNA of herpes viruses is frequently detected in the semen of asymptomatic fertile and infertile male patients. Further studies are required to investigate the role of herpes viruses in male factor infertility.

  7. A brief review on dengue molecular virology, diagnosis, treatment and prevalence in Pakistan

    PubMed Central

    2012-01-01

    Dengue virus infection is a serious health problem infecting 2.5 billion people worldwide. Dengue is now endemic in more than 100 countries, including Pakistan. Each year hundreds of people get infected with dengue in Pakistan. Currently, there is no vaccine available for the prevention of Dengue virus infection due to four viral serotypes. Dengue infection can cause death of patients in its most severity, meanwhile many antiviral compounds are being tested against dengue virus infection to eradicate this disease but still there is a need to develop an efficient, low-cost and safe vaccine that can target all the four serotypes of dengue virus. This review summarizes dengue molecular virology, important drug targets, prevalence in Pakistan, diagnosis, treatment and medicinal plant inhibitors against dengue. PMID:22929369

  8. Spontaneous Regression of Pulmonary Nodules Presenting as Epstein-Barr Virus-related Atypical Infectious Mononucleosis.

    PubMed

    Shinozuka, Jun; Awaguni, Hitoshi; Tanaka, Shin-Ichiro; Makino, Shigeru; Maruyama, Rikken; Inaba, Tohru; Imashuku, Shinsaku

    2016-07-01

    Pulmonary nodules associated with Epstein-Barr virus (EBV)-related atypical infectious mononucleosis have rarely been described. A 12-year-old Japanese boy, upon admission, revealed multiple small round nodules (a total of 7 nodules in 4 to 8 mm size) in the lungs on computed tomography. The hemorrhagic pharyngeal tonsils with hot signals on 18F-fluorodeoxyglucose-positron emission tomography-computed tomography were biopsied revealing the presence of EBV-encoded small nuclear RNA (EBER)-positive cells; however, no lymphoma was noted. The patient was diagnosed as having atypical EBV-infectious mononucleosis associated with primary EBV infection. Pulmonary nodules markedly reduced in numbers and sizes spontaneously over a 2-year period. Differential diagnosis of pulmonary nodules in childhood should include atypical EBV infection.

  9. Open Reading Frame Phylogenetic Analysis on the Cloud

    PubMed Central

    2013-01-01

    Phylogenetic analysis has become essential in researching the evolutionary relationships between viruses. These relationships are depicted on phylogenetic trees, in which viruses are grouped based on sequence similarity. Viral evolutionary relationships are identified from open reading frames rather than from complete sequences. Recently, cloud computing has become popular for developing internet-based bioinformatics tools. Biocloud is an efficient, scalable, and robust bioinformatics computing service. In this paper, we propose a cloud-based open reading frame phylogenetic analysis service. The proposed service integrates the Hadoop framework, virtualization technology, and phylogenetic analysis methods to provide a high-availability, large-scale bioservice. In a case study, we analyze the phylogenetic relationships among Norovirus. Evolutionary relationships are elucidated by aligning different open reading frame sequences. The proposed platform correctly identifies the evolutionary relationships between members of Norovirus. PMID:23671843

  10. Mutagenesis of the La Crosse Virus glycoprotein supports a role for Gc (1066-1087) as the fusion peptide

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Plassmeyer, Matthew L.; Graduate Group Molecular and Cell Biology, University of Pennsylvania School of Medicine, Philadelphia, PA 19104-6058; Soldan, Samantha S.

    The La Crosse Virus (LACV) M segment encodes two glycoproteins (Gn and Gc), and plays a critical role in the neuropathogenesis of LACV infection as the primary determinant of neuroinvasion. A recent study from our group demonstrated that the region comprising the membrane proximal two-thirds of Gc, amino acids 860-1442, is critical in mediating LACV fusion and entry. Furthermore, computational analysis identified structural similarities between a portion of this region, amino acids 970-1350, and the E1 fusion protein of two alphaviruses: Sindbis virus and Semliki Forrest virus (SFV). Within the region 970-1350, a 22-amino-acid hydrophobic segment (1066-1087) is predicted tomore » correlate structurally with the fusion peptides of class II fusion proteins. We performed site-directed mutagenesis of key amino acids in this 22-amino acid segment and determined the functional consequences of these mutations on fusion and entry. Several mutations within this hydrophobic domain affected glycoprotein expression to some extent, but all mutations either shifted the pH threshold of fusion below that of the wild-type protein, reduced fusion efficiency, or abrogated cell-to-cell fusion and pseudotype entry altogether. These results, coupled with the aforementioned computational modeling, suggest that the LACV Gc functions as a class II fusion protein and support a role for the region Gc 1066-1087 as a fusion peptide.« less

  11. Problems and accommodation strategies reported by computer users with rheumatoid arthritis or fibromyalgia.

    PubMed

    Baker, Nancy A; Rubinstein, Elaine N; Rogers, Joan C

    2012-09-01

    Little is known about the problems experienced by and the accommodation strategies used by computer users with rheumatoid arthritis (RA) or fibromyalgia (FM). This study (1) describes specific problems and accommodation strategies used by people with RA and FM during computer use; and (2) examines if there were significant differences in the problems and accommodation strategies between the different equipment items for each diagnosis. Subjects were recruited from the Arthritis Network Disease Registry. Respondents completed a self-report survey, the Computer Problems Survey. Data were analyzed descriptively (percentages; 95% confidence intervals). Differences in the number of problems and accommodation strategies were calculated using nonparametric tests (Friedman's test and Wilcoxon Signed Rank Test). Eighty-four percent of respondents reported at least one problem with at least one equipment item (RA = 81.5%; FM = 88.9%), with most respondents reporting problems with their chair. Respondents most commonly used timing accommodation strategies to cope with mouse and keyboard problems, personal accommodation strategies to cope with chair problems and environmental accommodation strategies to cope with monitor problems. The number of problems during computer use was substantial in our sample, and our respondents with RA and FM may not implement the most effective strategies to deal with their chair, keyboard, or mouse problems. This study suggests that workers with RA and FM might potentially benefit from education and interventions to assist with the development of accommodation strategies to reduce problems related to computer use.

  12. The semantic system is involved in mathematical problem solving.

    PubMed

    Zhou, Xinlin; Li, Mengyi; Li, Leinian; Zhang, Yiyun; Cui, Jiaxin; Liu, Jie; Chen, Chuansheng

    2018-02-01

    Numerous studies have shown that the brain regions around bilateral intraparietal cortex are critical for number processing and arithmetical computation. However, the neural circuits for more advanced mathematics such as mathematical problem solving (with little routine arithmetical computation) remain unclear. Using functional magnetic resonance imaging (fMRI), this study (N = 24 undergraduate students) compared neural bases of mathematical problem solving (i.e., number series completion, mathematical word problem solving, and geometric problem solving) and arithmetical computation. Direct subject- and item-wise comparisons revealed that mathematical problem solving typically had greater activation than arithmetical computation in all 7 regions of the semantic system (which was based on a meta-analysis of 120 functional neuroimaging studies on semantic processing). Arithmetical computation typically had greater activation in the supplementary motor area and left precentral gyrus. The results suggest that the semantic system in the brain supports mathematical problem solving. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Analytical Cost Metrics : Days of Future Past

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prajapati, Nirmal; Rajopadhye, Sanjay; Djidjev, Hristo Nikolov

    As we move towards the exascale era, the new architectures must be capable of running the massive computational problems efficiently. Scientists and researchers are continuously investing in tuning the performance of extreme-scale computational problems. These problems arise in almost all areas of computing, ranging from big data analytics, artificial intelligence, search, machine learning, virtual/augmented reality, computer vision, image/signal processing to computational science and bioinformatics. With Moore’s law driving the evolution of hardware platforms towards exascale, the dominant performance metric (time efficiency) has now expanded to also incorporate power/energy efficiency. Therefore the major challenge that we face in computing systems researchmore » is: “how to solve massive-scale computational problems in the most time/power/energy efficient manner?”« less

  14. Students' Mathematics Word Problem-Solving Achievement in a Computer-Based Story

    ERIC Educational Resources Information Center

    Gunbas, N.

    2015-01-01

    The purpose of this study was to investigate the effect of a computer-based story, which was designed in anchored instruction framework, on sixth-grade students' mathematics word problem-solving achievement. Problems were embedded in a story presented on a computer as computer story, and then compared with the paper-based version of the same story…

  15. Stability of the Influenza Virus Hemagglutinin Protein Correlates with Evolutionary Dynamics.

    PubMed

    Klein, Eili Y; Blumenkrantz, Deena; Serohijos, Adrian; Shakhnovich, Eugene; Choi, Jeong-Mo; Rodrigues, João V; Smith, Brendan D; Lane, Andrew P; Feldman, Andrew; Pekosz, Andrew

    2018-01-01

    Protein thermodynamics are an integral determinant of viral fitness and one of the major drivers of protein evolution. Mutations in the influenza A virus (IAV) hemagglutinin (HA) protein can eliminate neutralizing antibody binding to mediate escape from preexisting antiviral immunity. Prior research on the IAV nucleoprotein suggests that protein stability may constrain seasonal IAV evolution; however, the role of stability in shaping the evolutionary dynamics of the HA protein has not been explored. We used the full coding sequence of 9,797 H1N1pdm09 HA sequences and 16,716 human seasonal H3N2 HA sequences to computationally estimate relative changes in the thermal stability of the HA protein between 2009 and 2016. Phylogenetic methods were used to characterize how stability differences impacted the evolutionary dynamics of the virus. We found that pandemic H1N1 IAV strains split into two lineages that had different relative HA protein stabilities and that later variants were descended from the higher-stability lineage. Analysis of the mutations associated with the selective sweep of the higher-stability lineage found that they were characterized by the early appearance of highly stabilizing mutations, the earliest of which was not located in a known antigenic site. Experimental evidence further suggested that H1N1 HA stability may be correlated with in vitro virus production and infection. A similar analysis of H3N2 strains found that surviving lineages were also largely descended from viruses predicted to encode more-stable HA proteins. Our results suggest that HA protein stability likely plays a significant role in the persistence of different IAV lineages. IMPORTANCE One of the constraints on fast-evolving viruses, such as influenza virus, is protein stability, or how strongly the folded protein holds together. Despite the importance of this protein property, there has been limited investigation of the impact of the stability of the influenza virus hemagglutinin protein-the primary antibody target of the immune system-on its evolution. Using a combination of computational estimates of stability and experiments, our analysis found that viruses with more-stable hemagglutinin proteins were associated with long-term persistence in the population. There are two potential reasons for the observed persistence. One is that more-stable proteins tolerate destabilizing mutations that less-stable proteins could not, thus increasing opportunities for immune escape. The second is that greater stability increases the fitness of the virus through increased production of infectious particles. Further research on the relative importance of these mechanisms could help inform the annual influenza vaccine composition decision process.

  16. Survey for infectious hematopoietic necrosis (IHN) virus in Washington salmon

    USGS Publications Warehouse

    Amend, Donald F.; Wood, James W.

    1972-01-01

    A virus disease of juvenile sockeye salmon (Oncorhynchus nerka) has been a problem in Washington hatcheries since first reported by Rucker [9] in 1953. Presumably, the same disease has occurred in Oregon, and it is now referred to as the Oregon, and it is now referred to as the Oregon sockeye disease (OSD) or the sockeye salmon virus (SSV) [8,12]. The primary source of the disease was thought to be from the feeding of raw sockeye salmon viscera, and the incidence decreased when pasteurized diets were used [5]. However, sporadic attacks continue to occur even though pelleted diets containing pasteurized fish products are fed.  

  17. Iatrogenic Blood-borne Viral Infections in Refugee Children from War and Transition Zones

    PubMed Central

    2013-01-01

    Pediatric infectious disease clinicians in industrialized countries may encounter iatrogenically transmitted HIV, hepatitis B virus, and hepatitis C virus infections in refugee children from Central Asia, Southeast Asia, and sub-Saharan Africa. The consequences of political collapse and/or civil war—work migration, prostitution, intravenous drug use, defective public health resources, and poor access to good medical care—all contribute to the spread of blood-borne viruses. Inadequate infection control practices by medical establishments can lead to iatrogenic infection of children. Summaries of 4 cases in refugee children in Australia are a salient reminder of this problem. PMID:23739597

  18. The Role of the Goal in Solving Hard Computational Problems: Do People Really Optimize?

    ERIC Educational Resources Information Center

    Carruthers, Sarah; Stege, Ulrike; Masson, Michael E. J.

    2018-01-01

    The role that the mental, or internal, representation plays when people are solving hard computational problems has largely been overlooked to date, despite the reality that this internal representation drives problem solving. In this work we investigate how performance on versions of two hard computational problems differs based on what internal…

  19. Domain identification in impedance computed tomography by spline collocation method

    NASA Technical Reports Server (NTRS)

    Kojima, Fumio

    1990-01-01

    A method for estimating an unknown domain in elliptic boundary value problems is considered. The problem is formulated as an inverse problem of integral equations of the second kind. A computational method is developed using a splice collocation scheme. The results can be applied to the inverse problem of impedance computed tomography (ICT) for image reconstruction.

  20. CHEMEX; Understanding and Solving Problems in Chemistry. A Computer-Assisted Instruction Program for General Chemistry.

    ERIC Educational Resources Information Center

    Lower, Stephen K.

    A brief overview of CHEMEX--a problem-solving, tutorial style computer-assisted instructional course--is provided and sample problems are offered. In CHEMEX, students receive problems in advance and attempt to solve them before moving through the computer program, which assists them in overcoming difficulties and serves as a review mechanism.…

  1. A Comparison of the Effects of Lego TC Logo and Problem Solving Software on Elementary Students' Problem Solving Skills.

    ERIC Educational Resources Information Center

    Palumbo, Debra L; Palumbo, David B.

    1993-01-01

    Computer-based problem-solving software exposure was compared to Lego TC LOGO instruction. Thirty fifth graders received either Lego LOGO instruction, which couples Lego building block activities with LOGO computer programming, or instruction with various problem-solving computer programs. Although both groups showed significant progress, the Lego…

  2. Verdinexor Targeting of CRM1 is a Promising Therapeutic Approach against RSV and Influenza Viruses

    PubMed Central

    Pickens, Jennifer A.

    2018-01-01

    Two primary causes of respiratory tract infections are respiratory syncytial virus (RSV) and influenza viruses, both of which remain major public health concerns. There are a limited number of antiviral drugs available for the treatment of RSV and influenza, each having limited effectiveness and each driving selective pressure for the emergence of drug-resistant viruses. Novel broad-spectrum antivirals are needed to circumvent problems with current disease intervention strategies, while improving the cytokine-induced immunopathology associated with RSV and influenza infections. In this review, we examine the use of Verdinexor (KPT-335, a novel orally bioavailable drug that functions as a selective inhibitor of nuclear export, SINE), as an antiviral with multifaceted therapeutic potential. KPT-335 works to (1) block CRM1 (i.e., Chromosome Region Maintenance 1; exportin 1 or XPO1) mediated export of viral proteins critical for RSV and influenza pathogenesis; and (2) repress nuclear factor κB (NF-κB) activation, thus reducing cytokine production and eliminating virus-associated immunopathology. The repurposing of SINE compounds as antivirals shows promise not only against RSV and influenza virus but also against other viruses that exploit the nucleus as part of their viral life cycle. PMID:29361733

  3. Quantum computation with coherent spin states and the close Hadamard problem

    NASA Astrophysics Data System (ADS)

    Adcock, Mark R. A.; Høyer, Peter; Sanders, Barry C.

    2016-04-01

    We study a model of quantum computation based on the continuously parameterized yet finite-dimensional Hilbert space of a spin system. We explore the computational powers of this model by analyzing a pilot problem we refer to as the close Hadamard problem. We prove that the close Hadamard problem can be solved in the spin system model with arbitrarily small error probability in a constant number of oracle queries. We conclude that this model of quantum computation is suitable for solving certain types of problems. The model is effective for problems where symmetries between the structure of the information associated with the problem and the structure of the unitary operators employed in the quantum algorithm can be exploited.

  4. Host-Based Multivariate Statistical Computer Operating Process Anomaly Intrusion Detection System (PAIDS)

    DTIC Science & Technology

    2009-03-01

    viii 3.2.3 Sub7 ...from TaskInfo in Excel Format. 3.2.3 Sub7 Also known as SubSeven, this is one of the best known, most widely distributed backdoor programs on the...engineering the spread of viruses, worms, backdoors and other malware. The Sub7 Trojan establishes a server on the victim computer that

  5. Behavior-Based Fault Monitoring

    DTIC Science & Technology

    1990-12-03

    processor targeted for avionics and space applications . It appears that the signature monitoring technique can be extended to detect computer viruses as...most common approach is structural duplication. Although effective, duplication is too expensive for all but a few applications . Redundancy can also be...Signature Monitoring and Encryption," Int. Conf. on Dependable Computing for Critical Applications , August 1989. 7. K.D. Wilken and J.P. Shen

  6. Preventing Catastrophes from Data Loss

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2004-01-01

    What's the worst thing that can happen to a computer? Worse than a hard disk crash, virus infection, spare assault, denial-of-service attack, hacker take-over, fire, flood or some other human, mechanical or natural disaster is a faulty backup when it is really needed. If the computer blows up, as long as the data is backed up securely, it can be…

  7. Protecting computer-based medical devices: defending against viruses and other threats.

    PubMed

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  8. Substructure analysis using NICE/SPAR and applications of force to linear and nonlinear structures. [spacecraft masts

    NASA Technical Reports Server (NTRS)

    Razzaq, Zia; Prasad, Venkatesh; Darbhamulla, Siva Prasad; Bhati, Ravinder; Lin, Cai

    1987-01-01

    Parallel computing studies are presented for a variety of structural analysis problems. Included are the substructure planar analysis of rectangular panels with and without a hole, the static analysis of space mast, using NICE/SPAR and FORCE, and substructure analysis of plane rigid-jointed frames using FORCE. The computations are carried out on the Flex/32 MultiComputer using one to eighteen processors. The NICE/SPAR runstream samples are documented for the panel problem. For the substructure analysis of plane frames, a computer program is developed to demonstrate the effectiveness of a substructuring technique when FORCE is enforced. Ongoing research activities for an elasto-plastic stability analysis problem using FORCE, and stability analysis of the focus problem using NICE/SPAR are briefly summarized. Speedup curves for the panel, the mast, and the frame problems provide a basic understanding of the effectiveness of parallel computing procedures utilized or developed, within the domain of the parameters considered. Although the speedup curves obtained exhibit various levels of computational efficiency, they clearly demonstrate the excellent promise which parallel computing holds for the structural analysis problem. Source code is given for the elasto-plastic stability problem and the FORCE program.

  9. Molecular epidemiology of Newcastle disease in Mexico and the potential spillover of viruses from poultry into wild bird species.

    PubMed

    Cardenas Garcia, Stivalis; Navarro Lopez, Roberto; Morales, Romeo; Olvera, Miguel A; Marquez, Miguel A; Merino, Ruben; Miller, Patti J; Afonso, Claudio L

    2013-08-01

    Newcastle disease, one of the most important health problems that affects the poultry industry around the world, is caused by virulent strains of Newcastle disease virus. Newcastle disease virus is considered to be endemic in several countries in the Americas, including Mexico. In order to control Newcastle disease outbreaks and spread, intensive vaccination programs, which include vaccines formulated with strains isolated at least 60 years ago, have been established. These vaccines are dissimilar in genotype to the virulent Newcastle disease viruses that had been circulating in Mexico until 2008. Here, 28 isolates obtained between 2008 and 2011 from different regions of Mexico from free-living wild birds, captive wild birds, and poultry were phylogenetically and biologically characterized in order to study the recent epidemiology of Newcastle disease viruses in Mexico. Here we demonstrate that, until recently, virulent viruses from genotype V continued to circulate and evolve in the country. All of the Newcastle disease viruses of low virulence, mostly isolated from nonvaccinated free-living wild birds and captive wild birds, were highly similar to LaSota (genotype II) and PHY-LMV42 (genotype I) vaccine strains. These findings, together with the discovery of two virulent viruses at the Mexican zoo, suggest that Newcastle disease viruses may be escaping from poultry into the environment.

  10. Molecular Epidemiology of Newcastle Disease in Mexico and the Potential Spillover of Viruses from Poultry into Wild Bird Species

    PubMed Central

    Cardenas Garcia, Stivalis; Navarro Lopez, Roberto; Morales, Romeo; Olvera, Miguel A.; Marquez, Miguel A.; Merino, Ruben; Miller, Patti J.

    2013-01-01

    Newcastle disease, one of the most important health problems that affects the poultry industry around the world, is caused by virulent strains of Newcastle disease virus. Newcastle disease virus is considered to be endemic in several countries in the Americas, including Mexico. In order to control Newcastle disease outbreaks and spread, intensive vaccination programs, which include vaccines formulated with strains isolated at least 60 years ago, have been established. These vaccines are dissimilar in genotype to the virulent Newcastle disease viruses that had been circulating in Mexico until 2008. Here, 28 isolates obtained between 2008 and 2011 from different regions of Mexico from free-living wild birds, captive wild birds, and poultry were phylogenetically and biologically characterized in order to study the recent epidemiology of Newcastle disease viruses in Mexico. Here we demonstrate that, until recently, virulent viruses from genotype V continued to circulate and evolve in the country. All of the Newcastle disease viruses of low virulence, mostly isolated from nonvaccinated free-living wild birds and captive wild birds, were highly similar to LaSota (genotype II) and PHY-LMV42 (genotype I) vaccine strains. These findings, together with the discovery of two virulent viruses at the Mexican zoo, suggest that Newcastle disease viruses may be escaping from poultry into the environment. PMID:23770910

  11. Guidelines on AIDS in Europe. First Revised Edition.

    ERIC Educational Resources Information Center

    Zoffmann, H.; And Others

    The problem of acquired immune deficiency syndrome (AIDS) in Europe and public health measures that can be taken to reduce the spread of infection are discussed. These guidelines cover: the magnitude of the problem in Europe, the virus and its mode of transmission, major clinical features of the disease, laboratory tests, possibilities of…

  12. Seed treatments for the control of insects and diseases in sugarbeet

    USDA-ARS?s Scientific Manuscript database

    Insect feeding and vectoring of viruses cause serious problems in sugarbeet production worldwide. In order to ameliorate insect and disease problems on sugarbeet, two seed treatments, Poncho Beta (60 g a.i. clothianidin + 8 g a.i. beta-cyfluthrin/100,000 seed) and Cruiser Tef (60 g a.i. thiamethoxa...

  13. Beet curly top resistance in USDA-ARS Kimberly sugar beet germplasm lines, 2016

    USDA-ARS?s Scientific Manuscript database

    Curly top caused by Beet curly top virus is a widespread disease problem vectored by the beet leafhopper in semiarid sugar beet production areas. Host resistance is the primary defense against this problem, but resistance in commercial cultivars is only low to intermediate. In order to identify no...

  14. Prevalence of Polyoma BK Virus (BKPyV), Epstein-Barr Virus (EBV) and Human Papilloma Virus (HPV) in Oropharyngeal Cancer.

    PubMed

    Polz-Gruszka, Dorota; Morshed, Kamal; Jarzyński, Adrian; Polz-Dacewicz, Małgorzata

    2015-01-01

    The aim of this study was to analyze the prevalence of BK virus, Human Papillomavirus and Epstein-Barr virus in oropharyngeal cancer, and to test our hypothesis that BKV/HPV/EBV co-infection plays a role in oropharyngeal squamous cell carcinoma. The correlation between viral infection, OSCC, anatomic location, pre-treatment staging, evidence of metastases to lymph nodes, and grading was also investigated. The examination samples were collected from 62 patients from paraffin tissue blocks. Males (90.3%) with, smoking (83.9%) and alcohol abuse (67.7%) problems prevailed in the studied group. G2 histological type was recognized in 80.6% cases. T4 (77.4%) and N2 (56.5%) traits occurred in the majority of patients. No cases of metastasis were observed (M0 100%). HPV - 24.2%, EBV - 27.4% and BKV 17.7% were detected in the studied samples. We observed co-infection EBV/BKV in 8% of cases, HPV/BKV in 4.8%, and HPV/EBV in 9% cases. Only in two cases co-infection of all three viruses was found.

  15. Climatic changes and flooding durations in relation with public health

    NASA Astrophysics Data System (ADS)

    Sandoz, A.; Roumieux, C.; Trouillet, A.

    2009-04-01

    Climatic Changes, and more generaly Global Changes, play a major role in environmental modifications in relation with public health. Modifications of temperatures, precipitations... influence ecological habitats. These habitats can be adapted for some animals species, responsable of certain pandemics. Mosquitoes and birds represent for certain pandemics the essential elements of virus transmission. Abundance of mosquitoes and birds species, is heavily conditioned by flooded areas extent and specific habitats and their variations. The study we carried, has been done in South of France. We show present status of ecological habitats and flooded durations and future previsions. We reach environment impact for certain virus like West Nile virus. This virus affects bird, horse and sometimes man. Presence of the virus is conditioned by different factors, primarily including vector distribution (mosquitoes). We show how it's possible to localise favorable areas for the virus and to predict its future expansion areas. We present maps of the possibilities for future concerning previsions of bioclimatic steps variations. Thanks to the latest remote sensing and spatial analysis techniques. Our maps may be used as precious tools to help decision makers when faced with mosquito related problems.

  16. Recombinant expression of Garlic virus C (GARV-C) capsid protein in insect cells and its potential for the production of specific antibodies.

    PubMed

    Alves-Júnior, Miguel; Menezes Marraccini, Fernanda; Melo Filho, Péricles de Albuquerque; Nepomuceno Dusi, André; Pio-Ribeiro, Gilvan; Morais Ribeiro, Bergmann

    2008-01-01

    Garlic cultivars in Brazil are infected by a complex of viruses and for some virus species, such as the allexivirus, purification of the virions is sometimes cumbersume. To overcome this problem, recombinant expression of viral proteins in heterologous systems is an alternative method for producing antibodies. The capsid gene from Garlic virus C (GarV-C), an Allexivirus, was inserted into the genome of Autographa californica multiple nucleopolyhedrovirus (AcMNPV) generating the recombinant virus vSynGarV-C. The recombinant protein expression was confirmed by SDS-PAGE and western-blot of extracts from recombinant virus infected insect cells, where a protein band of approximately 32KDa was observed only in extracts from recombinant infected cells. This protein corresponded to the predicted size of the capsid protein of the GarV-C. A rabbit polyclonal antibody was raised against this protein, shown to be specific for the GarV-C protein in western-blot and dot-Elisa, however with a low titer.

  17. Atomistic modeling of the low-frequency mechanical modes and Raman spectra of icosahedral virus capsids

    NASA Astrophysics Data System (ADS)

    Dykeman, Eric C.; Sankey, Otto F.

    2010-02-01

    We describe a technique for calculating the low-frequency mechanical modes and frequencies of a large symmetric biological molecule where the eigenvectors of the Hessian matrix are determined with full atomic detail. The method, which follows order N methods used in electronic structure theory, determines the subset of lowest-frequency modes while using group theory to reduce the complexity of the problem. We apply the method to three icosahedral viruses of various T numbers and sizes; the human viruses polio and hepatitis B, and the cowpea chlorotic mottle virus, a plant virus. From the normal-mode eigenvectors, we use a bond polarizability model to predict a low-frequency Raman scattering profile for the viruses. The full atomic detail in the displacement patterns combined with an empirical potential-energy model allows a comparison of the fully atomic normal modes with elastic network models and normal-mode analysis with only dihedral degrees of freedom. We find that coarse-graining normal-mode analysis (particularly the elastic network model) can predict the displacement patterns for the first few (˜10) low-frequency modes that are global and cooperative.

  18. Developments in rabies vaccines.

    PubMed

    Hicks, D J; Fooks, A R; Johnson, N

    2012-09-01

    The development of vaccines that prevent rabies has a long and distinguished history, with the earliest preceding modern understanding of viruses and the mechanisms of immune protection against disease. The correct application of inactivated tissue culture-derived vaccines is highly effective at preventing the development of rabies, and very few failures are recorded. Furthermore, oral and parenteral vaccination is possible for wildlife, companion animals and livestock, again using inactivated tissue culture-derived virus. However, rabies remains endemic in many regions of the world and causes thousands of human deaths annually. There also remain no means of prophylaxis for rabies once the virus enters the central nervous system (CNS). One reason for this is the poor immune response within the CNS to infection with rabies virus (RABV). New approaches to vaccination using modified rabies viruses that express components of the innate immune system are being applied to this problem. Preliminary reports suggest that direct inoculation of such viruses could trigger an effective anti-viral response and prevent a fatal outcome from RABV infection. © 2012 Crown copyright. Clinical and Experimental Immunology © 2012 British Society for Immunology.

  19. Lassa-Vesicular Stomatitis Chimeric Virus Safely Destroys Brain Tumors

    PubMed Central

    Wollmann, Guido; Drokhlyansky, Eugene; Davis, John N.; Cepko, Connie

    2015-01-01

    ABSTRACT High-grade tumors in the brain are among the deadliest of cancers. Here, we took a promising oncolytic virus, vesicular stomatitis virus (VSV), and tested the hypothesis that the neurotoxicity associated with the virus could be eliminated without blocking its oncolytic potential in the brain by replacing the neurotropic VSV glycoprotein with the glycoprotein from one of five different viruses, including Ebola virus, Marburg virus, lymphocytic choriomeningitis virus (LCMV), rabies virus, and Lassa virus. Based on in vitro infections of normal and tumor cells, we selected two viruses to test in vivo. Wild-type VSV was lethal when injected directly into the brain. In contrast, a novel chimeric virus (VSV-LASV-GPC) containing genes from both the Lassa virus glycoprotein precursor (GPC) and VSV showed no adverse actions within or outside the brain and targeted and completely destroyed brain cancer, including high-grade glioblastoma and melanoma, even in metastatic cancer models. When mice had two brain tumors, intratumoral VSV-LASV-GPC injection in one tumor (glioma or melanoma) led to complete tumor destruction; importantly, the virus moved contralaterally within the brain to selectively infect the second noninjected tumor. A chimeric virus combining VSV genes with the gene coding for the Ebola virus glycoprotein was safe in the brain and also selectively targeted brain tumors but was substantially less effective in destroying brain tumors and prolonging survival of tumor-bearing mice. A tropism for multiple cancer types combined with an exquisite tumor specificity opens a new door to widespread application of VSV-LASV-GPC as a safe and efficacious oncolytic chimeric virus within the brain. IMPORTANCE Many viruses have been tested for their ability to target and kill cancer cells. Vesicular stomatitis virus (VSV) has shown substantial promise, but a key problem is that if it enters the brain, it can generate adverse neurologic consequences, including death. We tested a series of chimeric viruses containing genes coding for VSV, together with a gene coding for the glycoprotein from other viruses, including Ebola virus, Lassa virus, LCMV, rabies virus, and Marburg virus, which was substituted for the VSV glycoprotein gene. Ebola and Lassa chimeric viruses were safe in the brain and targeted brain tumors. Lassa-VSV was particularly effective, showed no adverse side effects even when injected directly into the brain, and targeted and destroyed two different types of deadly brain cancer, including glioblastoma and melanoma. PMID:25878115

  20. A new parallel DNA algorithm to solve the task scheduling problem based on inspired computational model.

    PubMed

    Wang, Zhaocai; Ji, Zuwen; Wang, Xiaoming; Wu, Tunhua; Huang, Wei

    2017-12-01

    As a promising approach to solve the computationally intractable problem, the method based on DNA computing is an emerging research area including mathematics, computer science and molecular biology. The task scheduling problem, as a well-known NP-complete problem, arranges n jobs to m individuals and finds the minimum execution time of last finished individual. In this paper, we use a biologically inspired computational model and describe a new parallel algorithm to solve the task scheduling problem by basic DNA molecular operations. In turn, we skillfully design flexible length DNA strands to represent elements of the allocation matrix, take appropriate biological experiment operations and get solutions of the task scheduling problem in proper length range with less than O(n 2 ) time complexity. Copyright © 2017. Published by Elsevier B.V.

  1. Insight and analysis problem solving in microbes to machines.

    PubMed

    Clark, Kevin B

    2015-11-01

    A key feature for obtaining solutions to difficult problems, insight is oftentimes vaguely regarded as a special discontinuous intellectual process and/or a cognitive restructuring of problem representation or goal approach. However, this nearly century-old state of art devised by the Gestalt tradition to explain the non-analytical or non-trial-and-error, goal-seeking aptitude of primate mentality tends to neglect problem-solving capabilities of lower animal phyla, Kingdoms other than Animalia, and advancing smart computational technologies built from biological, artificial, and composite media. Attempting to provide an inclusive, precise definition of insight, two major criteria of insight, discontinuous processing and problem restructuring, are here reframed using terminology and statistical mechanical properties of computational complexity classes. Discontinuous processing becomes abrupt state transitions in algorithmic/heuristic outcomes or in types of algorithms/heuristics executed by agents using classical and/or quantum computational models. And problem restructuring becomes combinatorial reorganization of resources, problem-type substitution, and/or exchange of computational models. With insight bounded by computational complexity, humans, ciliated protozoa, and complex technological networks, for example, show insight when restructuring time requirements, combinatorial complexity, and problem type to solve polynomial and nondeterministic polynomial decision problems. Similar effects are expected from other problem types, supporting the idea that insight might be an epiphenomenon of analytical problem solving and consequently a larger information processing framework. Thus, this computational complexity definition of insight improves the power, external and internal validity, and reliability of operational parameters with which to classify, investigate, and produce the phenomenon for computational agents ranging from microbes to man-made devices. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Role of Mononuclear Phagocytes in the Pathogenesis of Human Immunodeficiency Virus Infection

    DTIC Science & Technology

    1990-01-01

    interpretive problems. First, patient selection has been limited to individuals with late-stage, symptomatic HIV infection. The average time from...months. Such monocytes infected with HIV showed a frequency of infected cells in culture of 5-20% by immunofluorescence with mono- clonal anti -pl7 capsid...cells equally; viruses isolated in PHA/IL-2-treated lymphoblasts replicate only in T cells. Target cell selection of diverse HIV variants may underlie

  3. Live Attenuated Influenza Vaccines by Computer-Aided Rational Design

    PubMed Central

    Mueller, Steffen; Coleman, J. Robert; Papamichail, Dimitris; Ward, Charles B.; Nimnual, Anjaruwee; Futcher, Bruce; Skiena, Steven; Wimmer, Eckard

    2010-01-01

    Influenza claims 250,000 - 500,000 lives annually worldwide. Despite existing vaccines and enormous efforts in biomedical research, these staggering numbers have not changed significantly over the last two decades1, motivating the search for new, more effective, vaccines that can be rapidly designed and easily produced. Using influenza virus strain A/PR/8/34, we describe a systematic, rational approach, termed Synthetic Attenuated Virus Engineering (SAVE), to develop new, efficacious live attenuated influenza virus vaccine candidates through genome-scale changes in codon pair bias. Attenuation is based on many hundreds of nucleotide changes across the viral genome, offering high genetic stability and a wide margin of safety. The method can be applied rapidly to any emerging influenza virus in its entirety, an advantage that is significant for dealing with seasonal epidemics and pandemic threats, such as H5N1- or 2009-H1N1 influenza. PMID:20543832

  4. Quantitative Analysis of Hepatitis C NS5A Viral Protein Dynamics on the ER Surface.

    PubMed

    Knodel, Markus M; Nägel, Arne; Reiter, Sebastian; Vogel, Andreas; Targett-Adams, Paul; McLauchlan, John; Herrmann, Eva; Wittum, Gabriel

    2018-01-08

    Exploring biophysical properties of virus-encoded components and their requirement for virus replication is an exciting new area of interdisciplinary virological research. To date, spatial resolution has only rarely been analyzed in computational/biophysical descriptions of virus replication dynamics. However, it is widely acknowledged that intracellular spatial dependence is a crucial component of virus life cycles. The hepatitis C virus-encoded NS5A protein is an endoplasmatic reticulum (ER)-anchored viral protein and an essential component of the virus replication machinery. Therefore, we simulate NS5A dynamics on realistic reconstructed, curved ER surfaces by means of surface partial differential equations (sPDE) upon unstructured grids. We match the in silico NS5A diffusion constant such that the NS5A sPDE simulation data reproduce experimental NS5A fluorescence recovery after photobleaching (FRAP) time series data. This parameter estimation yields the NS5A diffusion constant. Such parameters are needed for spatial models of HCV dynamics, which we are developing in parallel but remain qualitative at this stage. Thus, our present study likely provides the first quantitative biophysical description of the movement of a viral component. Our spatio-temporal resolved ansatz paves new ways for understanding intricate spatial-defined processes central to specfic aspects of virus life cycles.

  5. Multiplex Degenerate Primer Design for Targeted Whole Genome Amplification of Many Viral Genomes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gardner, Shea N.; Jaing, Crystal J.; Elsheikh, Maher M.

    Background . Targeted enrichment improves coverage of highly mutable viruses at low concentration in complex samples. Degenerate primers that anneal to conserved regions can facilitate amplification of divergent, low concentration variants, even when the strain present is unknown. Results . A tool for designing multiplex sets of degenerate sequencing primers to tile overlapping amplicons across multiple whole genomes is described. The new script, run_tiled_primers, is part of the PriMux software. Primers were designed for each segment of South American hemorrhagic fever viruses, tick-borne encephalitis, Henipaviruses, Arenaviruses, Filoviruses, Crimean-Congo hemorrhagic fever virus, Rift Valley fever virus, and Japanese encephalitis virus. Eachmore » group is highly diverse with as little as 5% genome consensus. Primer sets were computationally checked for nontarget cross reactions against the NCBI nucleotide sequence database. Primers for murine hepatitis virus were demonstrated in the lab to specifically amplify selected genes from a laboratory cultured strain that had undergone extensive passage in vitro and in vivo. Conclusions . This software should help researchers design multiplex sets of primers for targeted whole genome enrichment prior to sequencing to obtain better coverage of low titer, divergent viruses. Applications include viral discovery from a complex background and improved sensitivity and coverage of rapidly evolving strains or variants in a gene family.« less

  6. Classification of viral zoonosis through receptor pattern analysis.

    PubMed

    Bae, Se-Eun; Son, Hyeon Seok

    2011-04-13

    Viral zoonosis, the transmission of a virus from its primary vertebrate reservoir species to humans, requires ubiquitous cellular proteins known as receptor proteins. Zoonosis can occur not only through direct transmission from vertebrates to humans, but also through intermediate reservoirs or other environmental factors. Viruses can be categorized according to genotype (ssDNA, dsDNA, ssRNA and dsRNA viruses). Among them, the RNA viruses exhibit particularly high mutation rates and are especially problematic for this reason. Most zoonotic viruses are RNA viruses that change their envelope proteins to facilitate binding to various receptors of host species. In this study, we sought to predict zoonotic propensity through the analysis of receptor characteristics. We hypothesized that the major barrier to interspecies virus transmission is that receptor sequences vary among species--in other words, that the specific amino acid sequence of the receptor determines the ability of the viral envelope protein to attach to the cell. We analysed host-cell receptor sequences for their hydrophobicity/hydrophilicity characteristics. We then analysed these properties for similarities among receptors of different species and used a statistical discriminant analysis to predict the likelihood of transmission among species. This study is an attempt to predict zoonosis through simple computational analysis of receptor sequence differences. Our method may be useful in predicting the zoonotic potential of newly discovered viral strains.

  7. Questing for an optimal, universal viral agent for oncolytic virotherapy

    NASA Astrophysics Data System (ADS)

    Paiva, L. R.; Martins, M. L.; Ferreira, S. C.

    2011-10-01

    One of the most promising strategies to treat cancer is attacking it with viruses designed to exploit specific altered pathways. Here, the effects of oncolytic virotherapy on tumors having compact, papillary, and disconnected morphologies are investigated through computer simulations of a multiscale model coupling macroscopic reaction-diffusion equations for the nutrients with microscopic stochastic rules for the actions of individual cells and viruses. The interaction among viruses and tumor cells involves cell infection, intracellular virus replication, and the release of new viruses in the tissue after cell lysis. The evolution over time of both the viral load and cancer cell population, as well as the probabilities for tumor eradication, were evaluated for a range of multiplicities of infection, viral entries, and burst sizes. It was found that in immunosuppressed hosts, the antitumor efficacy of a virus is primarily determined by its entry efficiency, its replicative capacity within the tumor, and its ability to spread over the tissue. However, the optimal traits for oncolytic viruses depend critically on the tumor growth dynamics and do not necessarily include rapid replication, cytolysis, or spreading, currently assumed as necessary conditions for a successful therapeutic outcome. Our findings have potential implications on the design of new vectors for the viral therapy of cancer.

  8. Quantitative Analysis of Hepatitis C NS5A Viral Protein Dynamics on the ER Surface

    PubMed Central

    Nägel, Arne; Reiter, Sebastian; Vogel, Andreas; McLauchlan, John; Herrmann, Eva; Wittum, Gabriel

    2018-01-01

    Exploring biophysical properties of virus-encoded components and their requirement for virus replication is an exciting new area of interdisciplinary virological research. To date, spatial resolution has only rarely been analyzed in computational/biophysical descriptions of virus replication dynamics. However, it is widely acknowledged that intracellular spatial dependence is a crucial component of virus life cycles. The hepatitis C virus-encoded NS5A protein is an endoplasmatic reticulum (ER)-anchored viral protein and an essential component of the virus replication machinery. Therefore, we simulate NS5A dynamics on realistic reconstructed, curved ER surfaces by means of surface partial differential equations (sPDE) upon unstructured grids. We match the in silico NS5A diffusion constant such that the NS5A sPDE simulation data reproduce experimental NS5A fluorescence recovery after photobleaching (FRAP) time series data. This parameter estimation yields the NS5A diffusion constant. Such parameters are needed for spatial models of HCV dynamics, which we are developing in parallel but remain qualitative at this stage. Thus, our present study likely provides the first quantitative biophysical description of the movement of a viral component. Our spatio-temporal resolved ansatz paves new ways for understanding intricate spatial-defined processes central to specfic aspects of virus life cycles. PMID:29316722

  9. Multiplex Degenerate Primer Design for Targeted Whole Genome Amplification of Many Viral Genomes

    DOE PAGES

    Gardner, Shea N.; Jaing, Crystal J.; Elsheikh, Maher M.; ...

    2014-01-01

    Background . Targeted enrichment improves coverage of highly mutable viruses at low concentration in complex samples. Degenerate primers that anneal to conserved regions can facilitate amplification of divergent, low concentration variants, even when the strain present is unknown. Results . A tool for designing multiplex sets of degenerate sequencing primers to tile overlapping amplicons across multiple whole genomes is described. The new script, run_tiled_primers, is part of the PriMux software. Primers were designed for each segment of South American hemorrhagic fever viruses, tick-borne encephalitis, Henipaviruses, Arenaviruses, Filoviruses, Crimean-Congo hemorrhagic fever virus, Rift Valley fever virus, and Japanese encephalitis virus. Eachmore » group is highly diverse with as little as 5% genome consensus. Primer sets were computationally checked for nontarget cross reactions against the NCBI nucleotide sequence database. Primers for murine hepatitis virus were demonstrated in the lab to specifically amplify selected genes from a laboratory cultured strain that had undergone extensive passage in vitro and in vivo. Conclusions . This software should help researchers design multiplex sets of primers for targeted whole genome enrichment prior to sequencing to obtain better coverage of low titer, divergent viruses. Applications include viral discovery from a complex background and improved sensitivity and coverage of rapidly evolving strains or variants in a gene family.« less

  10. Quantum Computing: Solving Complex Problems

    ScienceCinema

    DiVincenzo, David

    2018-05-22

    One of the motivating ideas of quantum computation was that there could be a new kind of machine that would solve hard problems in quantum mechanics. There has been significant progress towards the experimental realization of these machines (which I will review), but there are still many questions about how such a machine could solve computational problems of interest in quantum physics. New categorizations of the complexity of computational problems have now been invented to describe quantum simulation. The bad news is that some of these problems are believed to be intractable even on a quantum computer, falling into a quantum analog of the NP class. The good news is that there are many other new classifications of tractability that may apply to several situations of physical interest.

  11. Development of a Novel Anti-HIV-1 Agent from within: Effect of Chimeric Vpr-Containing Protease Cleavage Site Residues on Virus Replication

    NASA Astrophysics Data System (ADS)

    Serio, D.; Rizvi, T. A.; Cartas, M.; Kalyanaraman, V. S.; Weber, I. T.; Koprowski, H.; Srinivasan, A.

    1997-04-01

    Effective antiviral agents will be of great value in controlling virus replication and delaying the onset of HIV-1-related disease symptoms. Current therapy involves the use of antiviral agents that target the enzymatic functions of the virus, resulting in the emergence of resistant viruses to these agents, thus lowering their effectiveness. To overcome this problem, we have considered the idea of developing novel agents from within HIV-1 as inhibitors of virus replication. The specificity of the Vpr protein for the HIV-1 virus particle makes it an attractive molecule for the development of antiviral agents targeting the events associated with virus maturation. We have generated chimeric Vpr proteins containing HIV-1-specific sequences added to the C terminus of Vpr. These sequences correspond to nine cleavage sites of the Gag and Gag-Pol precursors of HIV-1. The chimeric Vpr constructs were introduced into HIV-1 proviral DNA to assess their effect on virus infectivity using single- and multiple-round replication assays. The virus particles generated exhibited a variable replication pattern depending on the protease cleavage site used as a fusion partner. Interestingly, the chimeric Vpr containing the cleavage sequences from the junction of p24 and p2, 24/2, completely abolished virus infectivity. These results show that chimeric proteins generated from within HIV-1 have the ability to suppress HIV-1 replication and make ideal agents for gene therapy or intracellular immunization to treat HIV-1 infection.

  12. Control of plant virus diseases in cool-season grain legume crops.

    PubMed

    Makkouk, Khaled M; Kumari, Safaa G; van Leur, Joop A G; Jones, Roger A C

    2014-01-01

    Cool-season grain legume crops become infected with a wide range of viruses, many of which cause serious diseases and major yield losses. This review starts by discussing which viruses are important in the principal cool-season grain legume crops in different parts of the world, the losses they cause and their economic impacts in relation to control. It then describes the main types of control measures available: host resistance, phytosanitary measures, cultural measures, chemical control, and biological control. Examples are provided of successful deployment of the different types of measures to control virus epidemics in cool-season grain legume crops. Next it emphasizes the need for integrated approaches to control because single control measures used alone rarely suffice to adequately reduce virus-induced yield losses in these crops. Development of effective integrated disease management (IDM) strategies depends on an interdisciplinary team approach to (i) understand the ecological and climatic factors which lead to damaging virus epidemics and (ii) evaluate the effectiveness of individual control measures. In addition to using virus-resistant cultivars, other IDM components include sowing virus-tested seed stocks, selecting cultivars with low seed transmission rates, using diverse phytosanitary or cultural practices that minimize the virus source or reduce its spread, and using selective pesticides in an environmentally responsible way. The review finishes by briefly discussing the implications of climate change in increasing problems associated with control and the opportunities to control virus diseases more effectively through new technologies.

  13. Whole-proteome phylogeny of large dsDNA viruses and parvoviruses through a composition vector method related to dynamical language model

    PubMed Central

    2010-01-01

    Background The vast sequence divergence among different virus groups has presented a great challenge to alignment-based analysis of virus phylogeny. Due to the problems caused by the uncertainty in alignment, existing tools for phylogenetic analysis based on multiple alignment could not be directly applied to the whole-genome comparison and phylogenomic studies of viruses. There has been a growing interest in alignment-free methods for phylogenetic analysis using complete genome data. Among the alignment-free methods, a dynamical language (DL) method proposed by our group has successfully been applied to the phylogenetic analysis of bacteria and chloroplast genomes. Results In this paper, the DL method is used to analyze the whole-proteome phylogeny of 124 large dsDNA viruses and 30 parvoviruses, two data sets with large difference in genome size. The trees from our analyses are in good agreement to the latest classification of large dsDNA viruses and parvoviruses by the International Committee on Taxonomy of Viruses (ICTV). Conclusions The present method provides a new way for recovering the phylogeny of large dsDNA viruses and parvoviruses, and also some insights on the affiliation of a number of unclassified viruses. In comparison, some alignment-free methods such as the CV Tree method can be used for recovering the phylogeny of large dsDNA viruses, but they are not suitable for resolving the phylogeny of parvoviruses with a much smaller genome size. PMID:20565983

  14. Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread

    NASA Astrophysics Data System (ADS)

    Gan, Chenquan; Yang, Xiaofan

    2015-05-01

    In this paper, a new computer virus propagation model, which incorporates the effects of removable storage media and antivirus software, is proposed and analyzed. The global stability of the unique equilibrium of the model is independent of system parameters. Numerical simulations not only verify this result, but also illustrate the influences of removable storage media and antivirus software on viral spread. On this basis, some applicable measures for suppressing virus prevalence are suggested.

  15. Identifying controlling variables for math computation fluency through experimental analysis: the interaction of stimulus control and reinforcing consequences.

    PubMed

    Hofstadter-Duke, Kristi L; Daly, Edward J

    2015-03-01

    This study investigated a method for conducting experimental analyses of academic responding. In the experimental analyses, academic responding (math computation), rather than problem behavior, was reinforced across conditions. Two separate experimental analyses (one with fluent math computation problems and one with non-fluent math computation problems) were conducted with three elementary school children using identical contingencies while math computation rate was measured. Results indicate that the experimental analysis with non-fluent problems produced undifferentiated responding across participants; however, differentiated responding was achieved for all participants in the experimental analysis with fluent problems. A subsequent comparison of the single-most effective condition from the experimental analyses replicated the findings with novel computation problems. Results are discussed in terms of the critical role of stimulus control in identifying controlling consequences for academic deficits, and recommendations for future research refining and extending experimental analysis to academic responding are made. © The Author(s) 2014.

  16. Cell-based delivery of oncolytic viruses: a new strategic alliance for a biological strike against cancer.

    PubMed

    Power, Anthony T; Bell, John C

    2007-04-01

    Recent years have seen tremendous advances in the development of exquisitely targeted replicating virotherapeutics that can safely destroy malignant cells. Despite this promise, clinical advancement of this powerful and unique approach has been hindered by vulnerability to host defenses and inefficient systemic delivery. However, it now appears that delivery of oncolytic viruses within carrier cells may offer one solution to this critical problem. In this review, we compare the advantages and limitations of the numerous cell lineages that have been investigated as delivery platforms for viral therapeutics, and discuss examples showing how combined cell-virus biotherapeutics can be used to achieve synergistic gains in antitumor activity. Finally, we highlight avenues for future preclinical research that might be taken in order to refine cell-virus biotherapeutics in preparation for human trials.

  17. INFLUENCE OF ANESTHESIA ON EXPERIMENTAL NEUROTROPIC VIRUS INFECTIONS

    PubMed Central

    Sulkin, S. Edward; Zarafonetis, Christine; Goth, Andres

    1946-01-01

    Anesthesia with diethyl ether significantly alters the course and outcome of experimental infections with the equine encephalomyelitis virus (Eastern or Western type) or with the St. Louis encephalitis virus. No comparable effect is observed in experimental infections produced with rabies or poliomyelitis (Lansing) viruses. The neurotropic virus infections altered by ether anesthesia are those caused by viruses which are destroyed in vitro by this anesthetic, and those infections not affected by ether anesthesia are caused by viruses which apparently are not destroyed by ether in vitro. Another striking difference between these two groups of viruses is their pathogenesis in the animal host; those which are inhibited in vivo by ether anesthesia tend to infect cells of the cortex, basal ganglia, and only occasionally the cervical region of the cord. On the other hand, those which are not inhibited in vivo by ether anesthesia tend to involve cells of the lower central nervous system and in the case of rabies, peripheral nerves. This difference is of considerable importance in view of the fact that anesthetics affect cells of the lower central nervous system only in very high concentrations. It is obvious from the complexity of the problem that no clear-cut statement can be made at this point as to the mechanism of the observed effect of ether anesthesia in reducing the mortality rate in certain of the experimental neurotropic virus infections. Important possibilities include a direct specific effect of diethyl ether upon the virus and a less direct effect of the anesthetic upon the virus through its alteration of the metabolism of the host cell. PMID:19871570

  18. Protein sequences clustering of herpes virus by using Tribe Markov clustering (Tribe-MCL)

    NASA Astrophysics Data System (ADS)

    Bustamam, A.; Siswantining, T.; Febriyani, N. L.; Novitasari, I. D.; Cahyaningrum, R. D.

    2017-07-01

    The herpes virus can be found anywhere and one of the important characteristics is its ability to cause acute and chronic infection at certain times so as a result of the infection allows severe complications occurred. The herpes virus is composed of DNA containing protein and wrapped by glycoproteins. In this work, the Herpes viruses family is classified and analyzed by clustering their protein-sequence using Tribe Markov Clustering (Tribe-MCL) algorithm. Tribe-MCL is an efficient clustering method based on the theory of Markov chains, to classify protein families from protein sequences using pre-computed sequence similarity information. We implement the Tribe-MCL algorithm using an open source program of R. We select 24 protein sequences of Herpes virus obtained from NCBI database. The dataset consists of three types of glycoprotein B, F, and H. Each type has eight herpes virus that infected humans. Based on our simulation using different inflation factor r=1.5, 2, 3 we find a various number of the clusters results. The greater the inflation factor the greater the number of their clusters. Each protein will grouped together in the same type of protein.

  19. VIP: an integrated pipeline for metagenomics of virus identification and discovery

    PubMed Central

    Li, Yang; Wang, Hao; Nie, Kai; Zhang, Chen; Zhang, Yi; Wang, Ji; Niu, Peihua; Ma, Xuejun

    2016-01-01

    Identification and discovery of viruses using next-generation sequencing technology is a fast-developing area with potential wide application in clinical diagnostics, public health monitoring and novel virus discovery. However, tremendous sequence data from NGS study has posed great challenge both in accuracy and velocity for application of NGS study. Here we describe VIP (“Virus Identification Pipeline”), a one-touch computational pipeline for virus identification and discovery from metagenomic NGS data. VIP performs the following steps to achieve its goal: (i) map and filter out background-related reads, (ii) extensive classification of reads on the basis of nucleotide and remote amino acid homology, (iii) multiple k-mer based de novo assembly and phylogenetic analysis to provide evolutionary insight. We validated the feasibility and veracity of this pipeline with sequencing results of various types of clinical samples and public datasets. VIP has also contributed to timely virus diagnosis (~10 min) in acutely ill patients, demonstrating its potential in the performance of unbiased NGS-based clinical studies with demand of short turnaround time. VIP is released under GPLv3 and is available for free download at: https://github.com/keylabivdc/VIP. PMID:27026381

  20. Zika Virus: Medical Countermeasure Development Challenges

    PubMed Central

    Malone, Robert W.; Homan, Jane; Callahan, Michael V.; Glasspool-Malone, Jill; Damodaran, Lambodhar; Schneider, Adriano De Bernardi; Zimler, Rebecca; Talton, James; Cobb, Ronald R.; Ruzic, Ivan; Smith-Gagen, Julie; Janies, Daniel; Wilson, James

    2016-01-01

    Introduction Reports of high rates of primary microcephaly and Guillain–Barré syndrome associated with Zika virus infection in French Polynesia and Brazil have raised concerns that the virus circulating in these regions is a rapidly developing neuropathic, teratogenic, emerging infectious public health threat. There are no licensed medical countermeasures (vaccines, therapies or preventive drugs) available for Zika virus infection and disease. The Pan American Health Organization (PAHO) predicts that Zika virus will continue to spread and eventually reach all countries and territories in the Americas with endemic Aedes mosquitoes. This paper reviews the status of the Zika virus outbreak, including medical countermeasure options, with a focus on how the epidemiology, insect vectors, neuropathology, virology and immunology inform options and strategies available for medical countermeasure development and deployment. Methods Multiple information sources were employed to support the review. These included publically available literature, patents, official communications, English and Lusophone lay press. Online surveys were distributed to physicians in the US, Mexico and Argentina and responses analyzed. Computational epitope analysis as well as infectious disease outbreak modeling and forecasting were implemented. Field observations in Brazil were compiled and interviews conducted with public health officials. PMID:26934531

  1. Inhibitor designing, virtual screening, and docking studies for methyltransferase: A potential target against dengue virus

    PubMed Central

    Singh, Jagbir; Kumar, Mahesh; Mansuri, Rani; Sahoo, Ganesh Chandra; Deep, Aakash

    2016-01-01

    Aim: Aim of this work was to design and identify some S-adenosyl-L-homocysteine (SAH) analogs as inhibitors of S-adenosyl-L-methionine-dependent methyltransferase (MTase) protein using computational approaches. Introduction: According to the current scenario the dengue has been a global burden. The people are being killed by dengue virus in an abundant number. Despite of lot of research being going on dengue worldwide, there is no single drug which can kill its virus. This creates an urge for new drug target identification and designing. MTase has been reported as an effective target against dengue virus as it catalyzes an essential step in methylation and capping of viral RNA for viral replication. Materials and Methods: The crystal structure of MTase in complex with SAH was used for designing new analogs of SAH. SAH analogs designed were analyzed on the basis of docking, ADMET, and toxicity analysis done using Discovery Studio 3.5. Results: Seventeen analogs found noncarcinogenic, nonmutagenic, as well as good ADMET properties and good drug-like profile. Conclusion: These SAH analogs, inhibitors of MTase may act as drugs against dengue virus. Further synthesis and biological testing against dengue virus is under observation. PMID:27413346

  2. Spreading and vanishing in a West Nile virus model with expanding fronts

    NASA Astrophysics Data System (ADS)

    Tarboush, Abdelrazig K.; Lin, ZhiGui; Zhang, MengYun

    2017-05-01

    In this paper, we study a simplified version of a West Nile virus model discussed by Lewis et al. [28], which was considered as a first approximation for the spatial spread of WNv. The basic reproduction number $R_0$ for the non-spatial epidemic model is defined and a threshold parameter $R_0 ^D$ for the corresponding problem with null Dirichlet boundary condition is introduced. We consider a free boundary problem with coupled system, which describes the diffusion of birds by a PDE and the movement of mosquitoes by a ODE. The risk index $R_0^F (t)$ associated with the disease in spatial setting is represented. Sufficient conditions for the WNv to eradicate or to spread are given. The asymptotic behavior of the solution to system when the spreading occurs are considered. It is shown that the initial number of infected populations, the diffusion rate of birds and the length of initial habitat exhibit important impacts on the vanishing or spreading of the virus. Numerical simulations are presented to illustrate the analytical results.

  3. Die Virus-induzierten Lebererkrankungen des Menschen

    NASA Astrophysics Data System (ADS)

    Eisenburg, J.

    1982-12-01

    Although many viral agents may be associated with inflammatory hepatic changes, the vast majority of clinically important viral hepatitis is caused by hepatitis A, hepatitis B and the non A, non B agents. Infection of the liver of man by these hepatotropic agents is still a major public health problem in all parts of the world and constitutes a major hazard of the transfusion of blood and plasma derivatives. The magnitude of this hepatitis problem is not only documented by the about 200 million carriers of the hepatitis-B virus throughout the world, many of them asymptomatic, but also by the fact, that hepatitis B and non A, non B may progress to chronic liver disease, including cirrhosis and probably primary liver cancer. Potentially important pathogenetic determinants include viral factors such as subtype, dosage and mode of transmission and host factors such as age, sex, preexisting liver disease, coexisting non-liver disease (diabetes etc.), genetics and immune response to viral or autoantigens. As the virus itself seems not directly cytopathic, the diversity of lesions has been attributed to variation in the capacity of the host's response.

  4. Pathogenesis and prevention of placental and transplacental porcine reproductive and respiratory syndrome virus infection

    PubMed Central

    2013-01-01

    Porcine reproductive and respiratory syndrome virus (PRRSV)-induced reproductive problems are characterized by embryonic death, late-term abortions, early farrowing and increase in number of dead and mummified fetuses, and weak-born piglets. The virus recovery from fetal tissues illustrates transplacental infection, but despite many studies on the subject, the means by which PRRSV spreads from mother to fetus and the exact pathophysiological basis of the virus-induced reproductive failure remain unexplained. Recent findings from our group indicate that the endometrium and placenta are involved in the PRRSV passage from mother to fetus and that virus replication in the endometrial/placental tissues can be the actual reason for fetal death. The main purpose of this review is to clarify the role that PRRSV replication and PRRSV-induced changes in the endometrium/placenta play in the pathogenesis of PRRSV-induced reproductive failure in pregnant sows. In addition, strategies to control placental and transplacental PRRSV infection are discussed. PMID:24099529

  5. Clinical aspects of feline immunodeficiency and feline leukemia virus infection.

    PubMed

    Hartmann, Katrin

    2011-10-15

    Feline leukemia virus (FeLV) and feline immunodeficiency virus (FIV) are retroviruses with a global impact on the health of domestic cats. The two viruses differ in their potential to cause disease. FIV can cause an acquired immunodeficiency syndrome that increases the risk of developing opportunistic infections, neurological diseases, and tumors. In most naturally infected cats, however, FIV itself does not cause severe clinical signs, and FIV-infected cats may live many years without any health problems. FeLV is more pathogenic, and was long considered to be responsible for more clinical syndromes than any other agent in cats. FeLV can cause tumors (mainly lymphoma), bone marrow suppression syndromes (mainly anemia) and lead to secondary infectious diseases caused by suppressive effects of the virus on bone marrow and the immune system. Today, FeLV is less important as a deadly infectious agent as in the last 20 years prevalence has been decreasing in most countries. Copyright © 2011 Elsevier B.V. All rights reserved.

  6. Application of CRISPR/Cas9 system in breeding of new antiviral plant germplasm.

    PubMed

    Zhang, Dao-wei; Zhang, Chao-fan; Dong, Fang; Huang, Yan-lan; Zhang, Ya; Zhou, Hong

    2016-09-01

    With the development and improvement of CRISPR/Cas9 system in genomic editing technology, the system has been applied to the prevention and control of animal viral infectious diseases, which has made considerable achievements. It has also been applied to the study of highly efficient gene targeting editing in plant virus genomes. The CRISPR/Cas9-mediated targeted gene modification has not only achieved the genome editing of plant DNA virus, but also showed the genome editing potential of plant RNA virus. In addition, the CRISPR/Cas9 system functions at the gene transcriptional and post-transcriptional level, indicating that the system could regulate the replication of plant viruses through different ways. Compared with other plant viral disease control strategies, this system is more accurate in genome editing, more stable in gene expression regulation, and has broader spectrum of resistance to virus disease. In this review, we summarized the advantages, main problems and development tendency of CRISPR/cas9 system in breeding of new antiviral plant germplasms.

  7. West Nile Virus

    MedlinePlus

    ... Body Works Puberty & Growing Up Staying Healthy Staying Safe Recipes & Cooking Health Problems Illnesses & Injuries Relax & Unwind People, Places & Things That Help Feelings Expert Answers Q&A Movies & More for Teens ...

  8. Infotech. Cyber security. Health care learns to share scares and solutions.

    PubMed

    Colias, Mike

    2004-05-01

    Health care information technology leaders and others are coming together to share scary experiences and develop best practices to guard against crippling computer viruses, scheming hackers and other cyber threats.

  9. Prediction of the binding mode of N2-phenylguanine derivative inhibitors to herpes simplex virus type 1 thymidine kinase

    NASA Astrophysics Data System (ADS)

    Gaudio, Anderson Coser; Takahata, Yuji; Richards, William Graham

    1998-01-01

    The probable binding mode of the herpes simplex virus thymidine kinase (HSV1 TK) N2-[substituted]-phenylguanine inhibitors is proposed. A computational experiment was designed to check some qualitative binding parameters and to calculate the interaction binding energies of alternative binding modes of N2-phenylguanines. The known binding modes of the HSV1 TK natural substrate deoxythymidine and one of its competitive inhibitors ganciclovir were used as templates. Both the qualitative and quantitative parts of the computational experiment indicated that the N2-phenylguanine derivatives bind to the HSV1 TK active site in the deoxythymidine-like binding mode. An experimental observation that N2-phenylguanosine derivatives are not phosphorylated during the interaction with the HSV1 TK gives support to the proposed binding mode.

  10. Development of Drugs for Epstein - Barr virus using High-Throughput in silico Virtual Screening

    PubMed Central

    Li, Ning; Thompson, Scott; Jiang, Hualiang; Lieberman, Paul M.; Luo, Cheng

    2010-01-01

    Importance of the field Epstein-Barr virus (EBV) is a ubiquitious human herpesvirus that is causally associated with endemic forms of Burkitt’s lymphoma (BL), nasopharyngeal carcinoma, and lymphoproliferative disease in immunosuppressed individuals. On a global scale, EBV infects over 90% of the adult population and is responsible for ~1% of all human cancers. To date, there is no efficacious drug or therapy for the treatment of EBV infection and EBV-related diseases. Areas covered in this review In this review, we discuss the existing anti-EBV inhibitors and those under development. We discuss the value of different molecular targets, including EBV lytic DNA replication enzymes, as well as proteins that are expressed exclusively during latent infection, like EBNA1 and LMP1. Since the atomic structure of the EBNA1 DNA binding domain has been described, it is an attractive target for in silico methods of drug design and small molecule screening. We discuss the use of computational methods that can greatly facilitate the development of novel inhibitors and how in silico screening methods can be applied to target proteins with known structures, like EBNA1, to treat EBV infection and disease. What the reader will gain The reader will be familiarized with the problems in targeting of EBV for inhibition by small molecules and how computational methods can greatly facilitate this process. Take home message Despite the impressive efficacy of nucleoside analogues for the treatment of herpesvirus lytic infection, there remain few effective treatments for latent infections. Since EBV-latent infection persists within and contributes to the formation of EBV-associated cancers, targeting EBV latent proteins is an unmet medical need. High throughput in silico screening can accelerate the process of drug discovery for novel and selective agents that inhibit EBV latent infection and associated disease. PMID:22822721

  11. Problems experienced by people with arthritis when using a computer.

    PubMed

    Baker, Nancy A; Rogers, Joan C; Rubinstein, Elaine N; Allaire, Saralynn H; Wasko, Mary Chester

    2009-05-15

    To describe the prevalence of computer use problems experienced by a sample of people with arthritis, and to determine differences in the magnitude of these problems among people with rheumatoid arthritis (RA), osteoarthritis (OA), and fibromyalgia (FM). Subjects were recruited from the Arthritis Network Disease Registry and asked to complete a survey, the Computer Problems Survey, which was developed for this study. Descriptive statistics were calculated for the total sample and the 3 diagnostic subgroups. Ordinal regressions were used to determine differences between the diagnostic subgroups with respect to each equipment item while controlling for confounding demographic variables. A total of 359 respondents completed a survey. Of the 315 respondents who reported using a computer, 84% reported a problem with computer use attributed to their underlying disorder, and approximately 77% reported some discomfort related to computer use. Equipment items most likely to account for problems and discomfort were the chair, keyboard, mouse, and monitor. Of the 3 subgroups, significantly more respondents with FM reported more severe discomfort, more problems, and greater limitations related to computer use than those with RA or OA for all 4 equipment items. Computer use is significantly affected by arthritis. This could limit the ability of a person with arthritis to participate in work and home activities. Further study is warranted to delineate disease-related limitations and develop interventions to reduce them.

  12. Indirection and computer security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyzemore » common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.« less

  13. A parallel genome-wide RNAi screening strategy to identify host proteins important for entry of Marburg virus and H5N1 influenza virus.

    PubMed

    Cheng, Han; Koning, Katie; O'Hearn, Aileen; Wang, Minxiu; Rumschlag-Booms, Emily; Varhegyi, Elizabeth; Rong, Lijun

    2015-11-24

    Genome-wide RNAi screening has been widely used to identify host proteins involved in replication and infection of different viruses, and numerous host factors are implicated in the replication cycles of these viruses, demonstrating the power of this approach. However, discrepancies on target identification of the same viruses by different groups suggest that high throughput RNAi screening strategies need to be carefully designed, developed and optimized prior to the large scale screening. Two genome-wide RNAi screens were performed in parallel against the entry of pseudotyped Marburg viruses and avian influenza virus H5N1 utilizing an HIV-1 based surrogate system, to identify host factors which are important for virus entry. A comparative analysis approach was employed in data analysis, which alleviated systematic positional effects and reduced the false positive number of virus-specific hits. The parallel nature of the strategy allows us to easily identify the host factors for a specific virus with a greatly reduced number of false positives in the initial screen, which is one of the major problems with high throughput screening. The power of this strategy is illustrated by a genome-wide RNAi screen for identifying the host factors important for Marburg virus and/or avian influenza virus H5N1 as described in this study. This strategy is particularly useful for highly pathogenic viruses since pseudotyping allows us to perform high throughput screens in the biosafety level 2 (BSL-2) containment instead of the BSL-3 or BSL-4 for the infectious viruses, with alleviated safety concerns. The screening strategy together with the unique comparative analysis approach makes the data more suitable for hit selection and enables us to identify virus-specific hits with a much lower false positive rate.

  14. Cloud Computing for Complex Performance Codes.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Appel, Gordon John; Hadgu, Teklu; Klein, Brandon Thorin

    This report describes the use of cloud computing services for running complex public domain performance assessment problems. The work consisted of two phases: Phase 1 was to demonstrate complex codes, on several differently configured servers, could run and compute trivial small scale problems in a commercial cloud infrastructure. Phase 2 focused on proving non-trivial large scale problems could be computed in the commercial cloud environment. The cloud computing effort was successfully applied using codes of interest to the geohydrology and nuclear waste disposal modeling community.

  15. A Volunteer Computing Project for Solving Geoacoustic Inversion Problems

    NASA Astrophysics Data System (ADS)

    Zaikin, Oleg; Petrov, Pavel; Posypkin, Mikhail; Bulavintsev, Vadim; Kurochkin, Ilya

    2017-12-01

    A volunteer computing project aimed at solving computationally hard inverse problems in underwater acoustics is described. This project was used to study the possibilities of the sound speed profile reconstruction in a shallow-water waveguide using a dispersion-based geoacoustic inversion scheme. The computational capabilities provided by the project allowed us to investigate the accuracy of the inversion for different mesh sizes of the sound speed profile discretization grid. This problem suits well for volunteer computing because it can be easily decomposed into independent simpler subproblems.

  16. The application of generalized, cyclic, and modified numerical integration algorithms to problems of satellite orbit computation

    NASA Technical Reports Server (NTRS)

    Chesler, L.; Pierce, S.

    1971-01-01

    Generalized, cyclic, and modified multistep numerical integration methods are developed and evaluated for application to problems of satellite orbit computation. Generalized methods are compared with the presently utilized Cowell methods; new cyclic methods are developed for special second-order differential equations; and several modified methods are developed and applied to orbit computation problems. Special computer programs were written to generate coefficients for these methods, and subroutines were written which allow use of these methods with NASA's GEOSTAR computer program.

  17. Computational design of hepatitis C vaccines using empirical fitness landscapes and population dynamics

    NASA Astrophysics Data System (ADS)

    Hart, Gregory; Ferguson, Andrew

    Hepatitis C virus (HCV) afflicts 170 million people and kills 350,000 annually. Vaccination offers the most realistic and cost effective hope of controlling this epidemic. Despite 25 years of research, no vaccine is available. A major obstacle is the virus' extreme genetic variability and rapid mutational escape from immune pressure. Improvements in the vaccine design process are urgently needed. Coupling data mining and maximum entropy inference, we have developed a computational approach to translate sequence databases into empirical fitness landscapes. These landscapes explicitly connect viral genotype to phenotypic fitness and reveal vulnerable targets that can be exploited to rationally design vaccines. These landscapes represent the mutational ''playing field'' over which the virus evolves. We have integrated them with agent-based models of the viral mutational and host immune response, establishing a data-driven multi-scale immune simulator. We have used this simulator to perform in silico screening of HCV immunogens to rationally design vaccines to both cripple viral fitness and block escape. By systematically identifying a small number of promising vaccine candidates, these models can accelerate the search for a vaccine by massively reducing the experimental search space.

  18. Computational design of hepatitis C vaccines using maximum entropy models and population dynamics

    NASA Astrophysics Data System (ADS)

    Hart, Gregory; Ferguson, Andrew

    Hepatitis C virus (HCV) afflicts 170 million people and kills 350,000 annually. Vaccination offers the most realistic and cost effective hope of controlling this epidemic. Despite 20 years of research, no vaccine is available. A major obstacle is the virus' extreme genetic variability and rapid mutational escape from immune pressure. Improvements in the vaccine design process are urgently needed. Coupling data mining with spin glass models and maximum entropy inference, we have developed a computational approach to translate sequence databases into empirical fitness landscapes. These landscapes explicitly connect viral genotype to phenotypic fitness and reveal vulnerable targets that can be exploited to rationally design immunogens. Viewing these landscapes as the mutational ''playing field'' over which the virus is constrained to evolve, we have integrated them with agent-based models of the viral mutational and host immune response dynamics, establishing a data-driven immune simulator of HCV infection. We have employed this simulator to perform in silico screening of HCV immunogens. By systematically identifying a small number of promising vaccine candidates, these models can accelerate the search for a vaccine by massively reducing the experimental search space.

  19. Computer Assisted Problem Solving in an Introductory Statistics Course. Technical Report No. 56.

    ERIC Educational Resources Information Center

    Anderson, Thomas H.; And Others

    The computer assisted problem solving system (CAPS) described in this booklet administered "homework" problem sets designed to develop students' computational, estimation, and procedural skills. These skills were related to important concepts in an introductory statistics course. CAPS generated unique data, judged student performance,…

  20. Evoking Knowledge and Information Awareness for Enhancing Computer-Supported Collaborative Problem Solving

    ERIC Educational Resources Information Center

    Engelmann, Tanja; Tergan, Sigmar-Olaf; Hesse, Friedrich W.

    2010-01-01

    Computer-supported collaboration by spatially distributed group members still involves interaction problems within the group. This article presents an empirical study investigating the question of whether computer-supported collaborative problem solving by spatially distributed group members can be fostered by evoking knowledge and information…

  1. Students' Activity in Computer-Supported Collaborative Problem Solving in Mathematics

    ERIC Educational Resources Information Center

    Hurme, Tarja-riitta; Jarvela, Sanna

    2005-01-01

    The purpose of this study was to analyse secondary school students' (N = 16) computer-supported collaborative mathematical problem solving. The problem addressed in the study was: What kinds of metacognitive processes appear during computer-supported collaborative learning in mathematics? Another aim of the study was to consider the applicability…

  2. Predicting protein structures with a multiplayer online game.

    PubMed

    Cooper, Seth; Khatib, Firas; Treuille, Adrien; Barbero, Janos; Lee, Jeehyung; Beenen, Michael; Leaver-Fay, Andrew; Baker, David; Popović, Zoran; Players, Foldit

    2010-08-05

    People exert large amounts of problem-solving effort playing computer games. Simple image- and text-recognition tasks have been successfully 'crowd-sourced' through games, but it is not clear if more complex scientific problems can be solved with human-directed computing. Protein structure prediction is one such problem: locating the biologically relevant native conformation of a protein is a formidable computational challenge given the very large size of the search space. Here we describe Foldit, a multiplayer online game that engages non-scientists in solving hard prediction problems. Foldit players interact with protein structures using direct manipulation tools and user-friendly versions of algorithms from the Rosetta structure prediction methodology, while they compete and collaborate to optimize the computed energy. We show that top-ranked Foldit players excel at solving challenging structure refinement problems in which substantial backbone rearrangements are necessary to achieve the burial of hydrophobic residues. Players working collaboratively develop a rich assortment of new strategies and algorithms; unlike computational approaches, they explore not only the conformational space but also the space of possible search strategies. The integration of human visual problem-solving and strategy development capabilities with traditional computational algorithms through interactive multiplayer games is a powerful new approach to solving computationally-limited scientific problems.

  3. Measles

    MedlinePlus

    Measles is an infectious disease caused by a virus. It spreads easily from person to person. It ... down Tiny white spots inside the mouth Sometimes measles can lead to serious problems. There is no ...

  4. Co-trimoxazole

    MedlinePlus

    ... cannot digest the nutrients needed for good health); human immunodeficiency virus (HIV) infection; porphyria (an inherited blood disease that may cause skin or nervous system problems); thyroid disease; or glucose-6-phosphate dehydrogenase ( ...

  5. Protecting software agents from malicious hosts using quantum computing

    NASA Astrophysics Data System (ADS)

    Reisner, John; Donkor, Eric

    2000-07-01

    We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.

  6. Life science research and drug discovery at the turn of the 21st century: the experience of SwissBioGrid.

    PubMed

    den Besten, Matthijs; Thomas, Arthur J; Schroeder, Ralph

    2009-04-22

    It is often said that the life sciences are transforming into an information science. As laboratory experiments are starting to yield ever increasing amounts of data and the capacity to deal with those data is catching up, an increasing share of scientific activity is seen to be taking place outside the laboratories, sifting through the data and modelling "in silico" the processes observed "in vitro." The transformation of the life sciences and similar developments in other disciplines have inspired a variety of initiatives around the world to create technical infrastructure to support the new scientific practices that are emerging. The e-Science programme in the United Kingdom and the NSF Office for Cyberinfrastructure are examples of these. In Switzerland there have been no such national initiatives. Yet, this has not prevented scientists from exploring the development of similar types of computing infrastructures. In 2004, a group of researchers in Switzerland established a project, SwissBioGrid, to explore whether Grid computing technologies could be successfully deployed within the life sciences. This paper presents their experiences as a case study of how the life sciences are currently operating as an information science and presents the lessons learned about how existing institutional and technical arrangements facilitate or impede this operation. SwissBioGrid gave rise to two pilot projects: one for proteomics data analysis and the other for high-throughput molecular docking ("virtual screening") to find new drugs for neglected diseases (specifically, for dengue fever). The proteomics project was an example of a data management problem, applying many different analysis algorithms to Terabyte-sized datasets from mass spectrometry, involving comparisons with many different reference databases; the virtual screening project was more a purely computational problem, modelling the interactions of millions of small molecules with a limited number of protein targets on the coat of the dengue virus. Both present interesting lessons about how scientific practices are changing when they tackle the problems of large-scale data analysis and data management by means of creating a novel technical infrastructure. In the experience of SwissBioGrid, data intensive discovery has a lot to gain from close collaboration with industry and harnessing distributed computing power. Yet the diversity in life science research implies only a limited role for generic infrastructure; and the transience of support means that researchers need to integrate their efforts with others if they want to sustain the benefits of their success, which are otherwise lost.

  7. The A-Z of Zika drug discovery.

    PubMed

    Mottin, Melina; Borba, Joyce V V B; Braga, Rodolpho C; Torres, Pedro H M; Martini, Matheus C; Proenca-Modena, Jose Luiz; Judice, Carla C; Costa, Fabio T M; Ekins, Sean; Perryman, Alexander L; Andrade, Carolina Horta

    2018-06-20

    Despite the recent outbreak of Zika virus (ZIKV), there are still no approved treatments, and early-stage compounds are probably many years away from approval. A comprehensive A-Z review of the recent advances in ZIKV drug discovery efforts is presented, highlighting drug repositioning and computationally guided compounds, including discovered viral and host cell inhibitors. Promising ZIKV molecular targets are also described and discussed, as well as targets belonging to the host cell, as new opportunities for ZIKV drug discovery. All this knowledge is not only crucial to advancing the fight against the Zika virus and other flaviviruses but also helps us prepare for the next emerging virus outbreak to which we will have to respond. Copyright © 2018. Published by Elsevier Ltd.

  8. Computational Modelling and Optimal Control of Ebola Virus Disease with non-Linear Incidence Rate

    NASA Astrophysics Data System (ADS)

    Takaidza, I.; Makinde, O. D.; Okosun, O. K.

    2017-03-01

    The 2014 Ebola outbreak in West Africa has exposed the need to connect modellers and those with relevant data as pivotal to better understanding of how the disease spreads and quantifying the effects of possible interventions. In this paper, we model and analyse the Ebola virus disease with non-linear incidence rate. The epidemic model created is used to describe how the Ebola virus could potentially evolve in a population. We perform an uncertainty analysis of the basic reproductive number R 0 to quantify its sensitivity to other disease-related parameters. We also analyse the sensitivity of the final epidemic size to the time control interventions (education, vaccination, quarantine and safe handling) and provide the cost effective combination of the interventions.

  9. Understanding dengue virus evolution to support epidemic surveillance and counter-measure development.

    PubMed

    Pollett, S; Melendrez, M C; Maljkovic Berry, I; Duchêne, S; Salje, H; Dat, Cummings; Jarman, R G

    2018-04-25

    Dengue virus (DENV) causes a profound burden of morbidity and mortality, and its global burden is rising due to the co-circulation of four divergent DENV serotypes in the ecological context of globalization, travel, climate change, urbanization, and expansion of the geographic range of the Ae.aegypti and Ae.albopictus vectors. Understanding DENV evolution offers valuable opportunities to enhance surveillance and response to DENV epidemics via advances in RNA virus sequencing, bioinformatics, phylogenetic and other computational biology methods. Here we provide a scoping overview of the evolution and molecular epidemiology of DENV and the range of ways that evolutionary analyses can be applied as a public health tool against this arboviral pathogen. Copyright © 2018. Published by Elsevier B.V.

  10. Numerical Computation of Sensitivities and the Adjoint Approach

    NASA Technical Reports Server (NTRS)

    Lewis, Robert Michael

    1997-01-01

    We discuss the numerical computation of sensitivities via the adjoint approach in optimization problems governed by differential equations. We focus on the adjoint problem in its weak form. We show how one can avoid some of the problems with the adjoint approach, such as deriving suitable boundary conditions for the adjoint equation. We discuss the convergence of numerical approximations of the costate computed via the weak form of the adjoint problem and show the significance for the discrete adjoint problem.

  11. Defense Small Business Innovation Research Program (SBIR). Abstracts of Phase I Awards. 1985.

    DTIC Science & Technology

    1985-01-01

    AND MECHANICAL EROSION. THIS CAN CAUSE CAT - ASTROPHIC FAILURE OR STABILITY AND ACCURACY PROBLEMS OF REENTRY VEHICLES. THE TPS MUST BE ABLE TO PROTECT...RESPIRATORY, INFLUENZA AND ENCEPHALITIS VIRUSES . MCR TECHNOLOGY CORP SDIO $ 0 237 E DELAWARE PL - #10A CHICAGO, IL 60611 DR CHARLES K RHODES TITLE: SMALL RUGGED...MICROGENESYS INC ARMY $ 0 400 FRONTAGE RD W HAVEN, CT 06516 DR MARK A COCHRAN TITLE: BACULOVIRUS RECOMBINANTS THAT EXPRESS HEPATITIS B VIRUS SURFACE

  12. The development and manufacture of influenza vaccines

    PubMed Central

    Buckland, Barry C

    2015-01-01

    The development and manufacture of an Influenza vaccine is unlike any other product in the Vaccine industry because of the need to change composition on a yearly basis. The poor efficacy of Influenza vaccines over the past 2 y in the Northern Hemisphere invites questions on how the vaccines are manufactured and how change in vaccine composition is controlled. The opinion expressed in this commentary is that the risk of not making the correct HA protein is increased by the need to adapt the new seasonal virus for good propagation in embryonated chicken eggs. This adaptation is required because not enough doses can be made in time for the new 'flu season unless productivity is reasonable. This problem is not necessarily solved by going to a cell culture host for virus propagation and that may explain why this more advanced technology approach is not more widely used. A vaccine based on hemagglutinin (HA) protein that does not involve Influenza virus propagation (such as Flublok®) side steps this particular problem. The exact HA sequence can be used as is in the virus. The technology can be run at large scale, already at 2 × 21,000L in Japan, in contrast to eggs where scale-up is by multiplication; the HA product is highly purified and made consistently in the form of rosettes. PMID:25844949

  13. Comparative virology and AIDS (review).

    PubMed

    Kodama, M; Kodama, T

    1996-03-01

    The scientific debate between pros and cons of the HIV criminal theory of AIDS still remains unsettled. The purpose of this review is to promote resolution of the problem by extracting a common principle of the host-virus relation using data resources for each of 4 viruses as follows: a) polyoma virus, b) Marek's disease virus, c) Ebola virus, d) Korean hemorrhagic fever virus. Conclusions drawn from this study are given as follows: i) Environment emerged as the cardinal factor to modify the process of virus infection in all of the 4 viruses studied. Above all, an accelerating effect of environmental stress on the progression of virus infection was noted in vivo in the majority of viral diseases. ii) Evidence is available to indicate that a healthy cell (or a healthy individual) may harbor virus genes of multiple species without manifesting any pathologic sign. iii) Evidence also suggests that the biological property as well as morphological structure of a virus may vary in reponse to a change of the bioenvironment. On the basis of the above information, we propose to renounce 2 assumptions of classical infection model: a) the hereditarily determined virulence of a microorganism (including virus) be the sole determinant of infection to the effect that its invasion into the host should automatically complete the programmed course of infection; b) virus, a quasi-living creature, should reserve its behavioral independence irrespective of a change of the bioenvironment. The new infection model was constructed on the basis of the selfish gene concept that had been invented by Richard Dawkins to explain the altruistic behavior of an individual. That is, the fate of an exogenous or endogenous virus is under the dual control of the host genome (selfish gene) and the outer environment. The progression of virus infection is conditioned by a crosstalk between them. The selfish gene may use virus (a lifeless substance) as a magic bullet to induce a designated host response. In that sense, virus is not allowed to retain behavioral independence in the practice of its task. The above new model of virus infection was tested for its validity in the recent data of AIDS epidemiology.

  14. Technologies for the development of West Nile virus vaccines.

    PubMed

    Ulbert, Sebastian; Magnusson, Sofia E

    2014-01-01

    West Nile virus (WNV), an emerging mosquito-borne and zoonotic flavivirus, continues to spread worldwide and represents a major problem for human and veterinary medicine. In recent years, severe outbreaks were observed in the USA and Europe with neighboring countries, and the virus is considered to be endemic in an increasing number of areas. Although most infections remain asymptomatic, WNV can cause severe, even fatal, neurological disease, which affects mostly the elderly and immunocompromised individuals. Several vaccines have been licensed in the veterinary sector, but no human vaccine is available today. This review summarizes recent strategies that are being followed to develop WNV vaccines with emphasis on technologies suitable for the use in humans.

  15. Role of the human papilloma virus in the development of cervical intraepithelial neoplasia and malignancy.

    PubMed

    Jastreboff, A M; Cymet, T

    2002-04-01

    Human papilloma virus (HPV) is a public health problem as a sexually transmitted disease and as a critical factor in the pathogenesis of various cancers. The clinical manifestations, epidemiology, and virology that are critical to understanding the process of cervical dysplasia and neoplasia are reviewed. A discussion of the cervical transformation zone and the classification of cervical dysplasia and neoplasia leads into the importance of the Papanicolaou smear in prevention of potentially devastating sequelae of this virus. The role of the immune system in the progression of the disease and how it relates to vaccines, as well as treatment and prevention of HPV, are reviewed.

  16. Role of the human papilloma virus in the development of cervical intraepithelial neoplasia and malignancy

    PubMed Central

    Jastreboff, A; Cymet, T

    2002-01-01

    Human papilloma virus (HPV) is a public health problem as a sexually transmitted disease and as a critical factor in the pathogenesis of various cancers. The clinical manifestations, epidemiology, and virology that are critical to understanding the process of cervical dysplasia and neoplasia are reviewed. A discussion of the cervical transformation zone and the classification of cervical dysplasia and neoplasia leads into the importance of the Papanicolaou smear in prevention of potentially devastating sequelae of this virus. The role of the immune system in the progression of the disease and how it relates to vaccines, as well as treatment and prevention of HPV, are reviewed. PMID:11930025

  17. Third Computational Aeroacoustics (CAA) Workshop on Benchmark Problems

    NASA Technical Reports Server (NTRS)

    Dahl, Milo D. (Editor)

    2000-01-01

    The proceedings of the Third Computational Aeroacoustics (CAA) Workshop on Benchmark Problems cosponsored by the Ohio Aerospace Institute and the NASA Glenn Research Center are the subject of this report. Fan noise was the chosen theme for this workshop with representative problems encompassing four of the six benchmark problem categories. The other two categories were related to jet noise and cavity noise. For the first time in this series of workshops, the computational results for the cavity noise problem were compared to experimental data. All the other problems had exact solutions, which are included in this report. The Workshop included a panel discussion by representatives of industry. The participants gave their views on the status of applying computational aeroacoustics to solve practical industry related problems and what issues need to be addressed to make CAA a robust design tool.

  18. Perceived problems with computer gaming and internet use among adolescents: measurement tool for non-clinical survey studies

    PubMed Central

    2014-01-01

    Background Existing instruments for measuring problematic computer and console gaming and internet use are often lengthy and often based on a pathological perspective. The objective was to develop and present a new and short non-clinical measurement tool for perceived problems related to computer use and gaming among adolescents and to study the association between screen time and perceived problems. Methods Cross-sectional school-survey of 11-, 13-, and 15-year old students in thirteen schools in the City of Aarhus, Denmark, participation rate 89%, n = 2100. The main exposure was time spend on weekdays on computer- and console-gaming and internet use for communication and surfing. The outcome measures were three indexes on perceived problems related to computer and console gaming and internet use. Results The three new indexes showed high face validity and acceptable internal consistency. Most schoolchildren with high screen time did not experience problems related to computer use. Still, there was a strong and graded association between time use and perceived problems related to computer gaming, console gaming (only boys) and internet use, odds ratios ranging from 6.90 to 10.23. Conclusion The three new measures of perceived problems related to computer and console gaming and internet use among adolescents are appropriate, reliable and valid for use in non-clinical surveys about young people’s everyday life and behaviour. These new measures do not assess Internet Gaming Disorder as it is listed in the DSM and therefore has no parity with DSM criteria. We found an increasing risk of perceived problems with increasing time spent with gaming and internet use. Nevertheless, most schoolchildren who spent much time with gaming and internet use did not experience problems. PMID:24731270

  19. Toward a method for tracking virus evolutionary trajectory applied to the pandemic H1N1 2009 influenza virus.

    PubMed

    Squires, R Burke; Pickett, Brett E; Das, Sajal; Scheuermann, Richard H

    2014-12-01

    In 2009 a novel pandemic H1N1 influenza virus (H1N1pdm09) emerged as the first official influenza pandemic of the 21st century. Early genomic sequence analysis pointed to the swine origin of the virus. Here we report a novel computational approach to determine the evolutionary trajectory of viral sequences that uses data-driven estimations of nucleotide substitution rates to track the gradual accumulation of observed sequence alterations over time. Phylogenetic analysis and multiple sequence alignments show that sequences belonging to the resulting evolutionary trajectory of the H1N1pdm09 lineage exhibit a gradual accumulation of sequence variations and tight temporal correlations in the topological structure of the phylogenetic trees. These results suggest that our evolutionary trajectory analysis (ETA) can more effectively pinpoint the evolutionary history of viruses, including the host and geographical location traversed by each segment, when compared against either BLAST or traditional phylogenetic analysis alone. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Satellite Tobacco Mosaic Virus (STMV)

    NASA Technical Reports Server (NTRS)

    2000-01-01

    The structure of the Satellite Tobacco Mosaic Virus (STMV)--one of the smallest viruses known--has been successfully deduced using STMV crystals grown aboard the Space Shuttle in 1992 and 1994. The STMV crystals were up to 30 times the volume of any seen in the laboratory. At the same time they gave the best resolution data ever obtained on any virus crystal. STMV is a small icosahedral plant virus, consisting of a protein shell made up of 60 identical protein subunits of molecular weight 17,500. Particularly noteworthy is the fact that, in contrast to the crystal grown on Earth, the crystals grown under microgravity conditions were viusally perfect, with no striations or clumping of crystals. Furthermore, the X-ray diffraction data obtained from the space-grown crystals was of a much higher quality than the best data available at that time from ground-based crystals. This computer model shows the external coating or capsid. STMV is used because it is a simple protein to work with; studies are unrelated to tobacco. Credit: Dr. Alex McPherson, Univeristy of California at Irvin.

  1. Computational analysis of the receptor binding specificity of novel influenza A/H7N9 viruses.

    PubMed

    Zhou, Xinrui; Zheng, Jie; Ivan, Fransiskus Xaverius; Yin, Rui; Ranganathan, Shoba; Chow, Vincent T K; Kwoh, Chee-Keong

    2018-05-09

    Influenza viruses are undergoing continuous and rapid evolution. The fatal influenza A/H7N9 has drawn attention since the first wave of infections in March 2013, and raised more grave concerns with its increased potential to spread among humans. Experimental studies have revealed several host and virulence markers, indicating differential host binding preferences which can help estimate the potential of causing a pandemic. Here we systematically investigate the sequence pattern and structural characteristics of novel influenza A/H7N9 using computational approaches. The sequence analysis highlighted mutations in protein functional domains of influenza viruses. Molecular docking and molecular dynamics simulation revealed that the hemagglutinin (HA) of A/Taiwan/1/2017(H7N9) strain enhanced the binding with both avian and human receptor analogs, compared with the previous A/Shanghai/02/2013(H7N9) strain. The Molecular Mechanics - Poisson Boltzmann Surface Area (MM-PBSA) calculation revealed the change of residue-ligand interaction energy and detected the residues with conspicuous binding preference. The results are novel and specific to the emerging influenza A/Taiwan/1/2017(H7N9) strain compared with A/Shanghai/02/2013(H7N9). Its enhanced ability to bind human receptor analogs, which are abundant in the human upper respiratory tract, may be responsible for the recent outbreak. Residues showing binding preference were detected, which could facilitate monitoring the circulating influenza viruses.

  2. A Chemical Biology Solution to Problems with Studying Biologically Important but Unstable 9-O-Acetyl Sialic Acids.

    PubMed

    Khedri, Zahra; Xiao, An; Yu, Hai; Landig, Corinna Susanne; Li, Wanqing; Diaz, Sandra; Wasik, Brian R; Parrish, Colin R; Wang, Lee-Ping; Varki, Ajit; Chen, Xi

    2017-01-20

    9-O-Acetylation is a common natural modification on sialic acids (Sias) that terminate many vertebrate glycan chains. This ester group has striking effects on many biological phenomena, including microbe-host interactions, complement action, regulation of immune responses, sialidase action, cellular apoptosis, and tumor immunology. Despite such findings, 9-O-acetyl sialoglycoconjugates have remained largely understudied, primarily because of marked lability of the 9-O-acetyl group to even small pH variations and/or the action of mammalian or microbial esterases. Our current studies involving 9-O-acetylated sialoglycans on glycan microarrays revealed that even the most careful precautions cannot ensure complete stability of the 9-O-acetyl group. We now demonstrate a simple chemical biology solution to many of these problems by substituting the oxygen atom in the ester with a nitrogen atom, resulting in sialic acids with a chemically and biologically stable 9-N-acetyl group. We present an efficient one-pot multienzyme method to synthesize a sialoglycan containing 9-acetamido-9-deoxy-N-acetylneuraminic acid (Neu5Ac9NAc) and compare it to the one with naturally occurring 9-O-acetyl-N-acetylneuraminic acid (Neu5,9Ac 2 ). Conformational resemblance of the two molecules was confirmed by computational molecular dynamics simulations. Microarray studies showed that the Neu5Ac9NAc-sialoglycan is a ligand for viruses naturally recognizing Neu5,9Ac 2 , with a similar affinity but with much improved stability in handling and study. Feeding of Neu5Ac9NAc or Neu5,9Ac 2 to mammalian cells resulted in comparable incorporation and surface expression as well as binding to 9-O-acetyl-Sia-specific viruses. However, cells fed with Neu5Ac9NAc remained resistant to viral esterases and showed a slower turnover. This simple approach opens numerous research opportunities that have heretofore proved intractable.

  3. A Study of the Correlation between Computer Games and Adolescent Behavioral Problems

    PubMed Central

    Shokouhi-Moqhaddam, Solmaz; Khezri-Moghadam, Noshiravan; Javanmard, Zeinab; Sarmadi-Ansar, Hassan; Aminaee, Mehran; Shokouhi-Moqhaddam, Majid; Zivari-Rahman, Mahmoud

    2013-01-01

    Background Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the correlation between computer games and behavioral problems on male guidance school students. Methods This was a descriptive-correlative study on 384 randomly chosen male guidance school students. They were asked to answer the researcher's questionnaire about computer games and Achenbach’s Youth Self-Report (YSR). Findings The Results of this study indicated that there was about 95% direct significant correlation between the amount of playing games among adolescents and anxiety/depression, withdrawn/depression, rule-breaking behaviors, aggression, and social problems. However, there was no statistically significant correlation between the amount of computer game usage and physical complaints, thinking problems, and attention problems. In addition, there was a significant correlation between the students’ place of living and their parents’ job, and using computer games. Conclusion Computer games lead to anxiety, depression, withdrawal, rule-breaking behavior, aggression, and social problems in adolescents. PMID:24494157

  4. A Study of the Correlation between Computer Games and Adolescent Behavioral Problems.

    PubMed

    Shokouhi-Moqhaddam, Solmaz; Khezri-Moghadam, Noshiravan; Javanmard, Zeinab; Sarmadi-Ansar, Hassan; Aminaee, Mehran; Shokouhi-Moqhaddam, Majid; Zivari-Rahman, Mahmoud

    2013-01-01

    Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the correlation between computer games and behavioral problems on male guidance school students. This was a descriptive-correlative study on 384 randomly chosen male guidance school students. They were asked to answer the researcher's questionnaire about computer games and Achenbach's Youth Self-Report (YSR). The Results of this study indicated that there was about 95% direct significant correlation between the amount of playing games among adolescents and anxiety/depression, withdrawn/depression, rule-breaking behaviors, aggression, and social problems. However, there was no statistically significant correlation between the amount of computer game usage and physical complaints, thinking problems, and attention problems. In addition, there was a significant correlation between the students' place of living and their parents' job, and using computer games. Computer games lead to anxiety, depression, withdrawal, rule-breaking behavior, aggression, and social problems in adolescents.

  5. Near-Optimal Guidance Method for Maximizing the Reachable Domain of Gliding Aircraft

    NASA Astrophysics Data System (ADS)

    Tsuchiya, Takeshi

    This paper proposes a guidance method for gliding aircraft by using onboard computers to calculate a near-optimal trajectory in real-time, and thereby expanding the reachable domain. The results are applicable to advanced aircraft and future space transportation systems that require high safety. The calculation load of the optimal control problem that is used to maximize the reachable domain is too large for current computers to calculate in real-time. Thus the optimal control problem is divided into two problems: a gliding distance maximization problem in which the aircraft motion is limited to a vertical plane, and an optimal turning flight problem in a horizontal direction. First, the former problem is solved using a shooting method. It can be solved easily because its scale is smaller than that of the original problem, and because some of the features of the optimal solution are obtained in the first part of this paper. Next, in the latter problem, the optimal bank angle is computed from the solution of the former; this is an analytical computation, rather than an iterative computation. Finally, the reachable domain obtained from the proposed near-optimal guidance method is compared with that obtained from the original optimal control problem.

  6. Computational screen and experimental validation of anti-influenza effects of quercetin and chlorogenic acid from traditional Chinese medicine

    PubMed Central

    Liu, Zekun; Zhao, Junpeng; Li, Weichen; Shen, Li; Huang, Shengbo; Tang, Jingjing; Duan, Jie; Fang, Fang; Huang, Yuelong; Chang, Haiyan; Chen, Ze; Zhang, Ran

    2016-01-01

    The Influenza A virus is a great threat for human health, while various subtypes of the virus made it difficult to develop drugs. With the development of state-of-art computational chemistry, computational molecular docking could serve as a virtual screen of potential leading compound. In this study, we performed molecular docking for influenza A H1N1 (A/PR/8/34) with small molecules such as quercetin and chlorogenic acid, which were derived from traditional Chinese medicine. The results showed that these small molecules have strong binding abilities with neuraminidase from H1N1 (A/PR/8/34). Further details showed that the structural features of the molecules might be helpful for further drug design and development. The experiments in vitro, in vivo have validated the anti-influenza effect of quercetin and chlorogenic acid, which indicating comparable protection effects as zanamivir. Taken together, it was proposed that chlorogenic acid and quercetin could be employed as the effective lead compounds for anti-influenza A H1N1. PMID:26754609

  7. Computational screen and experimental validation of anti-influenza effects of quercetin and chlorogenic acid from traditional Chinese medicine

    NASA Astrophysics Data System (ADS)

    Liu, Zekun; Zhao, Junpeng; Li, Weichen; Shen, Li; Huang, Shengbo; Tang, Jingjing; Duan, Jie; Fang, Fang; Huang, Yuelong; Chang, Haiyan; Chen, Ze; Zhang, Ran

    2016-01-01

    The Influenza A virus is a great threat for human health, while various subtypes of the virus made it difficult to develop drugs. With the development of state-of-art computational chemistry, computational molecular docking could serve as a virtual screen of potential leading compound. In this study, we performed molecular docking for influenza A H1N1 (A/PR/8/34) with small molecules such as quercetin and chlorogenic acid, which were derived from traditional Chinese medicine. The results showed that these small molecules have strong binding abilities with neuraminidase from H1N1 (A/PR/8/34). Further details showed that the structural features of the molecules might be helpful for further drug design and development. The experiments in vitro, in vivo have validated the anti-influenza effect of quercetin and chlorogenic acid, which indicating comparable protection effects as zanamivir. Taken together, it was proposed that chlorogenic acid and quercetin could be employed as the effective lead compounds for anti-influenza A H1N1.

  8. Technology for Libraries.

    ERIC Educational Resources Information Center

    Phenix, Katharine; And Others

    1990-01-01

    Five articles discuss information technology in libraries: (1) "Software for Libraries" (Katharine Phenix); (2) "Online Update: European Online Services" (Martin Kesselman); (3) "Connect Time: Online Pricing Breakthroughs" (Barbara Quint); (4) "Microcomputing: Micro Biology Computer Viruses" (James LaRue);…

  9. Reviews: Software.

    ERIC Educational Resources Information Center

    Mackenzie, Norma N.; And Others

    1988-01-01

    Reviews four computer software packages including: "The Physical Science Series: Sound" which demonstrates making waves, speed of sound, doppler effect, and human hearing; "Andromeda" depicting celestial motions in any direction; "Biology Quiz: Humans" covering chemistry, cells, viruses, and human biology; and…

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koizumi, Yoshiki; Nakajim, Syo; Ohash, Hirofumi

    Cell culture study combing a mathematical model and computer simulation quantifies the anti-hepatitis C virus drug efficacy at any concentrations and any combinations in preclinical settings, and can obtain rich basic evidences for selecting optimal treatments prior to costly clinical trials.

  11. A full-length cDNA infectious clone of North American type 1 porcine reproductive and respiratory syndrome virus: expression of green fluorescent protein in the Nsp2 region.

    PubMed

    Fang, Ying; Rowland, Raymond R R; Roof, Michael; Lunney, Joan K; Christopher-Hennings, Jane; Nelson, Eric A

    2006-12-01

    The recent emergence of a unique group of North American type 1 porcine reproductive and respiratory syndrome virus (PRRSV) in the United States presents new disease control problems for a swine industry that has already been impacted seriously by North American type 2 PRRSV. In this study, a full-length cDNA infectious clone was generated from a low-virulence North American type 1 PRRSV isolate, SD01-08. In vitro studies demonstrated that the cloned virus maintained growth properties similar to those of the parental virus. Virological, pathological, and immunological observations from animals challenged with cloned viruses were similar to those from animals challenged with the parental virus and a modified live virus vaccine. To further explore the potential use as a viral backbone for expressing foreign genes, the green fluorescent protein (GFP) was inserted into a unique deletion site located at amino acid positions 348 and 349 of the predicted Nsp2 region in the virus, and expression of the Nsp2-GFP fusion protein was visualized by fluorescent microscopy. The availability of this North American type 1 infectious clone provides an important research tool for further study of the basic viral biology and pathogenic mechanisms of this group of type 1 PRRSV in the United States.

  12. A Full-Length cDNA Infectious Clone of North American Type 1 Porcine Reproductive and Respiratory Syndrome Virus: Expression of Green Fluorescent Protein in the Nsp2 Region▿

    PubMed Central

    Fang, Ying; Rowland, Raymond R. R.; Roof, Michael; Lunney, Joan K.; Christopher-Hennings, Jane; Nelson, Eric A.

    2006-01-01

    The recent emergence of a unique group of North American type 1 porcine reproductive and respiratory syndrome virus (PRRSV) in the United States presents new disease control problems for a swine industry that has already been impacted seriously by North American type 2 PRRSV. In this study, a full-length cDNA infectious clone was generated from a low-virulence North American type 1 PRRSV isolate, SD01-08. In vitro studies demonstrated that the cloned virus maintained growth properties similar to those of the parental virus. Virological, pathological, and immunological observations from animals challenged with cloned viruses were similar to those from animals challenged with the parental virus and a modified live virus vaccine. To further explore the potential use as a viral backbone for expressing foreign genes, the green fluorescent protein (GFP) was inserted into a unique deletion site located at amino acid positions 348 and 349 of the predicted Nsp2 region in the virus, and expression of the Nsp2-GFP fusion protein was visualized by fluorescent microscopy. The availability of this North American type 1 infectious clone provides an important research tool for further study of the basic viral biology and pathogenic mechanisms of this group of type 1 PRRSV in the United States. PMID:16971421

  13. From human behavior to the spread of mobile phone viruses

    NASA Astrophysics Data System (ADS)

    Wang, Pu

    Percolation theory was initiated some 50 years ago as a mathematical framework for the study of random physical processes such as the flow of a fluid through a disordered porous medium. It has been proved to be a remarkably rich theory, with applications from thermodynamic phase transitions to complex networks. In this dissertation percolation theory is used to study the diffusion process of mobile phone viruses. Some methodologies widely used in statistical physics are also applied to uncover the underlying statistical laws of human behavior and simulate the spread of mobile phone viruses in a large population. I find that while Bluetooth viruses can reach all susceptible handsets with time, they spread slowly due to human mobility, offering ample opportunities to deploy antiviral software. In contrast, viruses utilizing multimedia messaging services (MMS) could infect all users in hours, but currently a phase transition on the underlying call graph limits them to only a small fraction of the susceptible users. These results explain the lack of a major mobile virus breakout so far and predict that once a mobile operating system's market share reaches the phase transition point, viruses will pose a serious threat to mobile communications. These studies show how the large datasets and tools of statistical physics can be used to study some specific and important problems, such as the spread of mobile phone viruses.

  14. Distinct immune responses and virus shedding in pigs following aerosol, intra-nasal and contact infection with pandemic swine influenza A virus, A(H1N1)09.

    PubMed

    Hemmink, Johanneke D; Morgan, Sophie B; Aramouni, Mario; Everett, Helen; Salguero, Francisco J; Canini, Laetitia; Porter, Emily; Chase-Topping, Margo; Beck, Katy; Loughlin, Ronan Mac; Carr, B Veronica; Brown, Ian H; Bailey, Mick; Woolhouse, Mark; Brookes, Sharon M; Charleston, Bryan; Tchilian, Elma

    2016-10-20

    Influenza virus infection in pigs is a major farming problem, causing considerable economic loss and posing a zoonotic threat. In addition the pig is an excellent model for understanding immunity to influenza viruses as this is a natural host pathogen system. Experimentally, influenza virus is delivered to pigs intra-nasally, by intra-tracheal instillation or by aerosol, but there is little data comparing the outcome of different methods. We evaluated the shedding pattern, cytokine responses in nasal swabs and immune responses following delivery of low or high dose swine influenza pdmH1N1 virus to the respiratory tract of pigs intra-nasally or by aerosol and compared them to those induced in naturally infected contact pigs. Our data shows that natural infection by contact induces remarkably high innate and adaptive immune response, although the animals were exposed to a very low virus dose. In contacts, the kinetics of virus shedding were slow and prolonged and more similar to the low dose directly infected animals. In contrast the cytokine profile in nasal swabs, antibody and cellular immune responses of contacts more closely resemble immune responses in high dose directly inoculated animals. Consideration of these differences is important for studies of disease pathogenesis and assessment of vaccine protective efficacy.

  15. A computational method for predicting regulation of human microRNAs on the influenza virus genome

    PubMed Central

    2013-01-01

    Background While it has been suggested that host microRNAs (miRNAs) may downregulate viral gene expression as an antiviral defense mechanism, such a mechanism has not been explored in the influenza virus for human flu studies. As it is difficult to conduct related experiments on humans, computational studies can provide some insight. Although many computational tools have been designed for miRNA target prediction, there is a need for cross-species prediction, especially for predicting viral targets of human miRNAs. However, finding putative human miRNAs targeting influenza virus genome is still challenging. Results We developed machine-learning features and conducted comprehensive data training for predicting interactions between H1N1 genome segments and host miRNA. We defined our seed region as the first ten nucleotides from the 5' end of the miRNA to the 3' end of the miRNA and integrated various features including the number of consecutive matching bases in the seed region of 10 bases, a triplet feature in seed regions, thermodynamic energy, penalty of bulges and wobbles at binding sites, and the secondary structure of viral RNA for the prediction. Conclusions Compared to general predictive models, our model fully takes into account the conservation patterns and features of viral RNA secondary structures, and greatly improves the prediction accuracy. Our model identified some key miRNAs including hsa-miR-489, hsa-miR-325, hsa-miR-876-3p and hsa-miR-2117, which target HA, PB2, MP and NS of H1N1, respectively. Our study provided an interesting hypothesis concerning the miRNA-based antiviral defense mechanism against influenza virus in human, i.e., the binding between human miRNA and viral RNAs may not result in gene silencing but rather may block the viral RNA replication. PMID:24565017

  16. Immune Evasion Strategies during Chronic Hepatitis B and C Virus Infection

    PubMed Central

    Ortega-Prieto, Ana Maria; Dorner, Marcus

    2017-01-01

    Both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections are a major global healthcare problem with more than 240 million and 70 million infected, respectively. Both viruses persist within the liver and result in progressive liver disease, resulting in liver fibrosis, cirrhosis and hepatocellular carcinoma. Strikingly, this pathogenesis is largely driven by immune responses, unable to clear an established infection, rather than by the viral pathogens themselves. Even though disease progression is very similar in both infections, HBV and HCV have evolved distinct mechanisms, by which they ensure persistence within the host. Whereas HCV utilizes a cloak-and-dagger approach, disguising itself as a lipid-like particle and immediately crippling essential pattern-recognition pathways, HBV has long been considered a “stealth” virus, due to the complete absence of innate immune responses during infection. Recent developments and access to improved model systems, however, revealed that even though it is among the smallest human-tropic viruses, HBV may, in addition to evading host responses, employ subtle immune evasion mechanisms directed at ensuring viral persistence in the absence of host responses. In this review, we compare the different strategies of both viruses to ensure viral persistence by actively interfering with viral recognition and innate immune responses. PMID:28862649

  17. Recombinant egg drop syndrome subunit vaccine offers an alternative to virus propagation in duck eggs.

    PubMed

    Gutter, B; Fingerut, E; Gallili, G; Eliahu, D; Perelman, B; Finger, A; Pitcovski, J

    2008-02-01

    Egg drop syndrome (EDS) virus vaccines are routinely produced in embryonated duck eggs (Solyom et al., 1982). This procedure poses the risk of dissemination of pathogens, such as avian influenza virus, as the eggs used are not from specific pathogen free birds. To address this problem, the knob and part of the shaft domain of the fibre protein of the EDS virus (termed knob-s) were expressed in Escherichia coli and assessed as a subunit vaccine. A single vaccination with the recombinant protein induced the production of anti-EDS virus antibodies, as detected by haemagglutination inhibition, enzyme-linked immunosorbent assay and virus neutralization tests, for at least 20 weeks. A positive correlation was demonstrated between these three assays. A dose-response assessment showed that the vaccine was effective over the range of 2 to 64 microg protein per dose. Two vaccinations with the recombinant protein, administered before the onset of lay, induced high haemagglutination inhibition antibody titres, comparable with those induced by an inactivated whole-virus vaccine. The vaccine did not have any adverse effects on egg production, quality or weight. The present study has shown that two vaccinations with the recombinant knob-s protein elicited high neutralizing antibody titres that persisted for more than 50 weeks of lay.

  18. Development and application of unified algorithms for problems in computational science

    NASA Technical Reports Server (NTRS)

    Shankar, Vijaya; Chakravarthy, Sukumar

    1987-01-01

    A framework is presented for developing computationally unified numerical algorithms for solving nonlinear equations that arise in modeling various problems in mathematical physics. The concept of computational unification is an attempt to encompass efficient solution procedures for computing various nonlinear phenomena that may occur in a given problem. For example, in Computational Fluid Dynamics (CFD), a unified algorithm will be one that allows for solutions to subsonic (elliptic), transonic (mixed elliptic-hyperbolic), and supersonic (hyperbolic) flows for both steady and unsteady problems. The objectives are: development of superior unified algorithms emphasizing accuracy and efficiency aspects; development of codes based on selected algorithms leading to validation; application of mature codes to realistic problems; and extension/application of CFD-based algorithms to problems in other areas of mathematical physics. The ultimate objective is to achieve integration of multidisciplinary technologies to enhance synergism in the design process through computational simulation. Specific unified algorithms for a hierarchy of gas dynamics equations and their applications to two other areas: electromagnetic scattering, and laser-materials interaction accounting for melting.

  19. A hybrid computer program for rapidly solving flowing or static chemical kinetic problems involving many chemical species

    NASA Technical Reports Server (NTRS)

    Mclain, A. G.; Rao, C. S. R.

    1976-01-01

    A hybrid chemical kinetic computer program was assembled which provides a rapid solution to problems involving flowing or static, chemically reacting, gas mixtures. The computer program uses existing subroutines for problem setup, initialization, and preliminary calculations and incorporates a stiff ordinary differential equation solution technique. A number of check cases were recomputed with the hybrid program and the results were almost identical to those previously obtained. The computational time saving was demonstrated with a propane-oxygen-argon shock tube combustion problem involving 31 chemical species and 64 reactions. Information is presented to enable potential users to prepare an input data deck for the calculation of a problem.

  20. Classical problems in computational aero-acoustics

    NASA Technical Reports Server (NTRS)

    Hardin, Jay C.

    1996-01-01

    In relation to the expected problems in the development of computational aeroacoustics (CAA), the preliminary applications were to classical problems where the known analytical solutions could be used to validate the numerical results. Such comparisons were used to overcome the numerical problems inherent in these calculations. Comparisons were made between the various numerical approaches to the problems such as direct simulations, acoustic analogies and acoustic/viscous splitting techniques. The aim was to demonstrate the applicability of CAA as a tool in the same class as computational fluid dynamics. The scattering problems that occur are considered and simple sources are discussed.

  1. The study of virus structure and function: a personal history

    NASA Astrophysics Data System (ADS)

    Rossmann, Michael G.

    2014-09-01

    I describe my gradually evolving role as a scientist from my birth in Frankfurt (Germany) to my education in the UK, my post-doc years and my experiences as an independent investigator at Purdue University1. I discuss the significance of my post-doctoral work in Minnesota where I had my first encounter with an electronic computer and subsequently in Cambridge where I participated in the first structure determination of proteins. After six years back in England my family moved to Indiana (USA) where my home remains to this day. At Purdue University I first studied the structure of enzymes and in the process I discovered the organization and slow evolution of protein domains, each with a specific function. With this success I started what had been on my mind already for a long time, namely the structural analysis of viruses. Initially we studied plant viruses but then switched to small RNA animal viruses, discovering that some plant and animal RNA viruses have closely similar structures and therefore presumably had a common evolutionary origin. Next I became interested in somewhat larger viruses that had lipid membrane envelopes. In turn that has led to the study of very large dsDNA viruses as big as small bacteria as well as studies of bacterial viruses that require complex molecular motors for different parts of their life cycle. While developing crystallographic techniques for the study of viruses it has become progressively more apparent that electron microscopy is an important new tool that is likely to eclipse x-ray crystallography in the next decade.

  2. Electrolyte imbalance and sleep problems during anti-retroviral therapy: an under-recognized problem.

    PubMed

    Manzar, Md Dilshad; Sony, Peter; Salahuddin, Mohammed; Kumalo, Abera; Geneto, Mathewos; Pandi-Perumal, Seithikurippu R; Moscovitch, Adam; BaHammam, Ahmed S

    2017-01-01

    Human immunodeficiency virus (HIV) infection, and the anti-retroviral therapy (ART) associated complications necessitate that the medical care system keeps evolving for proper management of this group of patients. Electrolyte imbalance and sleep problems are common in patients on ART. Both of these conditions are associated with increased morbidity (such as acute kidney injury, chronic kidney disease, low CD4 count, non-adherence and depression) and mortality. Therefore, screening for both sleep problems and electrolytes imbalance may help to decrease the risk of complications in patients on ART.

  3. Electrolyte imbalance and sleep problems during anti-retroviral therapy: an under-recognized problem

    PubMed Central

    Manzar, Md Dilshad; Sony, Peter; Salahuddin, Mohammed; Kumalo, Abera; Geneto, Mathewos; Pandi-Perumal, Seithikurippu R; Moscovitch, Adam; BaHammam, Ahmed S

    2017-01-01

    Human immunodeficiency virus (HIV) infection, and the anti-retroviral therapy (ART) associated complications necessitate that the medical care system keeps evolving for proper management of this group of patients. Electrolyte imbalance and sleep problems are common in patients on ART. Both of these conditions are associated with increased morbidity (such as acute kidney injury, chronic kidney disease, low CD4 count, non-adherence and depression) and mortality. Therefore, screening for both sleep problems and electrolytes imbalance may help to decrease the risk of complications in patients on ART. PMID:28966741

  4. Laboratory preparedness in EU/EEA countries for detection of novel avian influenza A(H7N9) virus, May 2013

    PubMed Central

    Broberg, E; Pereyaslov, D; Struelens, M; Palm, D; Meijer, A; Ellis, J; Zambon, M; McCauley, J; Daniels, R

    2015-01-01

    Following human infections with novel avian influenza A(H7N9) viruses in China, the European Centre for Disease Prevention and Control, the World Health Organization (WHO) Regional Office for Europe and the European Reference Laboratory Network for Human Influenza (ERLI-Net) rapidly posted relevant information, including real-time RT-PCR protocols. An influenza RNA sequence-based computational assessment of detection capabilities for this virus was conducted in 32 national influenza reference laboratories in 29 countries, mostly WHO National Influenza Centres participating in the WHO Global Influenza Surveillance and Response System (GISRS). Twenty-seven countries considered their generic influenza A virus detection assay to be appropriate for the novel A(H7N9) viruses. Twenty-two countries reported having containment facilities suitable for its isolation and propagation. Laboratories in 27 countries had applied specific H7 real-time RT-PCR assays and 20 countries had N9 assays in place. Positive control virus RNA was provided by the WHO Collaborating Centre in London to 34 laboratories in 22 countries to allow evaluation of their assays. Performance of the generic influenza A virus detection and H7 and N9 subtyping assays was good in 24 laboratories in 19 countries. The survey showed that ERLI-Net laboratories had rapidly developed and verified good capability to detect the novel A(H7N9) influenza viruses. PMID:24507469

  5. Granulomatous herpes simplex encephalitis in an infant with multicystic encephalopathy: a distinct clinicopathologic entity?

    PubMed

    Schutz, Peter W; Fauth, Clarissa T; Al-Rawahi, Ghada N; Pugash, Denise; White, Valerie A; Stockler, Sylvia; Dunham, Christopher P

    2014-04-01

    Herpes simplex virus encephalitis can manifest as a range of clinical presentations including classic adult, neonatal, and biphasic chronic-granulomatous herpes encephalitis. We report an infant with granulomatous herpes simplex virus type 2 encephalitis with a subacute course and multicystic encephalopathy. A 2-month-old girl presented with lethargy and hypothermia. Computed tomography scan of the head showed multicystic encephalopathy and calcifications. Cerebrospinal fluid analysis by polymerase chain reaction testing for herpes simplex virus 1 and 2, enterovirus, and cytomegalovirus was negative. Normal cerebrospinal fluid interferon-α levels argued against Aicardi-Goutières syndrome. The patient died 2 weeks after presentation. At autopsy, multicystic encephalopathy was confirmed with bilateral gliosis, granulomatous inflammation with multinucleated giant cells, and calcifications. Bilateral healing necrotizing retinitis suggested a viral etiology, but retina and brain were free of viral inclusions and immunohistochemically negative for herpes simplex virus-2 and cytomegalovirus. However, polymerase chain reaction analysis showed herpes simplex virus-2 DNA in four cerebral paraffin blocks. Subsequent repeat testing of the initial cerebrospinal fluid sample using a different polymerase chain reaction assay was weakly positive for herpes simplex virus-2 DNA. Granulomatous herpes simplex virus encephalitis in infants can present with subacute course and result in multicystic encephalopathy with mineralization and minimal cerebrospinal fluid herpes simplex virus DNA load. Infectious etiologies should be carefully investigated in the differential diagnosis of multicystic encephalopathy with mineralization, in particular if multinucleated giant cells are present. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Arenaviruses. Genes, proteins, and expression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Oldstone, M.B.A.

    1987-01-01

    This book provides a discussion of current knowledge on Arenaviruses. These viruses are the cause of major health problems, such as Lassa fever and Junin virus disease, and have been the Rosetta stone on which many of the major concepts in viral pathogenesis and immunobiology have been built. For example, study of lymphocytic choriomeningitis naturally and experimentally induced infection in the normal mouse host presented the scientific community with the first and definitive work on the following topics: virus induced immune response disease, immunologic tolerance, virus induced immune complex disease, presence and generation of cytotoxic T cells in vitro andmore » in vivo, H-2 restriction and dual recognition phenomena, and viral disease induced by altering physiologic or differential functions of a cell without causing alterations of house keeping or vital functions, i.e. pathology in the absence of cell or tissue lysis.« less

  7. Hantavirus pulmonary syndrome, central plateau, southeastern, and southern Brazil.

    PubMed

    Figueiredo, Luiz T M; Moreli, Marcos L; de-Sousa, Ricardo L M; Borges, Alessandra A; de-Figueiredo, Glauciane G; Machado, Alex M; Bisordi, Ivani; Nagasse-Sugahara, Teresa K; Suzuki, Akemi; Pereira, Luiz E; de-Souza, Renato P; de-Souza, Luiza T M; Braconi, Carla T; Harsi, Charlotte M; de-Andrade-Zanotto, Paolo M

    2009-04-01

    Hantavirus pulmonary syndrome (HPS) is an increasing health problem in Brazil because of encroachment of sprawling urban, agricultural, and cattle-raising areas into habitats of subfamily Sigmodontinae rodents, which serve as hantavirus reservoirs. From 1993 through June 2007, a total of 884 cases of HPS were reported in Brazil (case-fatality rate 39%). To better understand this emerging disease, we collected 89 human serum samples and 68 rodent lung samples containing antibodies to hantavirus from a 2,500-km-wide area in Brazil. RNA was isolated from human samples and rodent tissues and subjected to reverse transcription-PCR. Partial sequences of nucleocapsid protein and glycoprotein genes from 22 human and 16 rodent sources indicated only Araraquara virus and Juquitiba virus lineages. The case-fatality rate of HPS was higher in the area with Araraquara virus. This virus, which may be the most virulent hantavirus in Brazil, was associated with areas that have had greater anthropogenic changes.

  8. History of Mosquitoborne Diseases in the United States and Implications for New Pathogens.

    PubMed

    Moreno-Madriñán, Max J; Turell, Michael

    2018-05-01

    The introduction and spread of West Nile virus and the recent introduction of chikungunya and Zika viruses into the Americas have raised concern about the potential for various tropical pathogens to become established in North America. A historical analysis of yellow fever and malaria incidences in the United States suggests that it is not merely a temperate climate that keeps these pathogens from becoming established. Instead, socioeconomic changes are the most likely explanation for why these pathogens essentially disappeared from the United States yet remain a problem in tropical areas. In contrast to these anthroponotic pathogens that require humans in their transmission cycle, zoonotic pathogens are only slightly affected by socioeconomic factors, which is why West Nile virus became established in North America. In light of increasing globalization, we need to be concerned about the introduction of pathogens such as Rift Valley fever, Japanese encephalitis, and Venezuelan equine encephalitis viruses.

  9. Animal models for some important RNA viruses of public health concern in SEARO countries: viral hemorrhagic fever.

    PubMed

    Badole, Sachin L; Yadav, Pragya D; Patil, Dilip R; Mourya, Devendra T

    2015-03-01

    Viral hemorrhagic fevers (VHFs) are major public health problems in the South-East Asia Regional (SEAR) countries. VHFs are a group of illnesses; that are caused by four families of viruses, viz. Arenaviridae, Bunyaviridae, Filoviridae and Flaviviridae. All VHFs have common features: they affect several organs and damage the blood vessels. These symptoms are often accompanied by hemorrhage. To understand pathogenesis, genetic and environmental influence that increase the risk of VHFs, efficacy and safety studies on candidate vaccines and testing of various therapeutic agents, appropriate animal models are essential tools in public and animals health. In the current review, the suitable animal models for Flavivirus [Dengue hemorhagic fever (DHF), Kyasanur forest disease (KFD)]; Bunyavirus [Crimean-Congo hemorrhagic fever (CCHF), Hantavirus fever (HF)]; and Paramyxovirus [Nipah virus fever (NiV)] have been reviewed with specific emphasis on emerging and reemerging viruses in SEAR countries.

  10. Prevalence of hepatitis A virus, hepatitis B virus, hepatitis C virus, hepatitis D virus and hepatitis E virus as causes of acute viral hepatitis in North India: a hospital based study.

    PubMed

    Jain, P; Prakash, S; Gupta, S; Singh, K P; Shrivastava, S; Singh, D D; Singh, J; Jain, A

    2013-01-01

    Acute viral hepatitis (AVH) is a major public health problem and is an important cause of morbidity and mortality. The aim of the present study is to determine the prevalence of hepatitis A virus (HAV), hepatitis B virus (HBV), hepatitis C virus (HCV), hepatitis D virus (HDV) and hepatitis E virus (HEV) as causes of AVH in a tertiary care hospital of North India. Blood samples and clinical information was collected from cases of AVH referred to the Grade I viral diagnostic laboratory over a 1-year period. Samples were tested for hepatitis B surface antigen, anti-HCV total antibodies, anti-HAV immunoglobulin M (IgM) and anti-HEV IgM by the enzyme-linked immunosorbent assay. PCR for nucleic acid detection of HBV and HCV was also carried out. Those positive for HBV infection were tested for anti-HDV antibodies. Fisher's exact test was used and a P < 0.05 was considered to be statistically significant. Of the 267 viral hepatitis cases, 62 (23.22%) patients presented as acute hepatic failure. HAV (26.96%) was identified as the most common cause of acute hepatitis followed by HEV (17.97%), HBV (16.10%) and HCV (11.98%). Co-infections with more than one virus were present in 34 cases; HAV-HEV co-infection being the most common. HEV was the most important cause of acute hepatic failure followed by co-infection with HAV and HEV. An indication towards epidemiological shift of HAV infection from children to adults with a rise in HAV prevalence was seen. To the best of our knowledge, this is the first report indicating epidemiological shift of HAV in Uttar Pradesh.

  11. Computing Evans functions numerically via boundary-value problems

    NASA Astrophysics Data System (ADS)

    Barker, Blake; Nguyen, Rose; Sandstede, Björn; Ventura, Nathaniel; Wahl, Colin

    2018-03-01

    The Evans function has been used extensively to study spectral stability of travelling-wave solutions in spatially extended partial differential equations. To compute Evans functions numerically, several shooting methods have been developed. In this paper, an alternative scheme for the numerical computation of Evans functions is presented that relies on an appropriate boundary-value problem formulation. Convergence of the algorithm is proved, and several examples, including the computation of eigenvalues for a multi-dimensional problem, are given. The main advantage of the scheme proposed here compared with earlier methods is that the scheme is linear and scalable to large problems.

  12. Computer-Guided Approach to Access the Anti-influenza Activity of Licorice Constituents

    PubMed Central

    2013-01-01

    Neuraminidase (NA), a key enzyme in viral replication, is the first-line drug target to combat influenza. On the basis of a shape-focused virtual screening, the roots of Glycyrrhiza glabra (licorice) were identified as plant species with an accumulation of constituents that show 3D similarities to known influenza NA inhibitors (NAIs). Phytochemical investigation revealed 12 constituents identified as (E)-1-[2,4-dihydroxy-3-(3-methyl-2-butenyl)phenyl]-3-(8-hydroxy-2,2-dimethyl-2H-1-benzopyran-6-yl)-2-propen-1-one (1), 3,4-dihydro-8,8-dimethyl-2H,8H-benzo[1,2-b:3,4-b′]dipyran-3-ol (2), biochanin B (3), glabrol (4), glabrone (5), hispaglabridin B (6), licoflavone B (7), licorice glycoside B (8), licorice glycoside E (9), liquiritigenin (10), liquiritin (11), and prunin (12). Eleven of these constituents showed significant influenza virus NA inhibition in a chemiluminescence (CL)-based assay. Additional tests, including (i) a cell-based cytopathic effect inhibition assay (general antiviral activity), (ii) the evaluation of cytotoxicity, (iii) the inhibition of the NA of Clostridium perfringens (CL- and fluorescence (FL)-based assay), and (iv) the determination of self-fluorescence and quenching, provided further perspective on their anti-influenza virus potential, revealing possible assay interference problems and false-positive results. Compounds 1, 3, 5, and 6 showed antiviral activity, most likely caused by the inhibition of NA. Of these, compounds 1, 3, and 6 were highly ranked in shape-focused virtual screening. PMID:24313801

  13. Glycosylation of dengue virus glycoproteins and their interactions with carbohydrate receptors: possible targets for antiviral therapy.

    PubMed

    Idris, Fakhriedzwan; Muharram, Siti Hanna; Diah, Suwarni

    2016-07-01

    Dengue virus, an RNA virus belonging to the genus Flavivirus, affects 50 million individuals annually, and approximately 500,000-1,000,000 of these infections lead to dengue hemorrhagic fever or dengue shock syndrome. With no licensed vaccine or specific antiviral treatments available to prevent dengue infection, dengue is considered a major public health problem in subtropical and tropical regions. The virus, like other enveloped viruses, uses the host's cellular enzymes to synthesize its structural (C, E, and prM/M) and nonstructural proteins (NS1-5) and, subsequently, to glycosylate these proteins to produce complete and functional glycoproteins. The structural glycoproteins, specifically the E protein, are known to interact with the host's carbohydrate receptors through the viral proteins' N-glycosylation sites and thus mediate the viral invasion of cells. This review focuses on the involvement of dengue glycoproteins in the course of infection and the virus' exploitation of the host's glycans, especially the interactions between host receptors and carbohydrate moieties. We also discuss the recent developments in antiviral therapies that target these processes and interactions, focusing specifically on the use of carbohydrate-binding agents derived from plants, commonly known as lectins, to inhibit the progression of infection.

  14. Interarrival times of message propagation on directed networks.

    PubMed

    Mihaljev, Tamara; de Arcangelis, Lucilla; Herrmann, Hans J

    2011-08-01

    One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the interarrival time distribution between successive walkers arriving at a target. We show that the temporal organization of this process, which models information propagation on unstructured peer to peer networks, has the same features as SPAM reaching a single user. We study the behavior of the message interarrival time distribution on three different network topologies using two different rules for sending messages. In all networks the propagation is not a pure Poisson process. It shows universal features on Poissonian networks and a more complex behavior on scale free networks. Results open the possibility to indirectly learn about the process of sending messages on networks with unknown topologies, by studying interarrival times at any node of the network.

  15. Interarrival times of message propagation on directed networks

    NASA Astrophysics Data System (ADS)

    Mihaljev, Tamara; de Arcangelis, Lucilla; Herrmann, Hans J.

    2011-08-01

    One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the interarrival time distribution between successive walkers arriving at a target. We show that the temporal organization of this process, which models information propagation on unstructured peer to peer networks, has the same features as SPAM reaching a single user. We study the behavior of the message interarrival time distribution on three different network topologies using two different rules for sending messages. In all networks the propagation is not a pure Poisson process. It shows universal features on Poissonian networks and a more complex behavior on scale free networks. Results open the possibility to indirectly learn about the process of sending messages on networks with unknown topologies, by studying interarrival times at any node of the network.

  16. Discovering Deeply Divergent RNA Viruses in Existing Metatranscriptome Data with Machine Learning

    NASA Astrophysics Data System (ADS)

    Rivers, A. R.

    2016-02-01

    Most sampling of RNA viruses and phages has been directed toward a narrow range of hosts and environments. Several marine metagenomic studies have examined the RNA viral fraction in aquatic samples and found a number of picornaviruses and uncharacterized sequences. The lack of homology to known protein families has limited the discovery of new RNA viruses. We developed a computational method for identifying RNA viruses that relies on information in the codon transition probabilities of viral sequences to train a classifier. This approach does not rely on homology, but it has higher information content than other reference-free methods such as tetranucleotide frequency. Training and validation with RefSeq data gave true positive and true negative rates of 99.6% and 99.5% on the highly imbalanced validation sets (0.2% viruses) that, like the metatranscriptomes themselves, contain mostly non-viral sequences. To further test the method, a validation dataset of putative RNA virus genomes were identified in metatransciptomes by the presence of RNA dependent RNA polymerase, an essential gene for RNA viruses. The classifier successfully identified 99.4% of those contigs as viral. This approach is currently being extended to screen all metatranscriptome data sequenced at the DOE Joint Genome Institute, presently 4.5 Gb of assembled data from 504 public projects representing a wide range of marine, aquatic and terrestrial environments.

  17. Elucidating Reaction Mechanisms on Quantum Computers

    NASA Astrophysics Data System (ADS)

    Wiebe, Nathan; Reiher, Markus; Svore, Krysta; Wecker, Dave; Troyer, Matthias

    We show how a quantum computer can be employed to elucidate reaction mechanisms in complex chemical systems, using the open problem of biological nitrogen fixation in nitrogenase as an example. We discuss how quantum computers can augment classical-computer simulations for such problems, to significantly increase their accuracy and enable hitherto intractable simulations. Detailed resource estimates show that, even when taking into account the substantial overhead of quantum error correction, and the need to compile into discrete gate sets, the necessary computations can be performed in reasonable time on small quantum computers. This demonstrates that quantum computers will realistically be able to tackle important problems in chemistry that are both scientifically and economically significant.

  18. Digitized adiabatic quantum computing with a superconducting circuit.

    PubMed

    Barends, R; Shabani, A; Lamata, L; Kelly, J; Mezzacapo, A; Las Heras, U; Babbush, R; Fowler, A G; Campbell, B; Chen, Yu; Chen, Z; Chiaro, B; Dunsworth, A; Jeffrey, E; Lucero, E; Megrant, A; Mutus, J Y; Neeley, M; Neill, C; O'Malley, P J J; Quintana, C; Roushan, P; Sank, D; Vainsencher, A; Wenner, J; White, T C; Solano, E; Neven, H; Martinis, John M

    2016-06-09

    Quantum mechanics can help to solve complex problems in physics and chemistry, provided they can be programmed in a physical device. In adiabatic quantum computing, a system is slowly evolved from the ground state of a simple initial Hamiltonian to a final Hamiltonian that encodes a computational problem. The appeal of this approach lies in the combination of simplicity and generality; in principle, any problem can be encoded. In practice, applications are restricted by limited connectivity, available interactions and noise. A complementary approach is digital quantum computing, which enables the construction of arbitrary interactions and is compatible with error correction, but uses quantum circuit algorithms that are problem-specific. Here we combine the advantages of both approaches by implementing digitized adiabatic quantum computing in a superconducting system. We tomographically probe the system during the digitized evolution and explore the scaling of errors with system size. We then let the full system find the solution to random instances of the one-dimensional Ising problem as well as problem Hamiltonians that involve more complex interactions. This digital quantum simulation of the adiabatic algorithm consists of up to nine qubits and up to 1,000 quantum logic gates. The demonstration of digitized adiabatic quantum computing in the solid state opens a path to synthesizing long-range correlations and solving complex computational problems. When combined with fault-tolerance, our approach becomes a general-purpose algorithm that is scalable.

  19. Antibiotic Resistance

    MedlinePlus

    ... lives. But there is a growing problem of antibiotic resistance. It happens when bacteria change and become able ... resistant to several common antibiotics. To help prevent antibiotic resistance Don't use antibiotics for viruses like colds ...

  20. Parallel Computation of Unsteady Flows on a Network of Workstations

    NASA Technical Reports Server (NTRS)

    1997-01-01

    Parallel computation of unsteady flows requires significant computational resources. The utilization of a network of workstations seems an efficient solution to the problem where large problems can be treated at a reasonable cost. This approach requires the solution of several problems: 1) the partitioning and distribution of the problem over a network of workstation, 2) efficient communication tools, 3) managing the system efficiently for a given problem. Of course, there is the question of the efficiency of any given numerical algorithm to such a computing system. NPARC code was chosen as a sample for the application. For the explicit version of the NPARC code both two- and three-dimensional problems were studied. Again both steady and unsteady problems were investigated. The issues studied as a part of the research program were: 1) how to distribute the data between the workstations, 2) how to compute and how to communicate at each node efficiently, 3) how to balance the load distribution. In the following, a summary of these activities is presented. Details of the work have been presented and published as referenced.

  1. On a fundamental problem in radiation biology

    NASA Technical Reports Server (NTRS)

    Dugan, V.; Trujillo, R.

    1974-01-01

    Experimental evidence indicates that the radiation dose required to reduce a surviving population to a certain fraction of its original population is lower for vertebrate cells than for viruses. On the other hand, the number of ionizations per cell required to inactivate that cell is greater for vertebrate cells than for viruses. The apparent conflict between these two findings is investigated. It is found that the apparent contradiction is probably a result of the fractional power dependence of the radiation-dose value on the nucleic acid weight.

  2. Quantum Heterogeneous Computing for Satellite Positioning Optimization

    NASA Astrophysics Data System (ADS)

    Bass, G.; Kumar, V.; Dulny, J., III

    2016-12-01

    Hard optimization problems occur in many fields of academic study and practical situations. We present results in which quantum heterogeneous computing is used to solve a real-world optimization problem: satellite positioning. Optimization problems like this can scale very rapidly with problem size, and become unsolvable with traditional brute-force methods. Typically, such problems have been approximately solved with heuristic approaches; however, these methods can take a long time to calculate and are not guaranteed to find optimal solutions. Quantum computing offers the possibility of producing significant speed-up and improved solution quality. There are now commercially available quantum annealing (QA) devices that are designed to solve difficult optimization problems. These devices have 1000+ quantum bits, but they have significant hardware size and connectivity limitations. We present a novel heterogeneous computing stack that combines QA and classical machine learning and allows the use of QA on problems larger than the quantum hardware could solve in isolation. We begin by analyzing the satellite positioning problem with a heuristic solver, the genetic algorithm. The classical computer's comparatively large available memory can explore the full problem space and converge to a solution relatively close to the true optimum. The QA device can then evolve directly to the optimal solution within this more limited space. Preliminary experiments, using the Quantum Monte Carlo (QMC) algorithm to simulate QA hardware, have produced promising results. Working with problem instances with known global minima, we find a solution within 8% in a matter of seconds, and within 5% in a few minutes. Future studies include replacing QMC with commercially available quantum hardware and exploring more problem sets and model parameters. Our results have important implications for how heterogeneous quantum computing can be used to solve difficult optimization problems in any field.

  3. Enhancing Digital Fluency through a Training Program for Creative Problem Solving Using Computer Programming

    ERIC Educational Resources Information Center

    Kim, SugHee; Chung, KwangSik; Yu, HeonChang

    2013-01-01

    The purpose of this paper is to propose a training program for creative problem solving based on computer programming. The proposed program will encourage students to solve real-life problems through a creative thinking spiral related to cognitive skills with computer programming. With the goal of enhancing digital fluency through this proposed…

  4. Developing Student Programming and Problem-Solving Skills with Visual Basic

    ERIC Educational Resources Information Center

    Siegle, Del

    2009-01-01

    Although most computer users will never need to write a computer program, many students enjoy the challenge of creating one. Computer programming enhances students' problem solving by forcing students to break a problem into its component pieces and reassemble it in a generic format that can be understood by a nonsentient entity. It promotes…

  5. Primary central nervous system lymphoma in an human immunodeficiency virus-infected patient mimicking bilateral eye sign in brain seen in fluorine-18 fluorodeoxyglucose-positron emission tomography/computed tomography.

    PubMed

    Kamaleshwaran, Koramadai Karuppusany; Thirugnanam, Rajasekar; Shibu, Deepu; Kalarikal, Radhakrishnan Edathurthy; Shinto, Ajit Sugunan

    2014-04-01

    Fluorodeoxyglucose-positron emission tomography/computed tomography (FDG PET/CT) has proven useful in the diagnosis, staging, and detection of metastasis and posttreatment monitoring of several malignancies in human immunodeficiency virus (HIV)-infected patients. It also has the ability to make the important distinction between malignancy and infection in the evaluation of central nervous system (CNS) lesions, leading to the initiation of the appropriate treatment and precluding the need for invasive biopsy. We report an interesting case of HIV positive 35-year-old woman presented with headache, disorientation, and decreased level of consciousness. She underwent whole body PET/CT which showed multiple lesions in the cerebrum which mimics bilateral eye in brain. A diagnosis of a primary CNS lymphoma was made and patient was started on chemotherapy.

  6. Towards multiscale modeling of influenza infection

    PubMed Central

    Murillo, Lisa N.; Murillo, Michael S.; Perelson, Alan S.

    2013-01-01

    Aided by recent advances in computational power, algorithms, and higher fidelity data, increasingly detailed theoretical models of infection with influenza A virus are being developed. We review single scale models as they describe influenza infection from intracellular to global scales, and, in particular, we consider those models that capture details specific to influenza and can be used to link different scales. We discuss the few multiscale models of influenza infection that have been developed in this emerging field. In addition to discussing modeling approaches, we also survey biological data on influenza infection and transmission that is relevant for constructing influenza infection models. We envision that, in the future, multiscale models that capitalize on technical advances in experimental biology and high performance computing could be used to describe the large spatial scale epidemiology of influenza infection, evolution of the virus, and transmission between hosts more accurately. PMID:23608630

  7. Computational biology approach to uncover hepatitis C virus helicase operation.

    PubMed

    Flechsig, Holger

    2014-04-07

    Hepatitis C virus (HCV) helicase is a molecular motor that splits nucleic acid duplex structures during viral replication, therefore representing a promising target for antiviral treatment. Hence, a detailed understanding of the mechanism by which it operates would facilitate the development of efficient drug-assisted therapies aiming to inhibit helicase activity. Despite extensive investigations performed in the past, a thorough understanding of the activity of this important protein was lacking since the underlying internal conformational motions could not be resolved. Here we review investigations that have been previously performed by us for HCV helicase. Using methods of structure-based computational modelling it became possible to follow entire operation cycles of this motor protein in structurally resolved simulations and uncover the mechanism by which it moves along the nucleic acid and accomplishes strand separation. We also discuss observations from that study in the light of recent experimental studies that confirm our findings.

  8. On the generalized VIP time integral methodology for transient thermal problems

    NASA Technical Reports Server (NTRS)

    Mei, Youping; Chen, Xiaoqin; Tamma, Kumar K.; Sha, Desong

    1993-01-01

    The paper describes the development and applicability of a generalized VIrtual-Pulse (VIP) time integral method of computation for thermal problems. Unlike past approaches for general heat transfer computations, and with the advent of high speed computing technology and the importance of parallel computations for efficient use of computing environments, a major motivation via the developments described in this paper is the need for developing explicit computational procedures with improved accuracy and stability characteristics. As a consequence, a new and effective VIP methodology is described which inherits these improved characteristics. Numerical illustrative examples are provided to demonstrate the developments and validate the results obtained for thermal problems.

  9. A cross-disciplinary introduction to quantum annealing-based algorithms

    NASA Astrophysics Data System (ADS)

    Venegas-Andraca, Salvador E.; Cruz-Santos, William; McGeoch, Catherine; Lanzagorta, Marco

    2018-04-01

    A central goal in quantum computing is the development of quantum hardware and quantum algorithms in order to analyse challenging scientific and engineering problems. Research in quantum computation involves contributions from both physics and computer science; hence this article presents a concise introduction to basic concepts from both fields that are used in annealing-based quantum computation, an alternative to the more familiar quantum gate model. We introduce some concepts from computer science required to define difficult computational problems and to realise the potential relevance of quantum algorithms to find novel solutions to those problems. We introduce the structure of quantum annealing-based algorithms as well as two examples of this kind of algorithms for solving instances of the max-SAT and Minimum Multicut problems. An overview of the quantum annealing systems manufactured by D-Wave Systems is also presented.

  10. Problem Solving and Computational Skill: Are They Shared or Distinct Aspects of Mathematical Cognition?

    PubMed Central

    Fuchs, Lynn S.; Fuchs, Douglas; Hamlett, Carol L.; Lambert, Warren; Stuebing, Karla; Fletcher, Jack M.

    2009-01-01

    The purpose of this study was to explore patterns of difficulty in 2 domains of mathematical cognition: computation and problem solving. Third graders (n = 924; 47.3% male) were representatively sampled from 89 classrooms; assessed on computation and problem solving; classified as having difficulty with computation, problem solving, both domains, or neither domain; and measured on 9 cognitive dimensions. Difficulty occurred across domains with the same prevalence as difficulty with a single domain; specific difficulty was distributed similarly across domains. Multivariate profile analysis on cognitive dimensions and chi-square tests on demographics showed that specific computational difficulty was associated with strength in language and weaknesses in attentive behavior and processing speed; problem-solving difficulty was associated with deficient language as well as race and poverty. Implications for understanding mathematics competence and for the identification and treatment of mathematics difficulties are discussed. PMID:20057912

  11. Performance analysis of parallel branch and bound search with the hypercube architecture

    NASA Technical Reports Server (NTRS)

    Mraz, Richard T.

    1987-01-01

    With the availability of commercial parallel computers, researchers are examining new classes of problems which might benefit from parallel computing. This paper presents results of an investigation of the class of search intensive problems. The specific problem discussed is the Least-Cost Branch and Bound search method of deadline job scheduling. The object-oriented design methodology was used to map the problem into a parallel solution. While the initial design was good for a prototype, the best performance resulted from fine-tuning the algorithm for a specific computer. The experiments analyze the computation time, the speed up over a VAX 11/785, and the load balance of the problem when using loosely coupled multiprocessor system based on the hypercube architecture.

  12. Structural Transitions and Energy Landscape for Cowpea Chlorotic Mottle Virus Capsid Mechanics from Nanomanipulation in Vitro and in Silico

    NASA Astrophysics Data System (ADS)

    Kononova, Olga; Snijder, Joost; Brasch, Melanie; Cornelissen, Jeroen; Dima, Ruxandra I.; Marx, Kenneth A.; Wuite, Gijs J. L.; Roos, Wouter H.; Barsegov, Valeri

    2013-10-01

    Physical properties of capsids of plant and animal viruses are important factors in capsid self-assembly, survival of viruses in the extracellular environment, and their cell infectivity. Virus shells can have applications as nanocontainers and delivery vehicles in biotechnology and medicine. Combined AFM experiments and computational modeling on sub-second timescales of the indentation nanomechanics of Cowpea Chlorotic Mottle Virus (CCMV) capsid show that the capsid's physical properties are dynamic and local characteristics of the structure, which depend on the magnitude and geometry of mechanical input. Surprisingly, under large deformations the CCMV capsid transitions to the collapsed state without substantial local structural alterations. The enthalpy change in this deformation state dH = 11.5 - 12.8 MJ/mol is mostly due to large-amplitude out-of-plane excitations, which contribute to the capsid bending, and the entropy change TdS = 5.1 - 5.8 MJ/mol is mostly due to coherent in-plane rearrangements of protein chains, which result in the capsid stiffening. Dynamic coupling of these modes defines the extent of elasticity and reversibility of capsid mechanical deformation. This emerging picture illuminates how unique physico-chemical properties of protein nanoshells help define their structure and morphology, and determine their viruses' biological function.

  13. Stomachaches (For Teens)

    MedlinePlus

    ... When bacteria or viruses get into a person's digestive system, the body reacts by trying to rid itself ... small amount could be deadly. Reproductive Problems The digestive system isn't the only cause of bellyaches. Menstrual ...

  14. Beyond input-output computings: error-driven emergence with parallel non-distributed slime mold computer.

    PubMed

    Aono, Masashi; Gunji, Yukio-Pegio

    2003-10-01

    The emergence derived from errors is the key importance for both novel computing and novel usage of the computer. In this paper, we propose an implementable experimental plan for the biological computing so as to elicit the emergent property of complex systems. An individual plasmodium of the true slime mold Physarum polycephalum acts in the slime mold computer. Modifying the Elementary Cellular Automaton as it entails the global synchronization problem upon the parallel computing provides the NP-complete problem solved by the slime mold computer. The possibility to solve the problem by giving neither all possible results nor explicit prescription of solution-seeking is discussed. In slime mold computing, the distributivity in the local computing logic can change dynamically, and its parallel non-distributed computing cannot be reduced into the spatial addition of multiple serial computings. The computing system based on exhaustive absence of the super-system may produce, something more than filling the vacancy.

  15. Transfusion-transmissible viral infections among blood donors at the North Gondar district blood bank, northwest Ethiopia: A three year retrospective study.

    PubMed

    Biadgo, Belete; Shiferaw, Elias; Woldu, Berhanu; Alene, Kefyalew Addis; Melku, Mulugeta

    2017-01-01

    Transfusion-transmissible viral infections, such as hepatitis C virus (HCV), hepatitis B virus (HBV), and human immunodeficiency virus (HIV), remain a major public health problem in developing countries. The prevalence of these viral infections among blood donors may reflect the burden of these diseases among populations. Therefore, the aim of this study was to assess the sero-prevalence of transfusion-transmissible viral infections among blood donors. A retrospective study was conducted using data obtained from registration books of blood donors from the Ethiopian North Gondar District Blood Bank from 2010 to 2012. Descriptive statistics, such as percentages, medians and interquartile ranges were computed. A binary logistic regression model was fitted to identify factors associated with each viral infection. The odds ratio with a 99% confidence interval was calculated. A p-value < 0.01 was considered statistically significant. A total of 6,471 blood donors were included in the study. Of these, 5,311 (82.1%) were male, and 382 (5.9%) were voluntary blood donors. Overall, 424 (6.55%) of the blood donors were sero-reactive for at least one transfusion-transmissible viral infection. Of all study participants, 233 (3.6%) were sero-reactive for HBV, 145 (2.24%) were sero-reactive for HIV, and 51 (0.8%) were sero-reactive for HCV. Four (0.062%) of the study's participants were co-infected: 3 (75%) with HBV-HCV and 1 (25%) with HIV-HBV-HCV. Being a farmer, unemployed or employed donor was significantly associated with transfusion-transmissible viral infections compared to being a student donor. The prevalence of transfusion-transmissible viral infections is substantial and has increased overtime. Hence, it demands more vigilance in routine screening of donated blood prior to transfusion. Further community-based studies to identify societal risk factors are necessary.

  16. Computer Programming: A Medium for Teaching Problem Solving.

    ERIC Educational Resources Information Center

    Casey, Patrick J.

    1997-01-01

    Argues that including computer programming in the curriculum as a medium for instruction is a feasible alternative for teaching problem solving. Discusses the nature of problem solving; the problem-solving elements of discovery, motivation, practical learning situations and flexibility which are inherent in programming; capabilities of computer…

  17. Technical Development and Application of Soft Computing in Agricultural and Biological Engineering

    USDA-ARS?s Scientific Manuscript database

    Soft computing is a set of “inexact” computing techniques, which are able to model and analyze very complex problems. For these complex problems, more conventional methods have not been able to produce cost-effective, analytical, or complete solutions. Soft computing has been extensively studied and...

  18. Development of Soft Computing and Applications in Agricultural and Biological Engineering

    USDA-ARS?s Scientific Manuscript database

    Soft computing is a set of “inexact” computing techniques, which are able to model and analyze very complex problems. For these complex problems, more conventional methods have not been able to produce cost-effective, analytical, or complete solutions. Soft computing has been extensively studied and...

  19. Use of Computer-Based Case Studies in a Problem-Solving Curriculum.

    ERIC Educational Resources Information Center

    Haworth, Ian S.; And Others

    1997-01-01

    Describes the use of three case studies, on computer, to enhance problem solving and critical thinking among doctoral pharmacy students in a physical chemistry course. Students are expected to use specific computer programs, spreadsheets, electronic mail, molecular graphics, word processing, online literature searching, and other computer-based…

  20. Apocalypse Soon? The Bug.

    ERIC Educational Resources Information Center

    Clyde, Anne

    1999-01-01

    Discussion of the Year 2000 (Y2K) problem, the computer-code problem that affects computer programs or computer chips, focuses on the impact on teacher-librarians. Topics include automated library systems, access to online information services, library computers and software, and other electronic equipment such as photocopiers and fax machines.…

  1. On Evaluating Human Problem Solving of Computationally Hard Problems

    ERIC Educational Resources Information Center

    Carruthers, Sarah; Stege, Ulrike

    2013-01-01

    This article is concerned with how computer science, and more exactly computational complexity theory, can inform cognitive science. In particular, we suggest factors to be taken into account when investigating how people deal with computational hardness. This discussion will address the two upper levels of Marr's Level Theory: the computational…

  2. Evolution and Vaccination of Influenza Virus.

    PubMed

    Lam, Ham Ching; Bi, Xuan; Sreevatsan, Srinand; Boley, Daniel

    2017-08-01

    In this study, we present an application paradigm in which an unsupervised machine learning approach is applied to the high-dimensional influenza genetic sequences to investigate whether vaccine is a driving force to the evolution of influenza virus. We first used a visualization approach to visualize the evolutionary paths of vaccine-controlled and non-vaccine-controlled influenza viruses in a low-dimensional space. We then quantified the evolutionary differences between their evolutionary trajectories through the use of within- and between-scatter matrices computation to provide the statistical confidence to support the visualization results. We used the influenza surface Hemagglutinin (HA) gene for this study as the HA gene is the major target of the immune system. The visualization is achieved without using any clustering methods or prior information about the influenza sequences. Our results clearly showed that the evolutionary trajectories between vaccine-controlled and non-vaccine-controlled influenza viruses are different and vaccine as an evolution driving force cannot be completely eliminated.

  3. Spin models inferred from patient-derived viral sequence data faithfully describe HIV fitness landscapes

    NASA Astrophysics Data System (ADS)

    Shekhar, Karthik; Ruberman, Claire F.; Ferguson, Andrew L.; Barton, John P.; Kardar, Mehran; Chakraborty, Arup K.

    2013-12-01

    Mutational escape from vaccine-induced immune responses has thwarted the development of a successful vaccine against AIDS, whose causative agent is HIV, a highly mutable virus. Knowing the virus' fitness as a function of its proteomic sequence can enable rational design of potent vaccines, as this information can focus vaccine-induced immune responses to target mutational vulnerabilities of the virus. Spin models have been proposed as a means to infer intrinsic fitness landscapes of HIV proteins from patient-derived viral protein sequences. These sequences are the product of nonequilibrium viral evolution driven by patient-specific immune responses and are subject to phylogenetic constraints. How can such sequence data allow inference of intrinsic fitness landscapes? We combined computer simulations and variational theory á la Feynman to show that, in most circumstances, spin models inferred from patient-derived viral sequences reflect the correct rank order of the fitness of mutant viral strains. Our findings are relevant for diverse viruses.

  4. DAMPs and influenza virus infection in ageing.

    PubMed

    Samy, Ramar Perumal; Lim, Lina H K

    2015-11-01

    Influenza A virus (IAV) is a serious global health problem worldwide due to frequent and severe outbreaks. IAV causes significant morbidity and mortality in the elderly population, due to the ineffectiveness of the vaccine and the alteration of T cell immunity with ageing. The cellular and molecular link between ageing and virus infection is unclear and it is possible that damage associated molecular patterns (DAMPs) may play a role in the raised severity and susceptibility of virus infections in the elderly. DAMPs which are released from damaged cells following activation, injury or cell death can activate the immune response through the stimulation of the inflammasome through several types of receptors found on the plasma membrane, inside endosomes after endocytosis as well as in the cytosol. In this review, the detriment in the immune system during ageing and the links between influenza virus infection and ageing will be discussed. In addition, the role of DAMPs such as HMGB1 and S100/Annexin in ageing, and the enhanced morbidity and mortality to severe influenza infection in ageing will be highlighted. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Novel Strategy to Evaluate Infectious Salmon Anemia Virus Variants by High Resolution Melting

    PubMed Central

    Sepúlveda, Dagoberto; Cárdenas, Constanza; Carmona, Marisela; Marshall, Sergio H.

    2012-01-01

    Genetic variability is a key problem in the prevention and therapy of RNA-based virus infections. Infectious Salmon Anemia virus (ISAv) is an RNA virus which aggressively attacks salmon producing farms worldwide and in particular in Chile. Just as with most of the Orthomyxovirus, ISAv displays high variability in its genome which is reflected by a wider infection potential, thus hampering management and prevention of the disease. Although a number of widely validated detection procedures exist, in this case there is a need of a more complex approach to the characterization of virus variability. We have adapted a procedure of High Resolution Melting (HRM) as a fine-tuning technique to fully differentiate viral variants detected in Chile and projected to other infective variants reported elsewhere. Out of the eight viral coding segments, the technique was adapted using natural Chilean variants for two of them, namely segments 5 and 6, recognized as virulence-associated factors. Our work demonstrates the versatility of the technique as well as its superior resolution capacity compared with standard techniques currently in use as key diagnostic tools. PMID:22719837

  6. New vaccines against influenza virus

    PubMed Central

    Lee, Young-Tae; Kim, Ki-Hye; Ko, Eun-Ju; Lee, Yu-Na; Kim, Min-Chul; Kwon, Young-Man; Tang, Yinghua; Cho, Min-Kyoung; Lee, Youn-Jeong

    2014-01-01

    Vaccination is one of the most effective and cost-benefit interventions that prevent the mortality and reduce morbidity from infectious pathogens. However, the licensed influenza vaccine induces strain-specific immunity and must be updated annually based on predicted strains that will circulate in the upcoming season. Influenza virus still causes significant health problems worldwide due to the low vaccine efficacy from unexpected outbreaks of next epidemic strains or the emergence of pandemic viruses. Current influenza vaccines are based on immunity to the hemagglutinin antigen that is highly variable among different influenza viruses circulating in humans and animals. Several scientific advances have been endeavored to develop universal vaccines that will induce broad protection. Universal vaccines have been focused on regions of viral proteins that are highly conserved across different virus subtypes. The strategies of universal vaccines include the matrix 2 protein, the hemagglutinin HA2 stalk domain, and T cell-based multivalent antigens. Supplemented and/or adjuvanted vaccination in combination with universal target antigenic vaccines would have much promise. This review summarizes encouraging scientific advances in the field with a focus on novel vaccine designs. PMID:24427759

  7. Thiosemicarbazones and Phthalyl-Thiazoles compounds exert antiviral activity against yellow fever virus and Saint Louis encephalitis virus.

    PubMed

    Pacca, Carolina Colombelli; Marques, Rafael Elias; Espindola, José Wanderlan P; Filho, Gevânio B O Oliveira; Leite, Ana Cristina Lima; Teixeira, Mauro Martins; Nogueira, Mauricio L

    2017-03-01

    Arboviruses, arthropod-borneviruses, are frequency associated to human outbreak and represent a serious health problem. The genus Flavivirus, such as Yellow Fever Virus (YFV) and Saint Louis Encephalitis Virus (SLEV), are important pathogens with high morbidity and mortality worldwide. In Brazil, YFV is maintained in sylvatic cycle, but many cases are notified annually, despite the efficiency of vaccine. SLEV causes an acute encephalitis and is widely distributed in the Americas. There is no specific antiviral drugs for these viruses, only supporting treatment that can alleviate symptoms and prevent complications. Here, we evaluated the potential anti-YFV and SLEV activity of a series of thiosemicarbazones and phthalyl-thiazoles. Plaque reduction assay, flow cytometry, immunofluorescence and cellular viability were used to test the compounds in vitro. Treated cells showed efficient inhibition of the viral replication at concentrations that presented minimal toxicity to cells. The assays showed that phthalyl-thiazole and phenoxymethyl-thiosemicarbazone reduced 60% of YFV replication and 75% of SLEV replication. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  8. Genital herpes simplex virus infections.

    PubMed

    Rosenthal, M S

    1979-09-01

    In recent years, a great increase in interest in genital herpes has been stimulated partly by the rising prevalence of this disease and partly by observations suggesting that genital herpes is a cause of cervical cancer. The clinical pictures produced by genital herpes simplex virus infections are similar in men and women. In contrast to recurrent attacks, initial episodes of infection are generally more extensive, last longer, and are more often associated with regional lymphadenopathy and systemic symptoms. Genital herpes in pregnancy may pose a serious threat to the newborn infant. Although the data suggesting genital herpes simplex virus infection is a cause of cervical cancer are quite extensive, the evidence is largely circumstantial. In spite of these more serious aspects of genital herpes simplex virus infection, episodes of genital herpes are almost always self-limited and benign. Frequent recurrences pose the major therapeutic and management problem. At present, there is no satisfactory treatment for recurrent genital herpes simplex virus in fection. Many of the suggested therapies, although some sound very promising, are potentially dangerous and should be used only under carefully controlled conditions.

  9. Reconfigurability in MDO Problem Synthesis. Part 1

    NASA Technical Reports Server (NTRS)

    Alexandrov, Natalia M.; Lewis, Robert Michael

    2004-01-01

    Integrating autonomous disciplines into a problem amenable to solution presents a major challenge in realistic multidisciplinary design optimization (MDO). We propose a linguistic approach to MDO problem description, formulation, and solution we call reconfigurable multidisciplinary synthesis (REMS). With assistance from computer science techniques, REMS comprises an abstract language and a collection of processes that provide a means for dynamic reasoning about MDO problems in a range of contexts. The approach may be summarized as follows. Description of disciplinary data according to the rules of a grammar, followed by lexical analysis and compilation, yields basic computational components that can be assembled into various MDO problem formulations and solution algorithms, including hybrid strategies, with relative ease. The ability to re-use the computational components is due to the special structure of the MDO problem. The range of contexts for reasoning about MDO spans tasks from error checking and derivative computation to formulation and reformulation of optimization problem statements. In highly structured contexts, reconfigurability can mean a straightforward transformation among problem formulations with a single operation. We hope that REMS will enable experimentation with a variety of problem formulations in research environments, assist in the assembly of MDO test problems, and serve as a pre-processor in computational frameworks in production environments. This paper, Part 1 of two companion papers, discusses the fundamentals of REMS. Part 2 illustrates the methodology in more detail.

  10. Reconfigurability in MDO Problem Synthesis. Part 2

    NASA Technical Reports Server (NTRS)

    Alexandrov, Natalia M.; Lewis, Robert Michael

    2004-01-01

    Integrating autonomous disciplines into a problem amenable to solution presents a major challenge in realistic multidisciplinary design optimization (MDO). We propose a linguistic approach to MDO problem description, formulation, and solution we call reconfigurable multidisciplinary synthesis (REMS). With assistance from computer science techniques, REMS comprises an abstract language and a collection of processes that provide a means for dynamic reasoning about MDO problems in a range of contexts. The approach may be summarized as follows. Description of disciplinary data according to the rules of a grammar, followed by lexical analysis and compilation, yields basic computational components that can be assembled into various MDO problem formulations and solution algorithms, including hybrid strategies, with relative ease. The ability to re-use the computational components is due to the special structure of the MDO problem. The range of contexts for reasoning about MDO spans tasks from error checking and derivative computation to formulation and reformulation of optimization problem statements. In highly structured contexts, reconfigurability can mean a straightforward transformation among problem formulations with a single operation. We hope that REMS will enable experimentation with a variety of problem formulations in research environments, assist in the assembly of MDO test problems, and serve as a pre-processor in computational frameworks in production environments. Part 1 of two companion papers, discusses the fundamentals of REMS. This paper, Part 2 illustrates the methodology in more detail.

  11. An analysis of computer-related patient safety incidents to inform the development of a classification.

    PubMed

    Magrabi, Farah; Ong, Mei-Sing; Runciman, William; Coiera, Enrico

    2010-01-01

    To analyze patient safety incidents associated with computer use to develop the basis for a classification of problems reported by health professionals. Incidents submitted to a voluntary incident reporting database across one Australian state were retrieved and a subset (25%) was analyzed to identify 'natural categories' for classification. Two coders independently classified the remaining incidents into one or more categories. Free text descriptions were analyzed to identify contributing factors. Where available medical specialty, time of day and consequences were examined. Descriptive statistics; inter-rater reliability. A search of 42,616 incidents from 2003 to 2005 yielded 123 computer related incidents. After removing duplicate and unrelated incidents, 99 incidents describing 117 problems remained. A classification with 32 types of computer use problems was developed. Problems were grouped into information input (31%), transfer (20%), output (20%) and general technical (24%). Overall, 55% of problems were machine related and 45% were attributed to human-computer interaction. Delays in initiating and completing clinical tasks were a major consequence of machine related problems (70%) whereas rework was a major consequence of human-computer interaction problems (78%). While 38% (n=26) of the incidents were reported to have a noticeable consequence but no harm, 34% (n=23) had no noticeable consequence. Only 0.2% of all incidents reported were computer related. Further work is required to expand our classification using incident reports and other sources of information about healthcare IT problems. Evidence based user interface design must focus on the safe entry and retrieval of clinical information and support users in detecting and correcting errors and malfunctions.

  12. Artificial intelligence, expert systems, computer vision, and natural language processing

    NASA Technical Reports Server (NTRS)

    Gevarter, W. B.

    1984-01-01

    An overview of artificial intelligence (AI), its core ingredients, and its applications is presented. The knowledge representation, logic, problem solving approaches, languages, and computers pertaining to AI are examined, and the state of the art in AI is reviewed. The use of AI in expert systems, computer vision, natural language processing, speech recognition and understanding, speech synthesis, problem solving, and planning is examined. Basic AI topics, including automation, search-oriented problem solving, knowledge representation, and computational logic, are discussed.

  13. Parallel computers - Estimate errors caused by imprecise data

    NASA Technical Reports Server (NTRS)

    Kreinovich, Vladik; Bernat, Andrew; Villa, Elsa; Mariscal, Yvonne

    1991-01-01

    A new approach to the problem of estimating errors caused by imprecise data is proposed in the context of software engineering. A software device is used to produce an ideal solution to the problem, when the computer is capable of computing errors of arbitrary programs. The software engineering aspect of this problem is to describe a device for computing the error estimates in software terms and then to provide precise numbers with error estimates to the user. The feasibility of the program capable of computing both some quantity and its error estimate in the range of possible measurement errors is demonstrated.

  14. Optical solver of combinatorial problems: nanotechnological approach.

    PubMed

    Cohen, Eyal; Dolev, Shlomi; Frenkel, Sergey; Kryzhanovsky, Boris; Palagushkin, Alexandr; Rosenblit, Michael; Zakharov, Victor

    2013-09-01

    We present an optical computing system to solve NP-hard problems. As nano-optical computing is a promising venue for the next generation of computers performing parallel computations, we investigate the application of submicron, or even subwavelength, computing device designs. The system utilizes a setup of exponential sized masks with exponential space complexity produced in polynomial time preprocessing. The masks are later used to solve the problem in polynomial time. The size of the masks is reduced to nanoscaled density. Simulations were done to choose a proper design, and actual implementations show the feasibility of such a system.

  15. Walking (Gait), Balance, and Coordination Problems

    MedlinePlus

    ... Disease T Cells d What Causes MS? Disproved Theories Viruses Clusters d Who Gets MS? Pediatric MS ... of Distinction Lawry Circle Circle of Influence d Planned Giving d Other Ways to Give Donate by ...

  16. Fast real-time polymerase chain reaction for quantitative detection of Lactobacillus delbrueckii bacteriophages in milk.

    PubMed

    Martín, Maria Cruz; del Rio, Beatriz; Martínez, Noelia; Magadán, Alfonso H; Alvarez, Miguel A

    2008-12-01

    One of the main microbiological problems of the dairy industry is the susceptibility of starter bacteria to virus infections. Lactobacillus delbrueckii, a component of thermophilic starter cultures used in the manufacture of several fermented dairy products, including yogurt, is also sensitive to bacteriophage attacks. To avoid the problems associated with these viruses, quick and sensitive detection methods are necessary. In the present study, a fast real-time quantitative polymerase chain reaction assay for the direct detection and quantification of L. delbrueckii phages in milk was developed. A set of primers and a TaqMan MGB probe was designed, based on the lysin gene sequence of different L. delbrueckii phages. The results show the proposed method to be a rapid (total processing time 30 min), specific and highly sensitive technique for detecting L. delbrueckii phages in milk.

  17. Psychological problems of families and health workers dealing with people infected with human immunodeficiency virus 1.

    PubMed

    Maj, M

    1991-03-01

    The psychological problems of the families of human immunodeficiency virus 1 (HIV-1)-infected people, and of the health workers taking care of them, have been addressed in a few empirical studies and in several anecdotal reports and theoretical contributions. Apparently, HIV-1 infection and acquired immunodeficiency syndrome (AIDS) are able to elicit a wide range of emotional reactions, from rejection and refusal to provide care to immersion in the infected person's needs and burnout. Since irrational fears and attitudes play an important role in conditioning these reactions, education may not be sufficient to change behaviour. Counselling sessions and mutual support groups are often the most appropriate contexts where fears and concerns can receive an individually tailored response, and where formal and informal caregivers can be helped to manage stress.

  18. Increased interestingness of extraneous details in a multimedia science presentation leads to decreased learning.

    PubMed

    Mayer, Richard E; Griffith, Emily; Jurkowitz, Ilana T N; Rothman, Daniel

    2008-12-01

    In Experiment 1, students received an illustrated booklet, PowerPoint presentation, or narrated animation that explained 6 steps in how a cold virus infects the human body. The material included 6 high-interest details mainly about the role of viruses in sex or death (high group) or 6 low-interest details consisting of facts and health tips about viruses (low group). The low group outperformed the high group across all 3 media on a subsequent test of problem-solving transfer (d = .80) but not retention (d = .05). In Experiment 2, students who studied a PowerPoint lesson explaining the steps in how digestion works performed better on a problem-solving transfer test if the lesson contained 7 low-interest details rather than 7 high-interest details (d = .86), but the groups did not differ on retention (d = .26). In both experiments, as the interestingness of details was increased, student understanding decreased (as measured by transfer). Results are consistent with a cognitive theory of multimedia learning, in which highly interesting details sap processing capacity away from deeper cognitive processing of the core material during learning. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  19. Analysis of the Optimum Receiver Design Problem Using Interactive Computer Graphics.

    DTIC Science & Technology

    1981-12-01

    7 _AD A115 498A l AR FORCE INST OF TECH WR16HT-PATTERSON AF8 OH SCHOO--ETC F/6 9/2 ANALYSIS OF THE OPTIMUM RECEIVER DESIGN PROBLEM USING INTERACTI...ANALYSIS OF THE OPTIMUM RECEIVER DESIGN PROBLEM USING INTERACTIVE COMPUTER GRAPHICS THESIS AFIT/GE/EE/81D-39 Michael R. Mazzuechi Cpt USA Approved for...public release; distribution unlimited AFIT/GE/EE/SlD-39 ANALYSIS OF THE OPTIMUM RECEIVER DESIGN PROBLEM USING INTERACTIVE COMPUTER GRAPHICS THESIS

  20. Robust Decision Making: The Cognitive and Computational Modeling of Team Problem Solving for Decision Making under Complex and Dynamic Conditions

    DTIC Science & Technology

    2015-07-14

    AFRL-OSR-VA-TR-2015-0202 Robust Decision Making: The Cognitive and Computational Modeling of Team Problem Solving for Decision Making under Complex...Computational Modeling of Team Problem Solving for Decision Making Under Complex and Dynamic Conditions 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-12-1...functioning as they solve complex problems, and propose the means to improve the performance of teams, under changing or adversarial conditions. By

Top